CN114845298A - Aerial optical cable monitoring and transmitting system based on trusted WLAN - Google Patents

Aerial optical cable monitoring and transmitting system based on trusted WLAN Download PDF

Info

Publication number
CN114845298A
CN114845298A CN202210318769.2A CN202210318769A CN114845298A CN 114845298 A CN114845298 A CN 114845298A CN 202210318769 A CN202210318769 A CN 202210318769A CN 114845298 A CN114845298 A CN 114845298A
Authority
CN
China
Prior art keywords
optical cable
cable monitoring
information
monitoring terminal
digital certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210318769.2A
Other languages
Chinese (zh)
Other versions
CN114845298B (en
Inventor
张�浩
张勇
李彦
齐一飞
荣俊兴
胡敬财
张鹏
李菁竹
隋敬麒
张华�
张莞钰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Huachentel Information Technology Co ltd
State Grid Corp of China SGCC
Economic and Technological Research Institute of State Grid Shandong Electric Power Co Ltd
Original Assignee
Shandong Huachentel Information Technology Co ltd
State Grid Corp of China SGCC
Economic and Technological Research Institute of State Grid Shandong Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Huachentel Information Technology Co ltd, State Grid Corp of China SGCC, Economic and Technological Research Institute of State Grid Shandong Electric Power Co Ltd filed Critical Shandong Huachentel Information Technology Co ltd
Priority to CN202210318769.2A priority Critical patent/CN114845298B/en
Publication of CN114845298A publication Critical patent/CN114845298A/en
Application granted granted Critical
Publication of CN114845298B publication Critical patent/CN114845298B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00002Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by monitoring
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00006Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment
    • H02J13/00016Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment using a wired telecommunication network or a data transmission bus
    • H02J13/00017Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment using a wired telecommunication network or a data transmission bus using optical fiber
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00006Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment
    • H02J13/00022Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment using wireless data transmission
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J7/00Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
    • H02J7/34Parallel operation in networks using both storage and other dc sources, e.g. providing buffering
    • H02J7/35Parallel operation in networks using both storage and other dc sources, e.g. providing buffering with light sensitive cells
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q9/00Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2209/00Arrangements in telecontrol or telemetry systems
    • H04Q2209/40Arrangements in telecontrol or telemetry systems using a wireless architecture

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention provides an aerial optical cable monitoring and transmitting system based on a trusted WLAN, which comprises: the optical cable connector box is used for receiving optical cable monitoring information of the optical cable monitoring terminal after sequentially passing through first security certification and second security certification and forwarding the optical cable monitoring information of the received optical cable monitoring terminal to the background server; the first safety certification is hardware safety starting certification of the optical cable joint box based on the internal encryption module, the second safety certification is ternary equal bidirectional certification performed among the optical cable joint box, the optical cable monitoring terminal and the background server, and safety of data transmission between the aerial optical cable power monitoring terminal and the background monitoring center is effectively improved.

