Font Size: a A A

The Research On Network Security Access Protocol For Power System Video Surveillance

Posted on:2020-11-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y F LiuFull Text:PDF
GTID:2392330602452371Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the national economy,the demand for electricity in various industries has increased rapidly,and the quality requirements for power supply have also become higher.Faced with a large number of intelligent access terminals and more complex connections.Into the environment,the security of the wireless access power information network of the long-distance transmission line online monitoring terminal is particularly important.However,for the traditional wireless access communication grid,the transmission line online monitoring terminal must transmit the data to the power enterprise control center,which must go through a complicated public network,which easily causes tampering and leakage of sensitive information,low access efficiency,and illegal connection.Incoming security risks,jeopardizing the safe and stable operation of the power system,bring huge security risks and challenges to the power information network.In order to solve the problem of request access of power information network,based on the previous research results,combined with many considerations,this paper made improvements,proposed higher performance,more secure,and can adapt to the secure access transmission scheme under complex environment.Main tasks as follows:1.Aiming at the research on the access side of the transmission line online monitoring terminal remote access to the power LTE network,the security performance of the access protocol EPS AKA is analyzed.In view of the problem that the monitoring terminal accesses the LTE network and the key is not updated,there is a risk of being attacked.This paper proposes to use the ECC public key encryption mechanism to solve the problem,thereby effectively strengthening terminal authentication and key protection,and ensuring terminal access to power.The security of the access side in the information network.2.For the transmission line online monitoring terminal to request access to the network side security research in the power information network,analyze the problem and risk of the monitoring terminal clear text login to the power control center,in order to strengthen the security,integrity and privacy of the monitoring data,this paper proposes to use The PKI public key system TLS security protocol virtual channel APN is solved.The monitoring terminal requests to access the secure login of the network side in the power information network,ensures the security of the terminal identity information,and enhances data confidentiality.3.The simulation platform for constructing the simulated power grid condition on the access side and the network side of the transmission line online monitoring terminal is requested to be connected to the online monitoring terminal of the transmission line,and the simulation attack and encryption experiment of the existing access research technology of the transmission line are pointed out.The risk of the traditional access protocol,followed by the attack test of the improved solution,and the complexity and time-consuming analysis of the improved protocol,verifying the security of the APN power virtual channel of the TLS security protocol and the E-EPS AKA connection.The stability,security and effectiveness of the authentication protocol.This paper designs a network mode in which a more secure monitoring terminal requests access to the power control center.Through simulation and simulation experiments,the safety and effectiveness of the online monitoring terminal of the transmission line requested to access the power information network are verified and realized.The security access requirements of the terminal can effectively ensure the identity and data security of the power information network.
Keywords/Search Tags:Transmission Line Online Monitoring, Secure Access, ECC, Identity Encryption, TLS Security Protocol
PDF Full Text Request
Related items