Power distribution Internet of Things edge Internet of Things proxy network security protection method and system

A network security and Internet of Things technology, applied in the field of power distribution Internet of Things in the power Internet of Things, can solve problems such as power grid data leakage, Internet of Things management platform penetration attacks, tampering, etc., to improve security and privacy, and reduce illegal intrusions. probability, the effect of preventing leakage and tampering

Pending Publication Date: 2022-06-03
CHINA ELECTRIC POWER RES INST +3
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of the edge IoT agent accessing multiple devices, it is impossible to check each device one by one, resulting in inadequate protection measures for the edge Internet of Things agent. After being invaded or illegally controlled, it may cause data leakage and tampering of the power grid. , and even use this as a springboard to carry out penetration attacks on the IoT management platform, causing the entire system to be paralyzed. Therefore, it is urgent to carry out research on security protection technologies based on edge IoT agents

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power distribution Internet of Things edge Internet of Things proxy network security protection method and system
  • Power distribution Internet of Things edge Internet of Things proxy network security protection method and system
  • Power distribution Internet of Things edge Internet of Things proxy network security protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] like figure 1 As shown, an embodiment of the present invention provides a network security protection method for an IoT agent at the edge of the power distribution IoT, including:

[0053] Step 1: Perform trusted authentication on the IoT terminal and the IoT management platform based on the edge IoT agent;

[0054] Step 2: After the trusted authentication is passed,

[0055] Encrypt and upload the operation status data of the power distribution IoT collected by the IoT terminal to the edge IoT agent; or encrypt the data in the edge IoT agent and transmit it to the edge IoT agent by means of ciphertext transmission. The IoT management platform is decrypted and uploaded to the application layer of the power distribution IoT.

[0056] Combined with the security risks and requirements of the edge IoT agent, the security protection method in the present invention includes four aspects: edge IoT agent ontology security, access control, data protection, and security monitor...

Embodiment 2

[0094] Based on the same inventive concept, the present invention also provides a network security protection system for the edge IoT agent of the power distribution IoT, because the principles of these systems for solving technical problems are similar to a security protection method for the edge IoT agent network of the power distribution IoT, The repetition will not be repeated. like Figure 7 shown, including:

[0095] The IoT terminal is used to collect the running status data of the power distribution IoT and upload it to the edge IoT agent;

[0096] The edge IoT agent is used for trusted authentication of IoT terminals and IoT management platforms; it is also used to receive the operating status data of the power distribution IoT collected by the encrypted IoT terminals; it is also used to encrypt the collected data Then, it is transmitted to the IoT management platform by means of ciphertext transmission;

[0097] The IoT management platform is used to decrypt the o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a power distribution Internet of Things edge Internet of Things proxy network security protection method and system. The method comprises the steps of performing credible authentication on an Internet of Things terminal and an Internet of Things management platform based on an edge Internet of Things proxy; after the credible authentication is passed, encrypting operation state data of the power distribution Internet of Things collected by the Internet of Things terminal and uploading the operation state data to the edge Internet of Things agent; or after data in the edge Internet of Things agent is encrypted, transmitting the encrypted data to the Internet of Things management platform in a ciphertext transmission mode, decrypting the encrypted data, and uploading the decrypted data to the application layer of the power distribution Internet of Things; according to the invention, the security and privacy of the power grid data in the edge internet-of-things agent are improved.

Description

technical field [0001] The invention belongs to the technical field of the power distribution Internet of things in the power Internet of things, and relates to a network security protection method and system for an edge Internet of Things agent in a power distribution Internet of things scenario. Background technique [0002] The distribution Internet of Things is the realization of the power Internet of things in the field of power distribution. The characteristics of complex network architecture, cloudification of the main station, the Internet of things of terminal equipment, and flexible business expansion lead to the security risks faced by the distribution Internet of things and traditional power distribution. Compared with the monitoring system, great changes have taken place. In recent years, the network security situation has become increasingly severe, and the security incidents of the Internet of Things and industrial control systems have increased year by year (...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L9/08H04L9/32H04L67/12
CPCH04L63/0428H04L63/08H04L63/0823H04L63/083H04L67/12H04L9/0838H04L9/0869H04L9/3247Y04S40/128
Inventor 何连杰李二霞亢超群李玉凌杨红磊张波常方圆孙智涛许保平樊勇华
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products