Description

Aerial optical cable monitoring and transmitting system based on trusted WLAN
Technical Field
The invention relates to the field of aerial optical cables in the power industry, in particular to an aerial optical cable monitoring and transmitting system based on a trusted WLAN.
Background
With the high-speed development of national economy, the demand of various industries on electric power is increasingly large, and the requirements on the quality (stability, non-continuity and accompanying services) of the electric power supply provided by power supply departments are also increasingly high, so that the operation safety of the power grid of a long-distance high-voltage transmission line is particularly important. The system is characterized in that geological disasters, tower inclination, hardware aging, line icing, windage yaw vibration and other states need to be monitored, the service totality presents the characteristics of large bandwidth, mobility and large connection, various terminals and sensors in the novel energy Internet construction process are increased in an explosive manner, the cable or optical cable and other wired communication modes are adopted, the installation and maintenance workload is large, the wiring mode is complicated, the hidden line danger is large, the integration degree and the intelligence degree are low, the signal coverage is difficult, the manual inspection is difficult, and the development requirement of a power grid cannot be met.
In the prior art, the original wireless access mode of the local area network at the tail end of the power grid equipment is a WiFi binary access architecture based on WPA2-PSK, and the security risk caused by password leakage or low password strength has potential safety hazards, so that the security of data transmission between the aerial optical cable power monitoring terminal and the background monitoring center is not improved.
Disclosure of Invention
The invention aims to solve the problems in the prior art, innovatively provides an aerial optical cable monitoring and transmitting system based on a trusted WLAN, effectively solves the problem of low safety of data transmission between an aerial optical cable power monitoring terminal and a background monitoring center in the prior art, and effectively improves the safety of data transmission between the aerial optical cable power monitoring terminal and the background monitoring center.
The invention provides an aerial optical cable monitoring and transmitting system based on a trusted WLAN, which comprises: the optical cable connector box is internally provided with a trusted WLAN wireless module and an encryption module and is respectively in communication connection with the optical cable monitoring terminal and the background server through the trusted WLAN wireless module, receives optical cable monitoring information of the optical cable monitoring terminal after sequentially passing through first security certification and second security certification and forwards the optical cable monitoring information of the received optical cable monitoring terminal to the background server; the first safety certification is hardware safety starting certification of the optical cable joint box based on the internal encryption module, and the second safety certification is ternary equal bidirectional certification performed among the optical cable joint box, the optical cable monitoring terminal and the background server.
Optionally, the hardware security starting certification of the optical cable joint box based on the internal encryption module specifically includes:
the controller in the optical cable joint box respectively acquires the current equipment first attribute information of the optical cable joint box and the trusted WLAN wireless module, generates a trust root and a digital signature based on the current equipment first attribute information of the optical cable joint box and the trusted WLAN wireless module, compares the generated trust root and the generated digital signature with the trust root and the digital signature stored in the encryption module in advance, and performs safe starting on the optical cable joint box and the trusted WLAN wireless module after the comparison and verification are passed.
Further, the current device first attribute information includes ID information of the current device and/or a product serial number of the current device.
Optionally, the ternary peer-to-peer bidirectional authentication performed among the optical cable joint box, the optical cable monitoring terminal, and the background server specifically includes:
the optical cable joint box sends a first digital certificate generated according to second attribute information and third attribute information of self equipment to the optical cable monitoring terminal;
acquiring a second digital certificate generated by the optical cable monitoring terminal according to second attribute information and third attribute information of the optical cable monitoring terminal, first public key information generated by a first digital certificate and a second digital certificate of an optical cable joint box, access request time information of the optical cable monitoring terminal and second public key information generated by first attribute information of optical cable monitoring terminal equipment, and sending the second digital certificate and the first public key information to a background server for verification;
and acquiring the verification results of the background server on the first digital certificate, the second digital certificate, the first public key information and the second public key information, sending the verification results to the optical cable monitoring terminal, and after the verification is passed, carrying out data transmission among the optical cable joint box, the optical cable monitoring terminal and the background server.
Further, the second attribute information of the device is MAC address information of the device, and the third attribute information of the device is an IP address of the device.
Optionally, the verifying, by the background server, the first digital certificate, the second digital certificate, the first public key information, and the second public key information specifically includes:
the background server verifies the acquired first digital certificate, the acquired second digital certificate, the acquired first public key information and the acquired second public key information with pre-stored information to be verified respectively, if at least one item of verification fails, the verification fails, and if all verification passes, the verification passes.
