CN110012447A - The system and method for network security control function is realized in substation based on wireless sensor - Google Patents
The system and method for network security control function is realized in substation based on wireless sensor Download PDFInfo
- Publication number
- CN110012447A CN110012447A CN201910348217.4A CN201910348217A CN110012447A CN 110012447 A CN110012447 A CN 110012447A CN 201910348217 A CN201910348217 A CN 201910348217A CN 110012447 A CN110012447 A CN 110012447A
- Authority
- CN
- China
- Prior art keywords
- wireless
- wireless sensor
- data
- receiving
- network security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 230000005540 biological transmission Effects 0.000 claims description 32
- IYZMXHQDXZKNCY-UHFFFAOYSA-N 1-n,1-n-diphenyl-4-n,4-n-bis[4-(n-phenylanilino)phenyl]benzene-1,4-diamine Chemical compound C1=CC=CC=C1N(C=1C=CC(=CC=1)N(C=1C=CC(=CC=1)N(C=1C=CC=CC=1)C=1C=CC=CC=1)C=1C=CC(=CC=1)N(C=1C=CC=CC=1)C=1C=CC=CC=1)C1=CC=CC=C1 IYZMXHQDXZKNCY-UHFFFAOYSA-N 0.000 claims description 30
- 238000004891 communication Methods 0.000 claims description 26
- 230000002093 peripheral effect Effects 0.000 claims description 9
- 230000006870 function Effects 0.000 description 11
- 238000012545 processing Methods 0.000 description 9
- 238000013480 data collection Methods 0.000 description 8
- RTZKZFJDLAIYFH-UHFFFAOYSA-N Diethyl ether Chemical compound CCOCC RTZKZFJDLAIYFH-UHFFFAOYSA-N 0.000 description 4
- 238000003825 pressing Methods 0.000 description 4
- 206010037660 Pyrexia Diseases 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000011176 pooling Methods 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 230000001568 sexual effect Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000008595 infiltration Effects 0.000 description 1
- 238000001764 infiltration Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/38—Services specially adapted for particular environments, situations or purposes for collecting sensor information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Selective Calling Equipment (AREA)
Abstract
The present invention relates to the system for realizing network security control function based on wireless sensor in a kind of substation, including wireless sensor and wireless data acquisition terminal, the wireless sensor and wireless data acquisition terminal are the Star Network structure of non-relay node.The invention further relates to a kind of methods for realizing network security control function based on wireless sensor in substation.Using the system and method for realizing network security control function in substation of the invention based on wireless sensor, the characteristics of wireless sensor micropower is run is fully considered, has systematically devised the control management of network security.The management for being key is that the unique encodings based on MCU are automatically generated by software, and can only be read by flashburn tools, each sensor has independent key, is not necessarily to key generator, and efficient and convenient, safety is low in cost, without additional power consumption.
Description
Technical field
The present invention relates to bases in Internet of Things field more particularly to substation's field of wireless transmission, in particular to a kind of substation
The system and method for network security control function is realized in wireless sensor.
Background technique
With the development and extensive use of technology of Internet of things, wireless micro-power wireless sensor network is based in current transformer substation
Network is gradually applied.It include pressing plate state sensor, data collection station two parts by taking pressure plate status monitoring system as an example.
For pressing plate state sensor with non-electrical principle real-time perception pressing plate state, data collection station realizes what press plate position sensor was sent
Small wireless signal gathering receives and processing, and is communicated with outer application system.Wireless sensor network is typically based on ISM frequency
Section, such as 433MHz, 2.4GHz, these frequency ranges are not necessarily to licensing or expense, it is only necessary to (generally below in accordance with certain transmission power
1W), and other frequency ranges are not interfered, the factor by its wireless communication and own node feature is influenced, and is become
Power station wireless sensor network faces the risk of following three network security in actual operation:
1) privacy of data transmission is low, is easy to be monitored and parsed by external system, causes information leakage.
