[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN115348050A - A method for transmitting abnormal data of distribution network equipment - Google Patents

A method for transmitting abnormal data of distribution network equipment Download PDF

Info

Publication number
CN115348050A
CN115348050A CN202210730978.8A CN202210730978A CN115348050A CN 115348050 A CN115348050 A CN 115348050A CN 202210730978 A CN202210730978 A CN 202210730978A CN 115348050 A CN115348050 A CN 115348050A
Authority
CN
China
Prior art keywords
data
abnormal
key
equipment
data packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210730978.8A
Other languages
Chinese (zh)
Other versions
CN115348050B (en
Inventor
郑怀华
钱伟杰
徐冬生
屠晓栋
顾曦华
周旻
崔金栋
刘维亮
怀月容
应杰耀
刘海林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiaxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Jiaxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiaxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical Jiaxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority to CN202210730978.8A priority Critical patent/CN115348050B/en
Publication of CN115348050A publication Critical patent/CN115348050A/en
Application granted granted Critical
Publication of CN115348050B publication Critical patent/CN115348050B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种配电网设备异常数据传输方法,包括以下步骤:对设备进行就地校验,判断设备是否出现异常;对异常设备进行标记,得到设备异常整合后的数据包;基于异常设备的位置信息设置第一加密密钥,通过第一加密密钥设置第二加密密钥;采用第二加密密钥对数据包进行加密;将加密后的数据包传递给远程服务器;本发明通过设置第一密钥和第二密钥,第一密钥随着异常设备数量、异常设备位置的变化而产生变化,第二密钥随着第一密钥的变化而变化,使得密钥的随机性更高,更加难以被窃取人员破解,提高数据的安全性;通过设置第一数据包和第二数据板的形式进行数据传输,即使数据被中途窃取,数据包也无法被还原,进一步提高了数据传输的安全性。

Figure 202210730978

The invention discloses a method for transmitting abnormal data of distribution network equipment. The first encryption key is set for the location information of the device, and the second encryption key is set by the first encryption key; the data packet is encrypted by the second encryption key; the encrypted data packet is transmitted to the remote server; the present invention adopts Set the first key and the second key. The first key changes with the number of abnormal devices and the location of abnormal devices. The second key changes with the change of the first key, so that the random key Higher security, more difficult to be cracked by thieves, improving data security; by setting the first data packet and the second data board for data transmission, even if the data is stolen midway, the data packet cannot be restored, further improving Security of data transmission.

Figure 202210730978

Description

一种配电网设备异常数据传输方法A method for transmitting abnormal data of distribution network equipment

技术领域technical field

本发明涉及配电网技术领域,尤其涉及一种配电网设备异常数据传输方法。The invention relates to the technical field of distribution network, in particular to a method for transmitting abnormal data of distribution network equipment.

背景技术Background technique

物联网(传感网)作为智能信息感知末端,成为推动智能电网发展的重要技术手段。物联网将信息采集、传输和处理集于一体,综合了传感器技术、嵌入式计算技术、无线通信技术以及分布式信息处理等技术,通过在监控区域部署大量传感器,通过多种通信方式所形成多跳的、自组织的网络系统,有效地感知、采集和处理网络覆盖区域中可感知的对象信息,并发送给用户终端设备做进一步处理和应用,实现了物理世界、信息世界以及行为认知的联通。The Internet of Things (Sensor Network), as the end of intelligent information perception, has become an important technical means to promote the development of smart grid. The Internet of Things integrates information collection, transmission and processing, and integrates sensor technology, embedded computing technology, wireless communication technology, and distributed information processing technologies. Jump, self-organizing network system, effectively perceive, collect and process the perceivable object information in the network coverage area, and send it to the user terminal equipment for further processing and application, realizing the integration of the physical world, information world and behavioral cognition Unicom.

