Low-cost Internet-of-Things security protection method and terminal equipment

An IoT network and security protection technology, applied in the field of network information security, can solve the problems of unguaranteed wireless public network transmission security, small capacity of distributed photovoltaic power plants, and network architecture security vulnerabilities.

Active Publication Date: 2021-04-20
STATE GRID JIANGSU ELECTRIC POWER CO LTD SUQIAN POWER SUPPLY BRANCH +2
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the capacity of distributed photovoltaic power plants is small, the investment ability of owners is weak, the economy of wireless private network transmission is not high, and the security of wireless public network transmission is not guaranteed. It can be seen that low-voltage distributed photovoltaic data acquisition Safety and economy cannot be balanced at the same time
Similarly, in the auxiliary monitoring system of the intelligent station, the information acquisition method is sent to the IoT platform by the intelligent power distribution gateway through the 4G (APN) method through the Ethernet, and there is no network isolation device between the station network and the 4G (APN) network , the deployment of this kind of network is extremely vulnerable to attacks from the external network, leading to information security incidents where the production network (inside the station) is attacked, and there are serious security holes in the network architecture

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Low-cost Internet-of-Things security protection method and terminal equipment
  • Low-cost Internet-of-Things security protection method and terminal equipment
  • Low-cost Internet-of-Things security protection method and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0035] An embodiment of a miniature terminal device, such as figure 1 :

[0036] Among them, the CPU chip adopts the MPC8313 chip of Freescale PowerPC architecture, the DMA chip adopts the 8237 of Intel Corporation, the Ethernet control (PHY) chip adopts the DP83640 of Texas Instruments (Texas Instruments), and the RJ45 network connector Using TE-8P8C from TE Connectivity. How they are connected is:

[0037] Two I / O interfaces (hereinafter referred to as I / O interface 1 and I / O interface 2 for short) and two TTL ports are constructed by CPU2 of the data exchange module, and these two TTL ports are referred to as TTL1 and TTL2 later. Among them, the I / O interface 1 is connected to the CPU1 of the internal processing module through the internal bus, and the I / O interface 2 is connected to the CPU3 of the external processing module to transmi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of network information security, in particular to a low-cost Internet-of-Things security protection method and terminal equipment. The system comprises an internal processing module, an external processing module and a data exchange module, wherein the internal processing module, the external processing module and the data exchange module adopt pin structures and are combined in a splicing manner, the data exchange module is located between the internal data module and the external data module, and a data exchange node is established between an internal network and an external network; the three modules are provided with independent CPUs and do not interfere with one another during operation; and the data exchange module is provided with double data channels. Terminal equipment adopts a redundant extensible splicing structure, physical isolation and software verification are combined to ensure the security of internal and external network data transmission, and meanwhile, a distributed double-blockchain encryption technology is innovatively proposed to record network security intrusion information and share the information to other nodes in the network, so that the risk that the whole network is intruded is reduced.

Description

technical field [0001] The invention relates to the field of network information security, in particular to a low-cost Internet of Things network security protection method and terminal equipment. Background technique [0002] In recent years, the State Commission has requested to strengthen the data collection of 220 / 380V distributed photovoltaic power stations, to strengthen the exploration and development of wireless private network to realize distributed photovoltaic control technology research, to achieve considerable and measurable low-voltage distributed photovoltaics, and to gradually realize low-voltage distributed photovoltaics. Controllability. However, the capacity of distributed photovoltaic power plants is small, the investment ability of owners is weak, the economy of wireless private network transmission is not high, and the security of wireless public network transmission is not guaranteed. It can be seen that low-voltage distributed photovoltaic data acquis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/64
Inventor 邱冬王秀茹徐微微陈秋平武晨晨王晗文石惠敏
Owner STATE GRID JIANGSU ELECTRIC POWER CO LTD SUQIAN POWER SUPPLY BRANCH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products