Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

GOOSE message authentication method based on transformer substation

A message authentication and substation technology, applied in the field of power system data transmission security, can solve problems such as denial of recognition

Inactive Publication Date: 2015-04-08
ELECTRIC POWER RES INST OF GUANGDONG POWER GRID +1
View PDF9 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 2) tampering
Accessing information systems and operating them, but denying the facts afterwards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • GOOSE message authentication method based on transformer substation
  • GOOSE message authentication method based on transformer substation
  • GOOSE message authentication method based on transformer substation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The main principle of the present invention: in order to realize the authentication method of GOOSE message network transmission, the format of the original message needs to be expanded. The extended GOOSE message format not only conforms to the regulations of IEC 61850-9-2, but also meets the frame structure of ISO / IEC 8802-3 and the basic coding rules of ASN.1. At the same time, use the reserved 1 and reserved 2 fields in the original GOOSE message format to supplement the authentication method and extension fields.

[0039] First of all, the extension field of the GOOSE message format consists of two parts, the first part is used for identity authentication, and the second part is used for message authentication. Among them, the content of the first part of identity authentication includes user name, password, and key information regularly updated by the key management server, and then the above three information are replaced by the DES algorithm to generate a corres...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention aims to provide a GOOSE message authentication method based on transformer substation communication. The method comprises the following steps: introducing identity authentication, message authentication and key management; adding the identity authentication, the message authentication and key information into a reserved field and an extension field in a GOOSE message for sending together with the original message to realize authentication of GOOSE message sending and receiving, wherein the field transform meets the TLV (Threshold Limit Value) transformational grammar of an ASN.1 basic coding rule, the original message and an authentication message can be compatible in an automatic communication system of the transformer substation, and an IEC 62351 standard is reached. By adopting the authentication method, hackers are prevented from taking the attack measures of illegal authentication, tampering, replay, repudiation and the like, so that the secrecy, integrity, availability and non-repudiation in a GOOSE message communication process based on the transformer substation are ensured.

Description

technical field [0001] The invention relates to the technical field of power system data transmission security, in particular to a substation-based GOOSE message authentication method, which mainly realizes authentication protection in the transmission process of GOOSE message which requires high real-time performance. Background technique [0002] Different from other industrial control systems, the communication authentication problem faced by power system operation control has certain particularity. For example, most of the current communication authentication strategies are used to prevent hacker attacks from the Internet, and the power system operation control environment is very different from the public Internet environment. If the authentication communication technology of the public Internet is copied to the power system operation control environment, it is obvious that there is a lack of a deep understanding of the communication authentication requirements of the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/06H04L63/08
Inventor 冯善强黄曙牛津文邵春梅马凯慕宗君陈炯聪王红星曹丽娟胡春潮何杰汪溢杨占杰张晓悦侯艾君段宏达
Owner ELECTRIC POWER RES INST OF GUANGDONG POWER GRID
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products