而传感器往往部署在空旷无人的地带,经过长久的工作年限后,容易出现各种故障导致监测数据的不准确,而全面进行传感器的更换需要大量的时间成本和人力成本,因此,为了提高传感器采集数据的有效性以及准确性,需要对传感器本身的状态进行检测,然而,数据的传递往往容易导致信息被窃取,严重危害电网的正常运行,因此,需要对传递的检测数据进行有效保护,防止数据泄露。However, sensors are often deployed in open and uninhabited areas. After a long working life, various failures are prone to cause inaccurate monitoring data, and a comprehensive sensor replacement requires a lot of time and labor costs. Therefore, in order to improve the sensor The validity and accuracy of collected data requires the detection of the state of the sensor itself. However, the transmission of data often easily leads to information theft and seriously endangers the normal operation of the power grid. Therefore, it is necessary to effectively protect the transmitted detection data to prevent data breach.

例如,中国专利CN202110276995.4公开了一种区域配电网设备管理平台及其运行方法。通过第一对比模块将接收的设备运行节点数据与来自设备信息登记单元的对应正常数据进行比对,确定异常数据信息以及异常源位置,接着故障类型预测模块根据异常数据信息以及异常源位置确定设备的故障类型,故障等级区分模块再根据设备的故障类型确定其故障风险等级,第二对比模块将设备的故障风险等级与录入的故障风险阈值进行比对,当故障风险等级大于故障风险阈值时,将该信息通过故障风险信息传输模块输出至接收端进行报警提醒。该申请无法准确的对设备的异常进行有效监测,且对于异常数据的信息传递没有起到隐秘的保护,容易导致信息泄露。For example, Chinese patent CN202110276995.4 discloses a regional distribution network equipment management platform and its operating method. Through the first comparison module, the received equipment operation node data is compared with the corresponding normal data from the equipment information registration unit to determine the abnormal data information and the location of the abnormal source, and then the fault type prediction module determines the equipment according to the abnormal data information and the location of the abnormal source fault type, the fault level distinguishing module determines the fault risk level according to the fault type of the device, and the second comparison module compares the fault risk level of the device with the entered fault risk threshold, and when the fault risk level is greater than the fault risk threshold, The information is output to the receiving end through the failure risk information transmission module for alarm reminder. This application cannot accurately and effectively monitor the abnormality of the equipment, and does not protect the information transmission of abnormal data secretly, which may easily lead to information leakage.

发明内容Contents of the invention

本发明主要解决现有的技术中电网设备异常检测数据传递时缺乏有效保护导致信息容易泄露的问题;提供一种配电网设备异常数据传输方法,提高数据传输的安全性,防止信息外泄。The present invention mainly solves the problem that information is easily leaked due to the lack of effective protection in the transmission of abnormal detection data of power grid equipment in the prior art; it provides a transmission method for abnormal data of distribution network equipment, improves the security of data transmission, and prevents information from leaking.

本发明的上述技术问题主要是通过下述技术方案得以解决的:一种配电网设备异常数据传输方法,包括以下步骤:对设备进行就地校验,判断设备是否出现异常;对异常设备进行标记,得到设备异常整合后的数据包;基于异常设备的位置信息设置第一加密密钥,通过第一加密密钥设置第二加密密钥;采用第二加密密钥对数据包进行加密;将加密后的数据包传递给远程服务器。通过对数据包进行加密,防止传递到服务器的数据被中途截取,提高数据传输的安全性。The above-mentioned technical problems of the present invention are mainly solved by the following technical solutions: a method for transmitting abnormal data of distribution network equipment, including the following steps: performing on-site verification of the equipment to determine whether the equipment is abnormal; mark to obtain the data packet after abnormal device integration; set the first encryption key based on the location information of the abnormal device, and set the second encryption key through the first encryption key; use the second encryption key to encrypt the data packet; The encrypted data packet is passed to the remote server. By encrypting the data packets, the data transmitted to the server is prevented from being intercepted in the middle, and the security of data transmission is improved.

作为优选,所述的数据包的内容包括设备的定位信息、设备的故障类型、设备故障发生的时间、设备故障发生的时长以及故障设备采集的数据信息。数据内容包括多种信息,使得工作人员接受到传输的数据后,可以第一时间对故障设备作出反应,提高工作效率。Preferably, the content of the data packet includes location information of the device, type of fault of the device, time of occurrence of the fault of the device, duration of the occurrence of the fault of the device, and data information collected by the faulty device. The data content includes a variety of information, so that after receiving the transmitted data, the staff can respond to the faulty equipment in the first time and improve work efficiency.