Further, if the verification fails, verification failure prompt information is sent to the optical cable connector box, and data transmission cannot be carried out among the optical cable connector box, the optical cable monitoring terminal and the background server.
Optionally, the optical cable splice closure signs and encrypts the first digital certificate, the second digital certificate, the first public key information and the second public key information, and then sends the first digital certificate, the second digital certificate, the first public key information and the second public key information after signature and encryption to the background server.
Further, the background server carries out signature encryption on the verification result information returned to the optical cable joint box.
Optionally, the optical cable joint box further comprises a power module for providing power for the optical cable joint box, the power module comprises a solar panel and a rechargeable battery, a power output end of the solar panel is connected with a charging end of the rechargeable battery, and the rechargeable battery provides power for the optical cable joint box.
The technical scheme adopted by the invention comprises the following technical effects:
1. according to the technical scheme, after the optical cable connector box sequentially passes through the first safety certification and the second safety certification, optical cable monitoring information of the optical cable monitoring terminal is received, and the optical cable monitoring information of the received optical cable monitoring terminal is forwarded to the background server; the first safety certification is hardware safety starting certification of the optical cable joint box based on the internal encryption module, the second safety certification is ternary equal bidirectional certification carried out among the optical cable joint box, the optical cable monitoring terminal and the background server, the problem that in the prior art, data transmission safety between the aerial optical cable electric power monitoring terminal and the background monitoring center is not high is effectively solved, and data transmission safety between the aerial optical cable electric power monitoring terminal and the background monitoring center is effectively improved.
2. According to the technical scheme, a controller in an optical cable joint box respectively acquires first attribute information of current equipment of the optical cable joint box and a trusted WLAN wireless module, a trust root and a digital signature are generated based on the first attribute information of the current equipment of the optical cable joint box and the trusted WLAN wireless module, the generated trust root and the digital signature are compared and verified with a trust root and a digital signature stored in an encryption module in advance, after the comparison and verification are passed, the optical cable joint box and the trusted WLAN wireless module are started safely, and the safety of data transmission between an overhead optical cable electric power monitoring terminal and a background monitoring center is further ensured in the aspect of hardware of the optical cable joint box.
3. According to the technical scheme, the verification information of the background server comprises a first digital certificate, a second digital certificate and first public key information, and also comprises optical cable monitoring terminal access request time information and second public key information generated by optical cable monitoring terminal equipment first attribute information.
4. According to the technical scheme, the optical cable joint box further comprises a power supply module used for providing power for the optical cable joint box, the power supply module comprises a solar panel and a rechargeable battery, solar energy is converted into electric energy through the cooperation of the solar panel and the rechargeable battery and stored in the lithium iron phosphate battery to supply power for the optical cable joint box, and the reliability of power supply of the power supply is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present invention, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without any creative effort.
FIG. 1 is a schematic diagram of a system according to an embodiment of the present invention;
fig. 2 is a schematic communication diagram of ternary peer-to-peer bidirectional authentication performed among the optical cable joint box, the optical cable monitoring terminal, and the background server in the system according to the embodiment of the present invention.
Detailed Description
In order to clearly explain the technical features of the present invention, the following detailed description of the present invention is provided with reference to the accompanying drawings. The following disclosure provides many different embodiments, or examples, for implementing different features of the invention. To simplify the disclosure of the present invention, the components and arrangements of specific examples are described below. Furthermore, the present invention may repeat reference numerals and/or letters in the various examples. This repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed. It should be noted that the components illustrated in the figures are not necessarily drawn to scale. Descriptions of well-known components and processing techniques and procedures are omitted so as to not unnecessarily limit the invention.
Example one
As shown in fig. 1, the present invention provides an overhead optical cable monitoring and transmission system based on a trusted WLAN, including: the optical cable connector box comprises an optical cable connector box 1, an optical cable monitoring terminal 2 and a background server 3, wherein a trusted WLAN wireless module 11 and an encryption module 12 are arranged inside the optical cable connector box 1, the optical cable connector box 1 is used for being respectively in communication connection with the optical cable monitoring terminal 2 and the background server 3 through the trusted WLAN wireless module 11, receiving optical cable monitoring information of the optical cable monitoring terminal 2 after sequentially passing through first security certification and second security certification, and transmitting the optical cable monitoring information of the received optical cable monitoring terminal 2 to the background server 3; the first safety certification is hardware safety starting certification of the optical cable joint box 1 based on the internal encryption module 12, and the second safety certification is ternary equal bidirectional certification performed among the optical cable joint box 1, the optical cable monitoring terminal 2 and the background server 3.