2) signal interference in wireless communication procedure, attacker destroy sensor using the method for frequency interferences
Node receives signal, destroys the connection between sensor node and acquisition terminal.
3) attacker forge sensor node, achieve the purpose that invade acquisition terminal, and by acquisition terminal be in go on
One step invades substation's internal communication network, causes serious network security accident.
Summary of the invention
The purpose of the present invention is overcoming the above-mentioned prior art, provides and a kind of meet that encryption is good, communication energy
System and the side of network security control function are realized in the substation that power is strong, the scope of application is relatively broad based on wireless sensor
Method.
To achieve the goals above, network security control function is realized based on wireless sensor in substation of the invention
System and method is as follows:
The system for realizing network security control function based on wireless sensor in the substation, is mainly characterized by, described
System include wireless sensor and wireless data acquisition terminal, the wireless sensor and wireless data acquisition terminal are
The Star Network structure of non-relay node, the wireless sensor are used for transmission wireless signal, the data acquisition
Terminal is used to receive and handle the signal of wireless sensor transmission.
Preferably, the wireless sensor includes:
First micro-control unit, for being managed and controlling to the communication resource;
First radio receiving transmitting module is connected with first micro-control unit by Serial Peripheral Interface (SPI), for pair
Wireless signal is received and dispatched.
Preferably, the wireless data acquisition terminal includes:
Second micro-control unit, for being managed and controlling to the communication resource;
Second radio receiving transmitting module is connected with second micro-control unit by Serial Peripheral Interface (SPI), for pair
Wireless signal is received and dispatched;
Second serial transceiver module is connected, for leading to by Serial Peripheral Interface (SPI) with second micro-control unit
Cross serial ports receiving and transmitting signal.
Preferably, first radio receiving transmitting module includes that the first wireless receiving and dispatching sends buffer area and the first wireless receiving and dispatching
Buffer area is received, is connected with first micro-control unit.
Preferably, second radio receiving transmitting module includes that the second wireless receiving and dispatching sends buffer area and the second wireless receiving and dispatching
Buffer area is received, is connected with second micro-control unit.
Preferably, the second serial transceiver module includes that second serial transmitting-receiving sends buffer area and second serial transmitting-receiving
Buffer area is received, is connected with second micro-control unit.
Preferably, first wireless receiving and dispatching sends buffer area and the first wireless receiving and dispatching receives buffer area and is up to 64 words
Section.
Preferably, second wireless receiving and dispatching sends buffer area and the second wireless receiving and dispatching receives buffer area and is up to 64 words
Section.
Preferably, the second serial transmitting-receiving sends buffer area and second serial transmitting-receiving receives buffer area and is up to 255
Byte.
This is based on network safety control method of the realization based on wireless sensor, main feature in above system substation
Be, the method the following steps are included:
(1) number key and corresponding key inventory are filled under the wireless sensor and wireless data acquisition terminal described in;
(2) wireless sensor described in passes through the application data that the key pair automatically generated is received and dispatched in message and carries out at encryption
Reason;
(3) wireless data acquisition terminal described in obtains corresponding key according to the node serial number of wireless sensor, reduction
Data are applied at actual;
(4) wireless data acquisition terminal described in is encrypted by its key, and the wireless sensor carries out
Data deciphering.
Preferably, data encryption is carried out in the step (2) and step (4), specifically:
Data encryption according to the following formula:
TDATA [n]=DATA [n]+PKey [k]+CRC [r];
Wherein, TDATA [n] is using the value on n-th of byte location after data encryption, and DATA [n] is using data
Value on n-th of byte location, PKey [k] are the value on k-th of byte location of key, and k is N divided by 4 remainder, and r removes for N
With 2 remainder.