作为优选,所述的第一加密密钥的生成方法为:As preferably, the generation method of the first encryption key is:

S11:根据异常设备的标记信息获取每个异常设备的坐标信息;S11: Obtain the coordinate information of each abnormal device according to the tag information of the abnormal device;

S12:获取通讯基站的坐标信息以及距离通讯基站最近的异常设备与通信基站的直线距离r;S12: Obtain the coordinate information of the communication base station and the straight-line distance r between the abnormal equipment closest to the communication base station and the communication base station;

S13:根据异常设备的数量m,以通讯基站为圆点、m×r为半径设置通讯圆;S13: According to the number m of abnormal equipment, set the communication circle with the communication base station as the dot and m×r as the radius;

S14:将通讯圆内的异常设备坐标纳入集合A,将通讯圆外的异常设备坐标纳入集合B;S14: Incorporate the coordinates of abnormal equipment within the communication circle into set A, and include the coordinates of abnormal equipment outside the communication circle into set B;

S15:若集合A内的元素数量N大于集合B内的元素数量M,则将N转换为二进制后作为第一加密密钥,否则,将M转换为二进制后作为第一加密密钥。异常设备的数量发生改变时亦或是异常设备的距离发生改变时,都是导致第一密钥发生改变,使得密钥的安全程度更高。S15: If the number N of elements in set A is greater than the number M of elements in set B, convert N into binary and use it as the first encryption key; otherwise, convert M into binary and use it as the first encryption key. When the number of abnormal devices changes or the distance of the abnormal devices changes, the first key will be changed, so that the security of the key is higher.

作为优选,所述的第二密钥的生成方法为:Preferably, the method for generating the second key is:

S21:获取第一加密密钥中“1”的个数,记为H;S21: Obtain the number of "1"s in the first encryption key, denoted as H;

S22:采用RSA算法生成第二密钥。第二密钥随着第一密钥的改变而发生变化,提高密钥的随机性,使得密钥的硕源更难,安全程度更高。S22: Generate a second key by using the RSA algorithm. The second key changes with the change of the first key, which improves the randomness of the key, makes the source of the key more difficult, and has a higher degree of security.

作为优选,对设备进行就地校验的方法包括:Preferably, the method for in-situ verification of equipment includes:

S31:在时间T内获取相同类型的设备的采集项目Y,构建T×Y的关系矩阵;S31: Obtain the collection item Y of the same type of equipment within the time T, and construct a T×Y relationship matrix;

S32:获取当前检测设备的数据信息,基于时间窗口函数划分检测区间,对检测区间内的数据信息与关系矩阵对应的元素进行对比,若超出阈值范围,则标记为异常设备,否则为正常设备。S32: Obtain the data information of the current detection device, divide the detection interval based on the time window function, compare the data information in the detection interval with the elements corresponding to the relationship matrix, and if it exceeds the threshold range, mark it as an abnormal device, otherwise it is a normal device.

作为优选,还包括内网基站,所述数据包采用分包发送的方式传递给内网基站后,内网基站将数据包验证并重新整合后通过局域网将数据包发送给远程服务器。Preferably, it also includes an intranet base station, and after the data packet is transmitted to the intranet base station by sub-packaging, the intranet base station verifies and reintegrates the data packet and then sends the data packet to the remote server through the local area network.

