首页 | 本学科首页   官方微博 | 高级检索  
     

适用于电力物联网的安全接入认证装置设计
引用本文:梁晓兵,岑炜,付义伦,翟峰,曹永峰,孙晋凯. 适用于电力物联网的安全接入认证装置设计[J]. 科学技术与工程, 2021, 21(31): 13374-13380
作者姓名:梁晓兵  岑炜  付义伦  翟峰  曹永峰  孙晋凯
作者单位:中国电力科学研究院有限公司, 北京100192;国网山西省电力公司营销服务中心,太原030000
基金项目:创新研究群体科学基金:国家电网公司科技项目(基于统一密码基础设施的客户侧终端密码应用关键技术研究:5700-202055171A-0-0-00)
摘    要:针对电力物联网海量边缘侧设备接入可能导致的安全问题,首先分析了边缘设备安全接入需求;然后研究了融合协议过滤、协议适配、网络安全隔离、安全接入认证技术于一体的物联网边缘侧安全接入认证技术。基于上述技术,设计了包含外网处理单元、隔离交换单元、系统管理单元、密码运算单元和内网处理单元在内的电力物联网安全接入认证装置;最后选取某省充电桩运营系统作为试点应用场景,分别从安全性能和通信性能两方面进行测试分析。测试结果表明,该安全接入认证装置能够在基本不影响设备通信性能的前提下,实现电力物联网海量设备的安全接入认证,在面对不同类型边缘设备接入时仍具有良好的可靠性和泛化性,可有效降低核心业务系统被非法入侵的风险。

关 键 词:电力物联网  边缘设备  协议适配  网络隔离  接入认证
收稿时间:2021-02-25
修稿时间:2021-08-24

Design of a Secure Access Authentication Device Applied to Power Internet of Things
Liang Xiaobing,Cen Wei,Fu Yilun,Zhai Feng,Cao Yongfeng,Sun Jingkai. Design of a Secure Access Authentication Device Applied to Power Internet of Things[J]. Science Technology and Engineering, 2021, 21(31): 13374-13380
Authors:Liang Xiaobing  Cen Wei  Fu Yilun  Zhai Feng  Cao Yongfeng  Sun Jingkai
Affiliation:China Electric Power Research Institute; State Grid Shanxi Marketing Service Center
Abstract:For the security access problem of the massive edge devices in the power Internet of Things, the secure access authentication technology for edge devices in power Internet of Things was researched, which set such mechanisms as protocol filtering, protocol adaptation, network isolation, access authentication in an organic whole. Based on above technology, a secure access authentication device applied to the power Internet of Things was designed, which included external network processing unit, isolation exchange unit, system management unit, cipher operation unit and internal network processing unit. Then the pilot application and performance test analysis for the devices was carried out. The test results show that the secure access authentication device can realize the secure access authentication for massive devices in the power Internet of Things under the premise of basically not affecting the communication performance of the devices. It still has good reliability and generalization when facing the access of different types of edge devices, and can effectively reduce the risk of the core business system being illegally invaded.
Keywords:power Internet of Things   edge device   protocol adaptation   network isolation   access authentication
本文献已被 万方数据 等数据库收录!
点击此处可从《科学技术与工程》浏览原始摘要信息
点击此处可从《科学技术与工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号