In the first security certification, the hardware security starting certification of the optical cable joint box based on the internal encryption module specifically comprises:
the controller 13 inside the optical cable joint box 1 respectively obtains the first attribute information of the current devices of the optical cable joint box 1 and the trusted WLAN wireless module 11, generates a trust root and a digital signature based on the first attribute information of the current devices of the optical cable joint box 1 and the trusted WLAN wireless module 11, compares the generated trust root and the generated digital signature with the trust root and the digital signature stored in the encryption module 12 in advance, and after the comparison and the verification are passed, the optical cable joint box 1 and the trusted WLAN wireless module 11 are safely started.
Specifically, the current device first attribute information includes ID information of the current device and/or a product serial number of the current device. The number of the generated trust roots may be two, that is, a first trust root generated correspondingly based on the first attribute information of the current device of the optical cable joint box 1 and a second trust root generated correspondingly based on the first attribute information of the current device of the trusted WLAN wireless module 11 inside the optical cable joint box 1, then, when verification is performed, the controller 13 respectively performs verification of the first trust root and the second trust root, and after the verification of both the first trust root and the second trust root is passed, performs authentication of the digital signature; the number of the generated trust roots may also be two, that is, a third trust root (which may be a permutation and combination of the first trust root and the second trust root, or a permutation and combination after the first trust root and the second trust root are deformed (for example, reversed)) is correspondingly generated based on the current device first attribute information of the optical cable joint box 1 and the current device first attribute information of the trusted WLAN wireless module 11 inside the optical cable joint box 1, and then, the controller 13 performs verification of the third trust root during verification, and performs authentication of the digital signature after the verification is passed. Similarly, the generated digital signatures may be two, that is, a first digital signature generated based on the first attribute information of the current device of the optical cable joint box 1 and a second digital signature generated based on the first attribute information of the current device of the trusted WLAN wireless module 11 inside the optical cable joint box 1, then, the controller 13 verifies the first digital signature and the second digital signature respectively, after both are verified, the authentication is passed, the optical cable joint box 1 and the trusted WLAN wireless module 11 are started safely, and each authentication is passed, so that the security of data transmission is improved; the generated digital signatures may be two, that is, a third digital signature (which may be a permutation and combination of the first digital signature and the second digital signature, or a permutation and combination after (for example, reversing) the first digital signature and the second digital signature) is correspondingly generated based on the current device first attribute information of the optical cable joint box 1 and the current device first attribute information of the trusted WLAN wireless module 11 inside the optical cable joint box 1, and then the controller 13 performs verification of the third digital signature during verification, and after the verification is passed, the optical cable joint box 1 and the trusted WLAN wireless module 11 are securely started; through respectively authenticating the third digital signature or the third digital certificate formed by the optical cable joint box 1 and the trusted WLAN wireless module 11, not only the safety of data transmission is improved, but also the authentication efficiency is improved. If any verification fails, the optical cable joint box 1 and the trusted WLAN wireless module 11 are not started safely. Preferably, the optical cable monitoring terminal 2 may also be provided with an encryption module, based on the current device first attribute information of the optical cable monitoring terminal 2 and based on the current device first attribute information of the optical cable monitoring terminal 2, a root of trust and a digital signature are generated, the generated root of trust and digital signature are compared with a root of trust and a digital signature stored in the encryption module in advance for verification, and after the comparison verification passes, the optical cable monitoring terminal 2 is started safely.
As shown in fig. 2, in the second security authentication, the ternary peer-to-peer bidirectional authentication performed among the optical cable joint box 1, the optical cable monitoring terminal 2, and the background server 3 specifically includes:
the optical cable joint box 1 sends a first digital certificate generated according to second attribute information and third attribute information of self equipment to the optical cable monitoring terminal 2;
acquiring a second digital certificate generated by the optical cable monitoring terminal 2 according to second attribute information and third attribute information of the device per se, first public key information generated by a first digital certificate and a second digital certificate of the optical cable joint box 1, access request time information of the optical cable monitoring terminal 2 and second public key information generated by first attribute information of the device of the optical cable monitoring terminal 2, and sending the second public key information to the background server 3 for verification;
and acquiring the verification results of the background server 3 on the first digital certificate, the second digital certificate, the first public key information and the second public key information, sending the verification results to the optical cable monitoring terminal 2, and after the verification is passed, carrying out data transmission among the optical cable joint box 1, the optical cable monitoring terminal 2 and the background server 3.