作为优选,数据包分包的方法包括:内网基站传递远程服务器的数据传输指令并同时下发分包指令,分包指令携带分包密钥G,G为一串二进制码,根据二进制码中“1”的数量对数据包进行拆分处理,形成若干个第一数据包;数据发送方根据二进制码中“0”的数量进行第二数据包补充,将第一数据包和第二数据包根据二进制码的顺序进行先后发送;内网基站获取所有的第一数据包和第二数据包,根据密钥G进行第二数据包剔除后得到完整的数据包。通过设置第一数据包和第二数据板的形式进行数据传输,即使数据被中途窃取,数据包也无法被还原,进一步提高了数据传输的安全性。As a preference, the method of data packet subcontracting includes: the intranet base station transfers the data transmission instruction of the remote server and simultaneously issues the subpackage instruction, the subpackage instruction carries the subpackage key G, G is a string of binary codes, according to the binary code The number of "1" splits the data packet to form several first data packets; the data sender supplements the second data packet according to the number of "0" in the binary code, and combines the first data packet and the second data packet Send sequentially according to the order of the binary codes; the intranet base station obtains all the first data packets and the second data packets, and removes the second data packets according to the key G to obtain the complete data packets. By setting the first data packet and the second data board for data transmission, even if the data is stolen midway, the data packet cannot be restored, further improving the security of data transmission.

本发明的有益效果是:(1)通过设置第一密钥和第二密钥,第一密钥随着异常设备数量、异常设备位置的变化而产生变化,第二密钥随着第一密钥的变化而变化,使得密钥的随机性更高,更加难以被窃取人员破解,提高数据的安全性;(2)通过设置内网基站,将数据传输从外网传递转换为内部局域网传递,提高私密性和安全性;(3)通过设置第一数据包和第二数据板的形式进行数据传输,即使数据被中途窃取,数据包也无法被还原,进一步提高了数据传输的安全性。The beneficial effects of the present invention are: (1) By setting the first key and the second key, the first key changes with the number of abnormal equipment and the position of the abnormal equipment, and the second key changes with the change of the first key The change of the key makes the key more random, more difficult to be cracked by the thief, and improves the security of the data; (2) By setting the intranet base station, the data transmission is converted from the external network transmission to the internal LAN transmission, Improve privacy and security; (3) By setting the first data packet and the second data board for data transmission, even if the data is stolen midway, the data packet cannot be restored, further improving the security of data transmission.

附图说明Description of drawings

图1是本发明实施例的数据传输方法的流程示意图。FIG. 1 is a schematic flowchart of a data transmission method according to an embodiment of the present invention.

具体实施方式Detailed ways

以下通过特定的具体实例说明本发明的实施方式,本领域技术人员可由本说明书所揭露的内容轻易地了解本发明的其他优点与功效。本发明还可以通过另外不同的具体实施方式加以实施或应用,本说明书中的各项细节也可以基于不同观点与应用,在没有背离本发明的精神下进行各种修饰或改变。需说明的是,在不冲突的情况下,以下实施例及实施例中的特征可以相互组合。Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that, in the case of no conflict, the following embodiments and features in the embodiments can be combined with each other.

为了使本发明的目的、技术方案及优点更加清楚明白,通过下述实施例并结合附图,对本发明实施例中的技术方案进一步详细说明。应当理解,此处所描述的具体实施例仅用以解释本发明,并不用于限定发明。In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention are further described in detail through the following embodiments in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the invention.

实施例:一种配电网设备异常数据传输方法,如图1所示,包括以下步骤:Embodiment: a method for transmitting abnormal data of distribution network equipment, as shown in FIG. 1 , comprising the following steps:

S1:对设备进行就地校验,判断设备是否出现异常;对设备进行就地校验的方法包括:S1: Perform on-site verification of the equipment to determine whether there is any abnormality in the equipment; methods for on-site verification of the equipment include:

S31:在时间T内获取相同类型的设备的采集项目Y,构建T×Y的关系矩阵;S31: Obtain the collection item Y of the same type of equipment within the time T, and construct a T×Y relationship matrix;

S32:获取当前检测设备的数据信息,基于时间窗口函数划分检测区间,对检测区间内的数据信息与关系矩阵对应的元素进行对比,若超出阈值范围,则标记为异常设备,否则为正常设备。S32: Obtain the data information of the current detection device, divide the detection interval based on the time window function, compare the data information in the detection interval with the elements corresponding to the relationship matrix, and if it exceeds the threshold range, mark it as an abnormal device, otherwise it is a normal device.