Preferably, data deciphering is carried out in the step (3) and step (4), specifically:
Data deciphering according to the following formula:
DATA [n]=TDATA [n]-PKey [k]-CRC [r];
Wherein, TDATA [n] is using the value on n-th of byte location after data encryption, and DATA [n] is using data
Value on n-th of byte location, PKey [k] are the value on k-th of byte location of key, and k is N divided by 4 remainder, and r removes for N
With 2 remainder.
Using in substation of the invention based on wireless sensor realize network security control function system and method,
The characteristics of having fully considered the operation of wireless sensor micropower, systematically devises the control management of network security.It is key
Management be that the unique encodings based on MCU are automatically generated by software, and can only be read by flashburn tools, each sensor has
Independent key is not necessarily to key generator, and efficient and convenient, safety is low in cost, without additional power consumption.By the mould of correspondence with foreign country
Block is independent, and caching is placed in communication module, realizes the active process of data, effectively avoids memory flooding.It is logical with outside
Credit serial communication scheme effectively prevents the network communication interface safety of ether net mode.
Detailed description of the invention
Fig. 1 is the wireless biography for realizing the system of network security control function in substation of the invention based on wireless sensor
Sensor correspondence with foreign country hardware configuration.
Fig. 2 is the system based on wireless sensor realization network security control function in substation of the invention without line number
According to acquisition terminal correspondence with foreign country hardware configuration.
Specific embodiment
It is further to carry out combined with specific embodiments below in order to more clearly describe technology contents of the invention
Description.
The system that network security control function is realized based on wireless sensor in the substation of the invention, including:
Wireless sensor and wireless data acquisition terminal, the wireless sensor and wireless data acquisition terminal are nothing
The Star Network structure of relay node, the wireless sensor are used for transmission wireless signal, and the data acquisition is whole
Hold the signal for receiving and handling wireless sensor transmission.
As the preferred embodiment of the present invention, the wireless sensor includes:
First micro-control unit, for being managed and controlling to the communication resource;
First radio receiving transmitting module is connected with first micro-control unit by Serial Peripheral Interface (SPI), for pair
Wireless signal is received and dispatched.
As the preferred embodiment of the present invention, the wireless data acquisition terminal includes:
Second micro-control unit, for being managed and controlling to the communication resource;
Second radio receiving transmitting module is connected with second micro-control unit by Serial Peripheral Interface (SPI), for pair
Wireless signal is received and dispatched;
Second serial transceiver module is connected, for leading to by Serial Peripheral Interface (SPI) with second micro-control unit
Cross serial ports receiving and transmitting signal.
As the preferred embodiment of the present invention, first radio receiving transmitting module includes that the transmission of the first wireless receiving and dispatching is slow
It rushes area and the first wireless receiving and dispatching receives buffer area, be connected with first micro-control unit.
As the preferred embodiment of the present invention, second radio receiving transmitting module includes that the transmission of the second wireless receiving and dispatching is slow
It rushes area and the second wireless receiving and dispatching receives buffer area, be connected with second micro-control unit.
As the preferred embodiment of the present invention, the second serial transceiver module includes that second serial transmitting-receiving transmission is slow
It rushes area and second serial transmitting-receiving receives buffer area, be connected with second micro-control unit.
As the preferred embodiment of the present invention, first wireless receiving and dispatching sends buffer area and the first wireless receiving and dispatching connects
It receives buffer area and is up to 64 bytes.
As the preferred embodiment of the present invention, second wireless receiving and dispatching sends buffer area and the second wireless receiving and dispatching connects
It receives buffer area and is up to 64 bytes.
As the preferred embodiment of the present invention, the second serial transmitting-receiving sends buffer area and second serial transmitting-receiving connects
It receives buffer area and is up to 255 bytes.