Specifically, the second attribute information of the device is MAC address information of the device, and the third attribute information of the device is an IP address of the device. The optical cable joint box 1, as an AP (Access Point) device in a ternary security architecture, trusts an identity of an ASU (application server), that is, a first digital certificate, public key information in the first digital certificate (that is, the AP certificate) may be generated based on an IP address of the optical cable joint box 1 (for example, including an IP address and other information), and private key information in the first digital certificate may be generated based on MAC address information of the optical cable joint box 1 (for example, including MAC address information and other information); the public key information in the second digital certificate (i.e., the STA certificate) may be generated based on the IP address of the optical cable monitoring terminal 2 (e.g., contains the IP address and other information), and the private key information in the second digital certificate may be generated based on the MAC address information of the optical cable monitoring terminal 2 (e.g., contains the MAC address information and other information); the optical cable monitoring terminal 2 functions as an STA (terminal each connected to a wireless network) terminal; the background server 3 (a certificate and authentication server AS deployed in a data center machine room) is responsible for issuing, managing, authenticating and authenticating the certificate of the WAPI (a security access technology standard in the field of computer broadband wireless network communication, which is a security mechanism in the mandatory standard of China wireless local area network). The first public key information (ECDH identity, key seed, AP device public key + STA terminal public key, that is, AP device public key in the first digital certificate + STA terminal public key in the second digital certificate) generated by the first digital certificate and the second public key information (temporary public key) generated by the access request time information of the optical cable monitoring terminal 2 and the first attribute information of the optical cable monitoring terminal 2 device, which not only include the access request time information of the optical cable monitoring terminal 2, but also include the public key information generated by the first attribute information of the optical cable monitoring terminal 2 device, form the second public key information together, so as to ensure that the access of the optical cable monitoring terminal 2 to the optical cable joint box 1 is in the set working time period, and the non-working time period is not accessed.
The verifying of the first digital certificate, the second digital certificate, the first public key information and the second public key information by the background server 3 specifically includes:
the background server 3 verifies the acquired first digital certificate, second digital certificate, first public key information and second public key information with pre-stored information to be verified respectively, if at least one verification fails, the verification fails, and if all verifications pass, the verification passes. If the verification fails, verification failure prompt information is sent to the optical cable connector box 1, and data transmission cannot be carried out among the optical cable connector box 1, the optical cable monitoring terminal 2 and the background server 3.
Three physical entities in the ternary security architecture, namely the optical cable joint box 1, the optical cable monitoring terminal 2 and the background server 3 have independent identities (WAPI certificates which are generated by public keys and private keys), ternary equal bidirectional authentication is achieved, and security is effectively guaranteed.
The first digital certificate and the second digital certificate are both V3 version x.509 digital certificates.
The technical scheme of the invention specifically comprises network side safety (namely between the AP equipment and the AS system), air interface safety (namely between the AP equipment and the STA terminal) and body safety (safe starting of the optical cable joint box).
In the aspect of network side security, the background server 3 includes not only a certificate and Authentication System (AS): the certificate system mainly comprises a WAPI certificate issuing and managing function and an authentication and identification function, and can identify the legality of the certificate (a first digital certificate, a second digital certificate, first public key information and second public key information); further comprising a wireless controller system (AC): the wireless controller system realizes centralized control and management of WAPIAP (optical cable splice closure) and WAPI terminal (optical cable monitoring terminal) and other equipment, and realizes authentication and monitoring management of terminal access.
The optical cable joint box 1 and a wireless controller system (AC) in the background server 3 can be matched to provide access control capability, message filtering capability, DOS attack prevention capability, port scanning prevention capability, illegal message attack prevention capability and the like, and provide local network logs. Specifically, the access control may support access control based on MAC addresses (including LAN and WLAN), or based on IP addresses and IP address ranges, and may also support access control based on URL provided in the form of black and white lists, which cannot be enabled simultaneously, and may support up to 100 records. The message filtering supports the IP layer protocol message filtering function and supports the application layer message passing. The DOS attack prevention can provide certain DOS attack prevention capability, for example, the types of attacks such as LAND, Ping of Death, SYN Flooding, ICMP Redirection, Smurf, Winnuke and the like can be prevented by setting a firewall; has the function of preventing port scanning.
In the air interface side safety aspect, each optical cable joint box 1 is configured with different SSIDs (service set identifiers) to distinguish the isolation between virtual APs (multiple SSIDs) supported by a network and support the SSID broadcast on/off function; the WAPI security mechanism is supported, the standard of GB 15629.11-2003 and GB 15629.11-2003/XG 1-2006 is met, and the algorithm for the wireless local area network approved by the national code administration is supported; the key updating function is supported, and comprises unicast key updating, multicast key updating and base key updating; the support certificate private key data is stored in a protected manner, namely, stored in the encryption module 12; and the forced STA terminal offline function is supported, and the network connection of an illegal STA terminal is cut off.