S2:对异常设备进行标记,得到设备异常整合后的数据包;数据包的内容包括设备的定位信息、设备的故障类型、设备故障发生的时间、设备故障发生的时长以及故障设备采集的数据信息。S2: Mark the abnormal equipment to obtain the data package after abnormal equipment integration; the content of the data package includes the location information of the equipment, the type of equipment failure, the time of equipment failure, the duration of equipment failure and the data information collected by the failure equipment .

S3:基于异常设备的位置信息设置第一加密密钥,通过第一加密密钥设置第二加密密钥;第一加密密钥的生成方法为:S3: Set the first encryption key based on the location information of the abnormal device, and set the second encryption key through the first encryption key; the generation method of the first encryption key is:

S11:根据异常设备的标记信息获取每个异常设备的坐标信息;S11: Obtain the coordinate information of each abnormal device according to the tag information of the abnormal device;

S12:获取通讯基站的坐标信息以及距离通讯基站最近的异常设备与通信基站的直线距离r;S12: Obtain the coordinate information of the communication base station and the straight-line distance r between the abnormal equipment closest to the communication base station and the communication base station;

S13:根据异常设备的数量m,以通讯基站为圆点、m×r为半径设置通讯圆;S13: According to the number m of abnormal equipment, set the communication circle with the communication base station as the dot and m×r as the radius;

S14:将通讯圆内的异常设备坐标纳入集合A,将通讯圆外的异常设备坐标纳入集合B;S14: Incorporate the coordinates of abnormal equipment within the communication circle into set A, and include the coordinates of abnormal equipment outside the communication circle into set B;

S15:若集合A内的元素数量N大于集合B内的元素数量M,则将N转换为二进制后作为第一加密密钥,否则,将M转换为二进制后作为第一加密密钥。S15: If the number N of elements in set A is greater than the number M of elements in set B, convert N into binary and use it as the first encryption key; otherwise, convert M into binary and use it as the first encryption key.

第二密钥的生成方法为:The method for generating the second key is:

S21:获取第一加密密钥中“1”的个数,记为H;S21: Obtain the number of "1"s in the first encryption key, denoted as H;

S22:采用RSA算法生成第二密钥。S22: Generate a second key by using the RSA algorithm.

S4:采用第二加密密钥对数据包进行加密;采用第二密钥进行加密时,同时在数据包内加入密钥封包的时间戳,方便后续解密时可以方便的通过时间戳了解数据包的信息,以及在后续查找数据包时方便数据包的查找。S4: Use the second encryption key to encrypt the data packet; when using the second key to encrypt, add the time stamp of the key packet to the data packet at the same time, so that you can easily know the time stamp of the data packet during subsequent decryption Information, and facilitate the search of data packets when searching for data packets subsequently.

S5:将加密后的数据包传递给远程服务器;在通讯基站与远程服务器之间设置内网基站,数据包采用分包发送的方式传递给内网基站后,内网基站将数据包验证并重新整合后通过局域网将数据包发送给远程服务器,数据包分包的方法包括:内网基站传递远程服务器的数据传输指令并同时下发分包指令,分包指令携带分包密钥G,G为一串二进制码,根据二进制码中“1”的数量对数据包进行拆分处理,形成若干个第一数据包;数据发送方根据二进制码中“0”的数量进行第二数据包补充,将第一数据包和第二数据包根据二进制码的顺序进行先后发送;内网基站获取所有的第一数据包和第二数据包,根据密钥G进行第二数据包剔除后得到完整的数据包。S5: Pass the encrypted data packet to the remote server; set up an intranet base station between the communication base station and the remote server, and after the data packet is transmitted to the intranet base station by sub-packaging, the intranet base station will verify the data packet and re- After the integration, the data packet is sent to the remote server through the local area network. The method of data packet subcontracting includes: the intranet base station transmits the data transmission command of the remote server and at the same time issues the subpackage command. The subpackage command carries the subpackage key G, and G is A string of binary codes, splitting the data packets according to the number of "1" in the binary code to form several first data packets; the data sender supplements the second data packet according to the number of "0" in the binary code, and the The first data packet and the second data packet are sent successively according to the order of the binary code; the intranet base station obtains all the first data packet and the second data packet, and removes the second data packet according to the key G to obtain a complete data packet .