Of the invention should realize the network safety control method based on wireless sensor in substation based on above system,
In the following steps are included:
(1) number key and corresponding key inventory are filled under the wireless sensor and wireless data acquisition terminal described in;
(2) wireless sensor described in passes through the application data that the key pair automatically generated is received and dispatched in message and carries out at encryption
Reason;
(3) wireless data acquisition terminal described in obtains corresponding key according to the node serial number of wireless sensor, reduction
Data are applied at actual;
(4) wireless data acquisition terminal described in is encrypted by its key, and the wireless sensor carries out
Data deciphering.
As the preferred embodiment of the present invention, data encryption is carried out in the step (2) and step (4), specifically:
Data encryption according to the following formula:
TDATA [n]=DATA [n]+PKey [k]+CRC [r];
Wherein, TDATA [n] is using the value on n-th of byte location after data encryption, and DATA [n] is using data
Value on n-th of byte location, PKey [k] are the value on k-th of byte location of key, and k is N divided by 4 remainder, and r removes for N
With 2 remainder.
As the preferred embodiment of the present invention, data deciphering is carried out in the step (3) and step (4), specifically:
Data deciphering according to the following formula:
DATA [n]=TDATA [n]-PKey [k]-CRC [r];
Wherein, TDATA [n] is using the value on n-th of byte location after data encryption, and DATA [n] is using data
Value on n-th of byte location, PKey [k] are the value on k-th of byte location of key, and k is N divided by 4 remainder, and r removes for N
With 2 remainder.
In a specific embodiment of the invention, substation's wireless sensor node energy constraint has been fully considered, communicate energy
The features such as power is weaker, and memory space is smaller, and actual project plan condition, network security management requirement are combined, in hardware knot
The many aspects such as structure design, data transmission mechanism, data transmission encryption, external transmission interface and agreement restriction have carried out network peace
Full design devises a set of from hardware structure, data transmission mechanism, data transmission encryption, external transmission interface and agreement restriction
A whole set of the more complete solution method of network safety started realizes wireless sensor network security control in substation.
1, correspondence with foreign country modularization separate type hardware structure:
Select MCU and communication resource modularization separate type hardware structure independent, MCU independent operating, by it to logical
Letter resource is managed and controls, and communication resource buffer area is isolated with MCU, avoids infiltration of the spilling sexual assault to MCU, and each
Communication module carries out data exchange using interrupt notification+caching read-write mode.
Wireless receiving and dispatching data receiver and transmission buffer area are located in radio receiving transmitting module, buffer area 64 bytes of maximum.Communication
Resource pooling area is isolated with MCU.
Serial ports sending and receiving data sends and receivees buffer area and is located in serial ports transceiver module, buffer area 255 bytes of maximum, communication
Resource pooling area is isolated with MCU.
Wireless network coverage control: selecting micro power consumption wireless transceiver module, and sensor wireless transmission range is no more than
50 meters, the Star Network structure of pressing plate state sensor and data collection station using non-relay node, sensor in-site collecting
Data collection station receives on the spot, effectively the range of control wireless transmission.
2, data transmission encrypting and decrypting processing:
Each wireless sensor, wireless data acquisition terminal are generated in production according to the production sequence number built in mcu
The unique keys of one nybble, the key are read by generating when electricity operation in software module by software replication tool.
Unified sending and receiving data format first a kind of to the data definition of wireless receiving and dispatching:
3, the process of data encrypting and deciphering is as follows:
1) when engineering configures, wireless sensor node is numbered, the wireless of its acquisition is filled under wireless data acquisition terminal
Sensor number and corresponding key inventory, the key to the wireless data acquisition terminal for filling its ownership under sensor.
2) add using data in the key pair transmitting-receiving message automatically generated when wireless sensor transmitting-receiving message
Close processing.
The algorithm of data encryption is as follows:
TDATA [n]=DATA [n]+PKey [k]+CRC [r];
TDATA [n] is using the value on n-th of byte location after data encryption;
DATA [n] is using the value on n-th of byte location of data;
PKey [k] is the value on k-th of byte location of key;
K=N divided by 4 remainder;
R=N divided by 2 remainder;
CRC [r] is the check code of 2 bytes.
