Supercharge Your Innovation With Domain-Expert AI Agents!

Power control instruction execution test method and system

A technology of instruction execution and verification method, applied in the field of power system information physical security, can solve problems that affect the safe and stable operation of the power system, easy to tamper, poor privacy, etc., to improve the ability to resist network attacks, ensure safe and stable operation, solve Effects of Security Flaws

Active Publication Date: 2021-11-05
HUNAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current power control command transmission adopts the ECB block encryption method for command encryption. Although it has the advantages of fast and simple, it also has disadvantages such as poor privacy, easy to tamper, error-prone, and inability to resist replay attacks.
At the same time, the communication protocol between the main station and the substation mostly uses IEC104 for message transmission, and the vertical encryption device guarantees the security of the data channel from the main station to the substation for measurement and dispatching to a certain extent. However, the IEC104 protocol does not have identity authentication and security protection mechanisms
Once a malicious attacker tampers with or forges dispatching instructions during the transmission of control instructions and sends them to the substation, the substation executes the tampered or forged control instructions under the condition of absolute trust, and then manipulates primary electrical equipment such as circuit breakers to change the power supply. The actual operating topology of the system is very likely to cause large-scale cascading faults in the power system, seriously affecting the safe and stable operation of the power system
[0003] However, there is currently no effective solution to the communication security problem of power control commands

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power control instruction execution test method and system
  • Power control instruction execution test method and system
  • Power control instruction execution test method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0070] Further as a preferred embodiment, the step S1 includes:

[0071] Step S11: According to the connection message m of the original master station zl,i , the sending time stamp T of the master connection message zl,i , the master digital signature sign of the master connection message zl,i And the random number R of the master connection message zl,i , add the master station connection message after the security domain The specific calculation formula is as follows:

[0072]

[0073] Among them, m zl,i is the connection message of the original master station, i is the serial number of the power control command between the master station and the substation, zl represents the connection of the master station, ·||· is a character connection.

[0074] In one embodiment, the master station sends the sending time stamp T of the connection command zl,i is 20210311120027, the digital signature sign of the master station connection message zl,i For CXSG, the random numb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power control instruction execution test method and system, and the method employs a CounTeR encryption mode to carry out the grouping encryption on a power control instruction message, and solves a communication potential safety hazard existing in an ECB grouping encryption mode employed by a control instruction between a master station and a transformer station at present. An IEC-104 protocol is improved, and the defect that an existing IEC104 communication protocol lacks effective security authentication is overcome. A three-stage control instruction execution handshake method based on a zero-trust network between a master station and a transformer substation is constructed, remote control identity authority is continuously confirmed, illegal user access is completely eradicated, and authenticity of identities of two communication parties and traceability of service data are guaranteed. According to the invention, the security defect existing in communication between the master station and the transformer substation at present is overcome, the security risk of executing the master station control instruction by the transformer substation is reduced, and the network attack resistance of a power system is improved.

Description

technical field [0001] The invention relates to power system information physical security technology, in particular to a method and system for checking the execution of power control instructions. Background technique [0002] With the digital transformation of power companies and the large-scale application of 5G, cloud computing and other technologies in the power system, the boundaries between the internal and external networks of power companies are becoming increasingly blurred, and traditional measures based on boundary physical isolation will no longer be an absolute barrier to ensure information security in power companies. Power devices should not automatically trust objects inside or outside, and any object attempting to control power devices should be authenticated before authorization. Therefore, an identity-centric zero-trust network has become an inevitable trend in the development of power system security authentication mechanisms. However, the current power...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0435H04L63/08H04L69/06H04L69/26Y04S40/20
Inventor 刘绚严康田建伟张波
Owner HUNAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More