设备的校验可以在集中器或设备网关处进行校验,校验后,设备网关记录设备的异常情况并标记,每个设备网关传递异常设备的数据时,通过正常的采集数据的周期间隙进行传递,例如,常规状态下的设备网关5S一个周期传递一次传感器的采集数据,那么在传递的间隙内进行异常设备的数据可以不占用常规的通讯,在不妨碍常规数据传递的情况下传递数据,使得数据的传递更加快速,防止出现信道堵塞的情况。The verification of the device can be performed at the concentrator or the device gateway. After the verification, the device gateway will record and mark the abnormal situation of the device. When each device gateway transmits the data of the abnormal device, it will be carried out through the normal cycle interval of collecting data. Transmission, for example, the equipment gateway 5S in the normal state transmits the collected data of the sensor once a cycle, then the data of the abnormal equipment can be transmitted during the transmission gap without occupying the normal communication, and the data can be transmitted without hindering the normal data transmission. It makes the data transfer faster and prevents channel congestion.

本发明通过设置第一密钥和第二密钥,第一密钥随着异常设备数量、异常设备位置的变化而产生变化,第二密钥随着第一密钥的变化而变化,使得密钥的随机性更高,更加难以被窃取人员破解,提高数据的安全性;通过设置内网基站,将数据传输从外网传递转换为内部局域网传递,提高私密性和安全性;通过设置第一数据包和第二数据板的形式进行数据传输,即使数据被中途窃取,数据包也无法被还原,进一步提高了数据传输的安全性。The present invention sets the first key and the second key, the first key changes with the number of abnormal equipment and the position of the abnormal equipment, and the second key changes with the change of the first key, so that the encryption The randomness of the key is higher, it is more difficult to be cracked by the thief, and the security of the data is improved; by setting the intranet base station, the data transmission is converted from the external network transmission to the internal LAN transmission, and the privacy and security are improved; by setting the first Data transmission is carried out in the form of data packets and the second data board, even if the data is stolen midway, the data packets cannot be restored, further improving the security of data transmission.

以上所述的实施例只是本发明的一种较佳的方案,并非对本发明作任何形式上的限制,在不超出权利要求所记载的技术方案的前提下还有其它的变体及改型。The embodiment described above is only a preferred solution of the present invention, and does not limit the present invention in any form. There are other variations and modifications on the premise of not exceeding the technical solution described in the claims.

Claims (7)