Further, the optical cable joint box 1 performs signature encryption on the first digital certificate, the second digital certificate, the first public key information and the second public key information, and then sends the first digital certificate, the second digital certificate, the first public key information and the second public key information after signature encryption to the background server 3. And the background server 3 carries out signature encryption on the verification result information returned to the optical cable joint box 1. Preferably, the optical cable joint box 1 also needs to perform signature encryption when returning the verification result information sent by the background server 3 to the optical cable monitoring terminal 2, the digital signature algorithm may be ECDSA-192, and the hash algorithm is SHA-256. The elliptic curve parameter field identifies a curve parameter approved by the national crypto-authority and dedicated to the wireless local area network by using an OID (object identifier) value 1.2.156.11235.1.1.2.1, and the elliptic curve parameter field + the first digital certificate or the second digital certificate or the first public key information or the second public key information can generate the encrypted digital certificate or the encrypted public key information.
Preferably, the optical cable joint box 1 further comprises a power module 14 for supplying power to the optical cable joint box 1, the power module 14 comprises a solar panel 141 and a rechargeable battery 142, a power output end of the solar panel 141 is connected with a charging end of the rechargeable battery 142, and the rechargeable battery 142 supplies power to the optical cable joint box 1.
The optical cable joint box 1 supports a cascade network and a local Mesh networking, the communication delay of a single device is less than 20ms, the network architecture can be continuously expanded, any two devices can be wirelessly interconnected, and the optical cable joint box has the outstanding characteristics of dynamic self-organization, self-configuration, self-maintenance and the like; the method can realize rapid deployment, is flexible and portable, the point-to-point communication distance can reach 1 kilometer, and the communication bandwidth is not lower than 200Mbps when the distance is 500 meters.
The rechargeable battery 142 can be a lithium iron phosphate battery, converts solar energy into electric energy to be stored in the lithium iron phosphate battery, and supplies power to the outdoor optical cable connector box 1; the three-frequency technology is adopted as a wireless access point, so that wireless communication with other optical cable joint boxes 1 can be realized while signal coverage is realized; the trusted WLAN wireless module 11 in the optical cable joint box 1 uses a glass fiber reinforced plastic omnidirectional antenna as a service access antenna of outdoor wireless communication equipment to ensure full-angle signal coverage; the trusted WLAN wireless module 11 in the optical cable joint box 1 may also use a high-gain directional antenna as an AirCable (triple-band technology) antenna of the outdoor wireless communication device, so as to implement smooth wireless communication between triple-band APs.
According to the technical scheme, after the optical cable connector box sequentially passes through the first safety certification and the second safety certification, optical cable monitoring information of the optical cable monitoring terminal is received, and the optical cable monitoring information of the received optical cable monitoring terminal is forwarded to the background server; the first safety certification is hardware safety starting certification of the optical cable joint box based on the internal encryption module, the second safety certification is ternary equal bidirectional certification carried out among the optical cable joint box, the optical cable monitoring terminal and the background server, the problem that in the prior art, data transmission safety between the aerial optical cable electric power monitoring terminal and the background monitoring center is not high is effectively solved, and data transmission safety between the aerial optical cable electric power monitoring terminal and the background monitoring center is effectively improved.
According to the technical scheme, a controller in an optical cable joint box respectively acquires first attribute information of current equipment of the optical cable joint box and a trusted WLAN wireless module, a trust root and a digital signature are generated based on the first attribute information of the current equipment of the optical cable joint box and the trusted WLAN wireless module, the generated trust root and the digital signature are compared and verified with a trust root and a digital signature stored in an encryption module in advance, after the comparison and verification are passed, the optical cable joint box and the trusted WLAN wireless module are started safely, and the safety of data transmission between an overhead optical cable electric power monitoring terminal and a background monitoring center is further ensured in the aspect of hardware of the optical cable joint box.
According to the technical scheme, the background server verifies information including the first digital certificate, the second digital certificate and the first public key information and also includes optical cable monitoring terminal access request time information and second public key information generated by the first attribute information of optical cable monitoring terminal equipment, and through verification of the access time of the optical cable monitoring terminal and the optical cable joint box, access communication between the optical cable monitoring terminal and the optical cable joint box only during working is ensured, and the safety of data transmission between the aerial optical cable electric power monitoring terminal and the background monitoring center is further improved.
According to the technical scheme, the optical cable joint box further comprises a power supply module used for providing power for the optical cable joint box, the power supply module comprises a solar panel and a rechargeable battery, solar energy is converted into electric energy through the cooperation of the solar panel and the rechargeable battery and stored in the lithium iron phosphate battery to supply power for the optical cable joint box, and the reliability of power supply of the power supply is improved.
Although the embodiments of the present invention have been described with reference to the accompanying drawings, it is not intended to limit the scope of the present invention, and it should be understood by those skilled in the art that various modifications and variations can be made without inventive efforts by those skilled in the art based on the technical solution of the present invention.

