| Under the development trend of the gradual and deep integration of the distribution network and the Internet of Things,more and more Io T devices are connected to the distribution network,and the method of wireless is widely used because of its easy expansion and low cost.However,wireless communication is exposed.It is easy to be monitored and invaded in the air.At present,the distribution network lacks reasonable security measures in wireless communication to protect the sensitive data transmission of distribution network equipment.In response to this problem,this paper proposes the use of 5G-AKA(Authentication and Key Agreement)protocol as a security enhancement protocol for wireless access of distribution network equipment.It can not only complete the two-way identity authentication between the device and the access network,but also allocate the key used for encryption in wireless communication.The main work of this paper includes the following three points:(1)Taking the IEC61850 message as an example,a wireless secure transmission frame structure encrypted on the wireless data link is designed for the distribution network message,which ensures the secure transmission of power service data and control signaling data on the wireless channel for distribution network equipment.In the design,not only the corresponding communication overhead is considered,but also the existing Qo S(Quality of serve,quality of service)flow identifier is adapted to realize the priority division of different services in wireless communication.(2)The introduction of the 5G-AKA protocol as a security enhancement method for wireless communication in the distribution network makes up for the security gap in the wireless access of the distribution network equipment from three aspects: authentication initiation,authentication execution,and handling of authentication result.The two-way authentication,multiple encryption,and identity hiding features of the protocol enhance the security of the distribution network in wireless access.Finally,the hierarchical structure and derivation of protocol-related keys,as well as distribution and storage are analyzed.(3)The linux virtual machine in the VMware software establishes a simulated 5G core network,and uses the wireshark software to capture the packets between the network elements to verify the realization of the two-way authentication between the distribution network terminal and the access network in the 5G-AKA protocol,as well as the concealment of identities and the derivation of associated keys. |