3) it after wireless data acquisition terminal receives the message that wireless sensor is sent, is found according to the node serial number of sensor
Corresponding key, then carries out being reduced into actual using data, and the decipherment algorithm of data is as follows:
DATA [n]=TDATA [n]-PKey [k]-CRC [r]
4) wireless data acquisition terminal is encrypted with the key of oneself when sending data, and wireless sensor uses
The carry out data deciphering of wireless data acquisition terminal.Enciphering and deciphering algorithm is same as above.
4, the sexual assault of wireless data acquisition terminal anti-copying controls: after the signal to prevent wireless sensor from sending is monitored
It is sent with high-frequency duplication and high-frequency data attack is carried out to wireless data acquisition terminal, the data band that wireless sensor is sent is sent
It counts, the transmission that wireless data acquisition terminal only handles than caching counts big data, otherwise will directly abandon.
5, the security control of wireless data acquisition terminal cable data output port: acquisition terminal externally transmits use
RS485 serial communication is selected MODBUS communications protocol (RTU), and acquisition terminal does not send data externally actively, using external system
Initiate read request, the data interaction mode that acquisition terminal is replied.It is the function situation inventory that acquisition terminal is supported below:
Sensor is generally mounted in Substation control room, and substation non-electricity associate not can enter, and says nothing as far as possible
Line network coverage controls in substation, can be monitored to avoid wireless signal by external staff's malice.
It the use of serial communication is a kind of relatively conventional network security control means.The TCP/IP communications protocol of Ethernet is
Open Standard, most network attacks are realized based on Ethernet ICP/IP protocol, pass through RS485 serial communication, energy
Effectively avoid the network security threats of Ethernet.MODBUS is a kind of general industrial data exchange agreement, it is a kind of
The agreement of server-side control, server-side can be very good the read range and reading of content of control data, can effectively control pair
The range of external information output.
The total workflow of the technical program is as follows:
(1) runs software executable file is written with fever writes in each wireless sensor;
(2) each wireless sensor powers on, automatic running program, produces sequence number according to MCU and automatically generates nybble only
One key (such as: 00460028), which is unique encodings, and all wireless sensors are different from;
(3) program burn writing device reads each 4 byte key of wireless sensor running memory kind;
(4) runs software executable file is written with software in wireless data acquisition terminal;
(5) data collection station powers on, automatic running program, and it is unique to automatically generate nybble according to MCU production sequence number
Key (such as: 003B0068), the key are unique encodings;
(6) fever writes compile the key and its node of the wireless data acquisition terminal that its ownership is filled under each wireless sensor
Number, node serial number sorts since 1, and node serial number is unique within the scope of affiliated wireless data acquisition terminal, and wireless sensor exists
With the number when sending message;
(7) fever writes are to all wireless sensors number and corresponding key for filling its acquisition under wireless data acquisition terminal
Inventory;
(8) wireless sensor is encrypted using the message that the key pair of oneself is sent;
(9) wireless transport module of wireless data acquisition terminal interrupts after receiving message to MCU transmission request processing;
(10) wireless data acquisition terminal MCU reads message data in buffer area, is found according to the node serial number in message
Corresponding key is decrypted;
(11) transmission in wireless data acquisition terminal parsing data counts, and sends out with the wireless sensor last time of caching
Counting is sent to be compared, only transmission of the processing than caching counts big message;
(12) wireless data acquisition terminal is encrypted before sending message using the message that the key pair of oneself is sent;
(13) wireless transport module of wireless sensor interrupts after receiving message to MCU transmission request processing;
(14) wireless sensor MCU reads message data in buffer area, with preset wireless data acquisition terminal key solution
It is close, then carry out data processing;
(15) external system sends data read request message by RS485 serial ports to wireless data acquisition terminal
(MODBUS agreement 03 or 01 message);
(16) data collection station serial port module is interrupted after receiving message to MCU transmission request processing;
(17) data collection station MCU reads the data cached carry out packet filtering processing in serial port module, only handles
MODBUS agreement 03 or message;
(18) data collection station MCU is requested according to reading of content, and tissue replys message and serial port module buffer area is written, and
Serial port module transmission interface is called to send data.