1.一种配电网设备异常数据传输方法,其特征在于,包括以下步骤:1. A method for transmitting abnormal data of distribution network equipment, comprising the following steps: 对设备进行就地校验,判断设备是否出现异常;Perform on-site verification of the equipment to determine whether there is any abnormality in the equipment; 对异常设备进行标记,得到设备异常整合后的数据包;Mark the abnormal equipment and get the data package after abnormal equipment integration; 基于异常设备的位置信息设置第一加密密钥,通过第一加密密钥设置第二加密密钥;setting a first encryption key based on the location information of the abnormal device, and setting a second encryption key through the first encryption key; 采用第二加密密钥对数据包进行加密;Encrypting the data packet with a second encryption key; 将加密后的数据包传递给远程服务器。Pass the encrypted data packet to the remote server. 2.根据权利要求1所述的一种配电网设备异常数据传输方法,其特征在于,2. A method for transmitting abnormal data of distribution network equipment according to claim 1, wherein: 所述数据包的内容包括设备的定位信息、设备的故障类型、设备故障发生的时间、设备故障发生的时长以及故障设备采集的数据信息。The content of the data packet includes the location information of the device, the fault type of the device, the time when the fault occurred, the duration of the fault, and the data information collected by the faulty device. 3.根据权利要求1所述的一种配电网设备异常数据传输方法,其特征在于,3. A method for transmitting abnormal data of distribution network equipment according to claim 1, wherein: 所述第一加密密钥的生成方法为:The method for generating the first encryption key is: S11:根据异常设备的标记信息获取每个异常设备的坐标信息;S11: Obtain the coordinate information of each abnormal device according to the tag information of the abnormal device; S12:获取通讯基站的坐标信息以及距离通讯基站最近的异常设备与通信基站的直线距离r;S12: Obtain the coordinate information of the communication base station and the straight-line distance r between the abnormal equipment closest to the communication base station and the communication base station; S13:根据异常设备的数量m,以通讯基站为圆点、m×r为半径设置通讯圆;S13: According to the number m of abnormal equipment, set the communication circle with the communication base station as the dot and m×r as the radius; S14:将通讯圆内的异常设备坐标纳入集合A,将通讯圆外的异常设备坐标纳入集合B;S14: Incorporate the coordinates of abnormal equipment within the communication circle into set A, and include the coordinates of abnormal equipment outside the communication circle into set B; S15:若集合A内的元素数量N大于集合B内的元素数量M,则将N转换为二进制后作为第一加密密钥,否则,将M转换为二进制后作为第一加密密钥。S15: If the number N of elements in set A is greater than the number M of elements in set B, convert N into binary and use it as the first encryption key; otherwise, convert M into binary and use it as the first encryption key. 4.根据权利要求1所述的一种配电网设备异常数据传输方法,其特征在于,4. A method for transmitting abnormal data of distribution network equipment according to claim 1, wherein: 所述第二密钥的生成方法为:The method for generating the second key is: S21:获取第一加密密钥中“1”的个数,记为H;S21: Obtain the number of "1"s in the first encryption key, denoted as H; S22:采用RSA算法生成第二密钥。S22: Generate a second key by using the RSA algorithm. 5.根据权利要求1或2或3所述的一种配电网设备异常数据传输方法,其特征在于,5. A method for transmitting abnormal data of distribution network equipment according to claim 1, 2 or 3, wherein: 对设备进行就地校验的方法包括:Methods for in-situ verification of equipment include: S31:在时间T内获取相同类型的设备的采集项目Y,构建T×Y的关系矩阵;S31: Obtain the collection item Y of the same type of equipment within the time T, and construct a T×Y relationship matrix; S32:获取当前检测设备的数据信息,基于时间窗口函数划分检测区间,对检测区间内的数据信息与关系矩阵对应的元素进行对比,若超出阈值范围,则标记为异常设备,否则为正常设备。S32: Obtain the data information of the current detection device, divide the detection interval based on the time window function, compare the data information in the detection interval with the elements corresponding to the relationship matrix, and if it exceeds the threshold range, mark it as an abnormal device, otherwise it is a normal device. 6.根据权利要求1所述的一种配电网设备异常数据传输方法,其特征在于,6. A method for transmitting abnormal data of distribution network equipment according to claim 1, wherein: 还包括内网基站,所述数据包采用分包发送的方式传递给内网基站后,内网基站将数据包验证并重新整合后通过局域网将数据包发送给远程服务器。It also includes an intranet base station. After the data packet is transmitted to the intranet base station by sub-packaging, the intranet base station verifies and reintegrates the data packet and then sends the data packet to the remote server through the local area network. 7.根据权利要求6所述的一种配电网设备异常数据传输方法,其特征在于,7. A method for transmitting abnormal data of distribution network equipment according to claim 6, characterized in that, 数据包分包的方法包括:内网基站传递远程服务器的数据传输指令并同时下发分包指令,分包指令携带分包密钥G,G为一串二进制码,根据二进制码中“1”的数量对数据包进行拆分处理,形成若干个第一数据包;数据发送方根据二进制码中“0”的数量进行第二数据包补充,将第一数据包和第二数据包根据二进制码的顺序进行先后发送;内网基站获取所有的第一数据包和第二数据包,根据密钥G进行第二数据包剔除后得到完整的数据包。The method of data packet subcontracting includes: the intranet base station transmits the data transmission command of the remote server and simultaneously issues the subpackage command. The subpackage command carries the subpackage key G, and G is a string of binary codes. According to the "1" in the binary code The number of data packets is split and processed to form several first data packets; the data sender supplements the second data packet according to the number of "0" in the binary code, and the first data packet and the second data packet according to the binary code The sequence is sent successively; the intranet base station obtains all the first data packets and the second data packets, and removes the second data packets according to the key G to obtain the complete data packets.
CN202210730978.8A 2022-06-24 2022-06-24 Abnormal data transmission method for power distribution network equipment Active CN115348050B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210730978.8A CN115348050B (en) 2022-06-24 2022-06-24 Abnormal data transmission method for power distribution network equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210730978.8A CN115348050B (en) 2022-06-24 2022-06-24 Abnormal data transmission method for power distribution network equipment