Claims (10)

1. An aerial optical cable monitoring and transmitting system based on a trusted WLAN is characterized by comprising: the optical cable connector box is internally provided with a trusted WLAN wireless module and an encryption module and is respectively in communication connection with the optical cable monitoring terminal and the background server through the trusted WLAN wireless module, receives optical cable monitoring information of the optical cable monitoring terminal after sequentially passing through first security certification and second security certification and forwards the optical cable monitoring information of the received optical cable monitoring terminal to the background server; the first safety certification is hardware safety starting certification of the optical cable joint box based on the internal encryption module, and the second safety certification is ternary equal bidirectional certification performed among the optical cable joint box, the optical cable monitoring terminal and the background server.
2. The overhead cable monitoring and transmission system based on trusted WLAN according to claim 1, wherein the hardware security boot authentication of the cable closure based on the internal encryption module specifically comprises:
the controller in the optical cable joint box respectively acquires the current equipment first attribute information of the optical cable joint box and the trusted WLAN wireless module, generates a trust root and a digital signature based on the current equipment first attribute information of the optical cable joint box and the trusted WLAN wireless module, compares the generated trust root and the generated digital signature with the trust root and the digital signature stored in the encryption module in advance, and performs safe starting on the optical cable joint box and the trusted WLAN wireless module after the comparison and verification are passed.
3. The trusted WLAN based aerial fiber cable monitoring transmission system of claim 2, wherein the current device first attribute information includes ID information of the current device and/or a product serial number of the current device.
4. The overhead optical cable monitoring and transmission system based on the trusted WLAN according to claim 1, wherein the ternary peer-to-peer bidirectional authentication performed among the optical cable connector box, the optical cable monitoring terminal, and the background server specifically includes:
the optical cable joint box sends a first digital certificate generated according to second attribute information and third attribute information of self equipment to the optical cable monitoring terminal;
acquiring a second digital certificate generated by the optical cable monitoring terminal according to second attribute information and third attribute information of the optical cable monitoring terminal, first public key information generated by a first digital certificate and a second digital certificate of an optical cable joint box, access request time information of the optical cable monitoring terminal and second public key information generated by first attribute information of optical cable monitoring terminal equipment, and sending the second digital certificate and the first public key information to a background server for verification;
and acquiring the verification results of the background server on the first digital certificate, the second digital certificate, the first public key information and the second public key information, sending the verification results to the optical cable monitoring terminal, and after the verification is passed, carrying out data transmission among the optical cable joint box, the optical cable monitoring terminal and the background server.
5. The trusted WLAN based aerial fiber cable monitoring and transmission system of claim 4, wherein the device second attribute information is device MAC address information, and the device third attribute information is a device IP address.
6. The overhead optical cable monitoring and transmission system based on the trusted WLAN according to claim 4, wherein the verification of the first digital certificate, the second digital certificate, the first public key information, and the second public key information by the background server specifically includes:
the background server verifies the acquired first digital certificate, the acquired second digital certificate, the acquired first public key information and the acquired second public key information with pre-stored information to be verified respectively, if at least one item of verification fails, the verification fails, and if all verification passes, the verification passes.
7. The trusted WLAN based aerial fiber cable monitoring and transmission system according to claim 6, wherein if the verification fails, a verification failure prompt is sent to the fiber cable splice closure, and data transmission between the fiber cable splice closure, the fiber cable monitoring terminal, and the background server is disabled.
8. The overhead optical cable monitoring and transmission system based on the trusted WLAN according to any one of claims 4 to 7, wherein the optical cable joint box performs signature encryption on the first digital certificate, the second digital certificate, the first public key information and the second public key information, and then sends the first digital certificate, the second digital certificate, the first public key information and the second public key information after signature encryption to the background server.
9. The trusted WLAN based aerial fiber cable monitoring and transmission system of claim 8 wherein the backend server signs and encrypts the verification result information returned to the cable closure.
10. The trusted WLAN based aerial fiber cable monitoring and transmission system of claim 1, wherein the cable closure further comprises a power module for providing power to the cable closure, the power module comprising a solar panel and a rechargeable battery, a power output of the solar panel being connected to a charging terminal of the rechargeable battery, and the rechargeable battery providing power to the cable closure.
CN202210318769.2A 2022-03-29 2022-03-29 Overhead optical cable monitoring and transmitting system based on trusted WLAN Active CN114845298B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210318769.2A CN114845298B (en) 2022-03-29 2022-03-29 Overhead optical cable monitoring and transmitting system based on trusted WLAN