Using in substation of the invention based on wireless sensor realize network security control function system and method,
The characteristics of having fully considered the operation of wireless sensor micropower, systematically devises the control management of network security.It is key
Management be that the unique encodings based on MCU are automatically generated by software, and can only be read by flashburn tools, each sensor has
Independent key is not necessarily to key generator, and efficient and convenient, safety is low in cost, without additional power consumption.By the mould of correspondence with foreign country
Block is independent, and caching is placed in communication module, realizes the active process of data, effectively avoids memory flooding.It is logical with outside
Credit serial communication scheme effectively prevents the network communication interface safety of ether net mode.
In this description, the present invention is described with reference to its specific embodiment.But it is clear that can still make
Various modifications and alterations are without departing from the spirit and scope of the invention.Therefore, the description and the appended drawings should be considered as illustrative
And not restrictive.
Claims (12)
1. the system for realizing network security control function based on wireless sensor in a kind of substation, which is characterized in that described
System includes wireless sensor and wireless data acquisition terminal, and the wireless sensor and wireless data acquisition terminal are nothing
The Star Network structure of relay node, the wireless sensor are used for transmission wireless signal, and the data acquisition is whole
Hold the signal for receiving and handling wireless sensor transmission.
2. the system that network security control function is realized based on wireless sensor in substation according to claim 1,
It is characterized in that, the wireless sensor includes:
First micro-control unit, for being managed and controlling to the communication resource;
First radio receiving transmitting module is connected with first micro-control unit by Serial Peripheral Interface (SPI), for wireless
Signal is received and dispatched.
3. the system that network security control function is realized based on wireless sensor in substation according to claim 1,
It is characterized in that, the wireless data acquisition terminal includes:
Second micro-control unit, for being managed and controlling to the communication resource;
Second radio receiving transmitting module is connected with second micro-control unit by Serial Peripheral Interface (SPI), for wireless
Signal is received and dispatched;
Second serial transceiver module is connected with second micro-control unit by Serial Peripheral Interface (SPI), for passing through string
Mouth receiving and transmitting signal.
4. the system that network security control function is realized based on wireless sensor in substation according to claim 2,
It is characterized in that, first radio receiving transmitting module includes that the first wireless receiving and dispatching transmission buffer area and the first wireless receiving and dispatching receive and delay
Area is rushed, is connected with first micro-control unit.
5. the system that network security control function is realized based on wireless sensor in substation according to claim 3,
It is characterized in that, second radio receiving transmitting module includes that the second wireless receiving and dispatching transmission buffer area and the second wireless receiving and dispatching receive and delay
Area is rushed, is connected with second micro-control unit.
6. the system that network security control function is realized based on wireless sensor in substation according to claim 3,
It is characterized in that, the second serial transceiver module includes that second serial transmitting-receiving transmission buffer area and second serial transmitting-receiving receive and delay
Area is rushed, is connected with second micro-control unit.
7. the system that network security control function is realized based on wireless sensor in substation according to claim 4,
It is characterized in that, first wireless receiving and dispatching sends buffer area and the first wireless receiving and dispatching receives buffer area and is up to 64 bytes.
8. the system that network security control function is realized based on wireless sensor in substation according to claim 5,
It is characterized in that, second wireless receiving and dispatching sends buffer area and the second wireless receiving and dispatching receives buffer area and is up to 64 bytes.
9. the system that network security control function is realized based on wireless sensor in substation according to claim 5,
It is characterized in that, the second serial transmitting-receiving sends buffer area and second serial transmitting-receiving receives buffer area and is up to 255 bytes.