Publications (2)

Publication Number Publication Date
CN115348050A true CN115348050A (en) 2022-11-15
CN115348050B CN115348050B (en) 2024-08-23

Family

ID=83948014

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210730978.8A Active CN115348050B (en) 2022-06-24 2022-06-24 Abnormal data transmission method for power distribution network equipment

Country Status (1)

Country Link
CN (1) CN115348050B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020075801A1 (en) * 2018-10-11 2020-04-16 日本電信電話株式会社 Information processing device, abnormality analyzing method, and program
WO2020237868A1 (en) * 2019-05-24 2020-12-03 平安科技(深圳)有限公司 Data transmission method, electronic device, server and storage medium
CN112702318A (en) * 2020-12-09 2021-04-23 江苏通付盾信息安全技术有限公司 Communication encryption method, decryption method, client and server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020075801A1 (en) * 2018-10-11 2020-04-16 日本電信電話株式会社 Information processing device, abnormality analyzing method, and program
WO2020237868A1 (en) * 2019-05-24 2020-12-03 平安科技(深圳)有限公司 Data transmission method, electronic device, server and storage medium
CN112702318A (en) * 2020-12-09 2021-04-23 江苏通付盾信息安全技术有限公司 Communication encryption method, decryption method, client and server

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
应杰耀等: "基于物联网技术的智能电网数据安全问题研究进展", 《电子科技》, 23 May 2022 (2022-05-23) *

Also Published As

Publication number Publication date
CN115348050B (en) 2024-08-23

Similar Documents

Publication Publication Date Title
CN106789015B (en) Intelligent power distribution network communication safety system
CN108566436B (en) Distributed power equipment information acquisition system and method based on block chain
CN103209072A (en) MACsec (Multi-Access Computer security) key updating method and equipment
CN108306896B (en) A substation status monitoring system and method with data protection function
AU2020104272A4 (en) Blockchain-based industrial internet data security monitoring method and system
CN106612505A (en) Wireless sensor safety communication and anti-leakage positioning method based on region division
CN115225339A (en) A method and system for secure access and data transmission of sensing terminal of power transmission Internet of things
CN110300114A (en) A kind of synthesis Design of meteorological data collection based on NB-IoT communication
CN110138731B (en) Network anti-attack method based on big data
CN114331759A (en) A kind of gas supervision system and supervision method
CN106850669B (en) Message security transmission method for Internet of things monitoring system
CN113315778B (en) Double-encryption information security transmission method applied to hidden danger positioning
CN104994085B (en) Identity identifying method and system in a kind of wireless sensor network
CN113660216B (en) Password attack detection method, device, electronic device and storage medium
CN104579684B (en) A kind of SM2 checking algorithms suitable for distribution network data
CN115348050B (en) Abnormal data transmission method for power distribution network equipment
CN117749371B (en) Acquisition terminal, load management center and quantum security load management system
CN117318295B (en) Comprehensive data sensing system and method for power distribution network
CN111934437A (en) Active power distribution network big data transmission method based on behavior mark and lightweight encryption
CN103401682A (en) Method and equipment for processing cipher suite
CN117557173A (en) Order processing method and system based on take-out dispatch
CN116866901A (en) Wireless sensor network data transmission method and system based on cryptographic algorithm
CN115694871A (en) Safe transmission method for power distribution network state data
CN105262755B (en) The Internet of things node secure storage method of data for preventing sensitive information from leaking
Barbareschi et al. Enforcing Mutual Authentication and Confidentiality in Wireless Sensor Networks Using Physically Unclonable Functions: A Case Study

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant