Font Size: a A A

Design And Implementation Of Security Communication Protocol In Distribution Services

Posted on:2019-09-30Degree:MasterType:Thesis
Country:ChinaCandidate:Y L MinFull Text:PDF
GTID:2382330548469966Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the gradual deepening of information technology in distribution network engineering,the problem of information security is gradually highlighted.Currently,the distribution terminal and the distribution network data interaction based on SM2 algorithm-based one-way authentication technology,and most of the data exchange in a clear manner.Therefore,how to ensure the safety of data exchange between distribution terminal equipment and distribution network has become an urgent problem to be solved in the process of distribution network construction.To realize the interaction between distribution terminal and distribution network security data,two problems need to be solved:one is the security of distribution terminal itself;the other is the security of data communication channel.The terminal itself guarantees the security of the access source,and the data communication channel ensures the confidentiality and integrity of the data communication data.In this paper,the distribution business as a guideline,in the data channel information security proposed a set of network security protection based on the program distribution security communication protocol.In the secure communication protocol to solve the data communication channel security protection from three aspects,based on the SM2 ECDH key exchange protocol for both communication parties to obtain a shared key on the insecure channel;PKI-based bi-directional identity authentication technology to resist the close And key exchange protocol may exist in the man-in-the-middle attack;and a distribution for business commonly used IEC101,IEC04 security communications protocol design includes information security message design and secure communication flow design to ensure that the distribution network data from Confidentiality and integrity of the interaction between the power distribution terminal and the distribution terminal.In addition,the realization of the communication protocol of distribution security is analyzed.The methods and contents of the implementation of the security communication protocol are described on the power distribution master side,distribution security gateway side and power distribution terminal side.
Keywords/Search Tags:Power Distribution Security, Key Exchange, Identity Authentication, Secure Communication Protocol
PDF Full Text Request
Related items