10. a kind of realize the network security controlling party based on wireless sensor in substation based on system described in claim 1
Method, which is characterized in that the method the following steps are included:
(1) number key and corresponding key inventory are filled under the wireless sensor and wireless data acquisition terminal described in;
(2) wireless sensor described in passes through the application data that the key pair automatically generated is received and dispatched in message and is encrypted;
(3) wireless data acquisition terminal described in obtains corresponding key according to the node serial number of wireless sensor, is reduced into reality
The application data on border;
(4) wireless data acquisition terminal described in is encrypted by its key, and the wireless sensor carries out data
Decryption.
11. the network safety control method based on wireless sensor in realization substation according to claim 10, special
Sign is, data encryption is carried out in the step (2) and step (4), specifically:
Data encryption according to the following formula:
TDATA [n]=DATA [n]+PKey [k]+CRC [r];
Wherein, TDATA [n] is using the value on n-th of byte location after data encryption, and DATA [n] is using n-th of data
Value on byte location, PKey [k] are the value on k-th of byte location of key, and k is N divided by 4 remainder, and r is N divided by 2
Remainder, CRC [r] are check code.
12. the network safety control method based on wireless sensor in realization substation according to claim 10, special
Sign is, data deciphering is carried out in the step (3) and step (4), specifically:
Data deciphering according to the following formula:
DATA [n]=TDATA [n]-PKey [k]-CRC [r];
Wherein, TDATA [n] is using the value on n-th of byte location after data encryption, and DATA [n] is using n-th of data
Value on byte location, PKey [k] are the value on k-th of byte location of key, and k is N divided by 4 remainder, and r is N divided by 2
Remainder, CRC [r] are check code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910348217.4A CN110012447A (en) | 2019-04-28 | 2019-04-28 | The system and method for network security control function is realized in substation based on wireless sensor |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910348217.4A CN110012447A (en) | 2019-04-28 | 2019-04-28 | The system and method for network security control function is realized in substation based on wireless sensor |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110012447A true CN110012447A (en) | 2019-07-12 |
Family
ID=67174711
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910348217.4A Pending CN110012447A (en) | 2019-04-28 | 2019-04-28 | The system and method for network security control function is realized in substation based on wireless sensor |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110012447A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113553362A (en) * | 2021-09-17 | 2021-10-26 | 国网浙江省电力有限公司 | Carbon energy consumption monitoring method and device based on consensus mechanism and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1595880A (en) * | 2003-09-11 | 2005-03-16 | 华为技术有限公司 | Method of information integrity protection in multicast/broadcast |
JP2012026225A (en) * | 2010-07-27 | 2012-02-09 | Panasonic Electric Works Co Ltd | Electric lock system |
CN103001944A (en) * | 2012-09-27 | 2013-03-27 | 深圳市友讯达科技发展有限公司 | Method for protecting programs in micro-power wireless information acquisition system |
CN103298157A (en) * | 2013-06-19 | 2013-09-11 | 中国地质大学(武汉) | Data safety intelligent transmission system for wireless internet of things |
US20150071139A1 (en) * | 2013-09-10 | 2015-03-12 | John A. Nix | Power Management and Security for Wireless Modules in "Machine-to-Machine" Communications |
CN105120452A (en) * | 2015-06-30 | 2015-12-02 | 小米科技有限责任公司 | Information transmission method, device and system |
WO2015193968A1 (en) * | 2014-06-17 | 2015-12-23 | 三菱電機株式会社 | Communication apparatus, wireless multi-hop network system, and frame counter setting method |
CN105915347A (en) * | 2016-04-19 | 2016-08-31 | 梅照付 | Control method for power electric wireless transmission device |
CN108737433A (en) * | 2018-05-29 | 2018-11-02 | 冼汉生 | Sensor node monitoring system based on Internet of Things and sensor node monitoring method |
-
2019
- 2019-04-28 CN CN201910348217.4A patent/CN110012447A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1595880A (en) * | 2003-09-11 | 2005-03-16 | 华为技术有限公司 | Method of information integrity protection in multicast/broadcast |
JP2012026225A (en) * | 2010-07-27 | 2012-02-09 | Panasonic Electric Works Co Ltd | Electric lock system |
CN103001944A (en) * | 2012-09-27 | 2013-03-27 | 深圳市友讯达科技发展有限公司 | Method for protecting programs in micro-power wireless information acquisition system |
CN103298157A (en) * | 2013-06-19 | 2013-09-11 | 中国地质大学(武汉) | Data safety intelligent transmission system for wireless internet of things |
US20150071139A1 (en) * | 2013-09-10 | 2015-03-12 | John A. Nix | Power Management and Security for Wireless Modules in "Machine-to-Machine" Communications |
WO2015193968A1 (en) * | 2014-06-17 | 2015-12-23 | 三菱電機株式会社 | Communication apparatus, wireless multi-hop network system, and frame counter setting method |
CN105120452A (en) * | 2015-06-30 | 2015-12-02 | 小米科技有限责任公司 | Information transmission method, device and system |
CN105915347A (en) * | 2016-04-19 | 2016-08-31 | 梅照付 | Control method for power electric wireless transmission device |
CN108737433A (en) * | 2018-05-29 | 2018-11-02 | 冼汉生 | Sensor node monitoring system based on Internet of Things and sensor node monitoring method |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113553362A (en) * | 2021-09-17 | 2021-10-26 | 国网浙江省电力有限公司 | Carbon energy consumption monitoring method and device based on consensus mechanism and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1883154B (en) | Method and apparatus of communicating security/encryption information to a physical layer transceiver | |
Wang et al. | Transmitting IPv6 packets over Bluetooth low energy based on BlueZ | |
CN109617867B (en) | Intelligent gateway system for controlling household equipment | |
CN102546477A (en) | Multifunctional gateway for distributed networked embedded system | |
CN102938696A (en) | Generating method of session key and module | |
CN108200573A (en) | A kind of LoRa wireless modules, data transmission system and data transmission method | |
Ilchev et al. | Internet-of-Things communication protocol for low-cost devices in heterogeneous wireless networks | |
CN104994061A (en) | Intelligent transformer station process layer switch MMS safety communication device and method | |
CN110012447A (en) | The system and method for network security control function is realized in substation based on wireless sensor | |
CN103297940A (en) | Short message encryption communication system and method | |
CN101388757A (en) | Network security transmission method and system | |
CN107948208A (en) | A kind of method and device of network application layer transparent encryption | |
CN113795023B (en) | Bluetooth data transmission encryption method based on chaotic sequence and packet encryption | |
CN104602208A (en) | Short message encrypted communication method based on mobile network | |
CN209462613U (en) | The system for supporting to realize the network security control in substation based on wireless sensor | |
CN107148017A (en) | Strengthen the method for wlan security based on physical layer key agreement | |
CN105228114A (en) | A kind of Encrypted short message receive-transmit system based on power failure navigation system and method | |
CN1980122A (en) | Method for increasing information transmission safety | |
CN110855801A (en) | Gateway for electric power multi-interface transmission and data transmission method | |
CN110278068A (en) | LoRa communication encryption system and its implementation based on chaos sequence | |
CN1856951B (en) | Method and apparatus of integrating link layer security into a physical layer transceiver | |
Cagalaban et al. | Scada network insecurity: Securing critical infrastructures through scada security exploitation | |
Chunqing et al. | Research of ZigBee's data security and protection | |
CN207995105U (en) | Intelligent terminal safety communication system based on data encryption and decryption | |
CN117857226B (en) | Safety communication method and system based on industrial Internet multilateral platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190712 |
|
RJ01 | Rejection of invention patent application after publication |