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210318769.2A CN114845298B (en) 2022-03-29 2022-03-29 Overhead optical cable monitoring and transmitting system based on trusted WLAN

Publications (2)

Publication Number Publication Date
CN114845298A true CN114845298A (en) 2022-08-02
CN114845298B CN114845298B (en) 2023-11-28

Family

ID=82564324

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210318769.2A Active CN114845298B (en) 2022-03-29 2022-03-29 Overhead optical cable monitoring and transmitting system based on trusted WLAN

Country Status (1)

Country Link
CN (1) CN114845298B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050132202A1 (en) * 2003-12-11 2005-06-16 Dillaway Blair B. Attesting to establish trust between computer entities
CN102355467A (en) * 2011-10-18 2012-02-15 国网电力科学研究院 Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission
CN105554760A (en) * 2016-01-29 2016-05-04 腾讯科技(深圳)有限公司 Wireless access point authentication method, device and system
CN106230784A (en) * 2016-07-20 2016-12-14 杭州华三通信技术有限公司 A kind of device authentication method and device
CN107360124A (en) * 2016-05-10 2017-11-17 普天信息技术有限公司 Access authentication method and device, WAP and user terminal
CN107438001A (en) * 2016-05-26 2017-12-05 北京博文广成信息安全技术有限公司 Dynamic CFL certificate verification algorithms
CN111149334A (en) * 2017-11-23 2020-05-12 阿姆有限公司 Remote device control
CN111372247A (en) * 2019-12-23 2020-07-03 国网天津市电力公司 Terminal secure access method and terminal secure access system based on narrowband Internet of things
CN112784278A (en) * 2020-12-31 2021-05-11 科东(广州)软件科技有限公司 Trusted starting method, device and equipment of computer system
CN113591109A (en) * 2021-07-23 2021-11-02 上海瓶钵信息科技有限公司 Method and system for communication between trusted execution environment and cloud

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050132202A1 (en) * 2003-12-11 2005-06-16 Dillaway Blair B. Attesting to establish trust between computer entities
CN102355467A (en) * 2011-10-18 2012-02-15 国网电力科学研究院 Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission
CN105554760A (en) * 2016-01-29 2016-05-04 腾讯科技(深圳)有限公司 Wireless access point authentication method, device and system
CN107360124A (en) * 2016-05-10 2017-11-17 普天信息技术有限公司 Access authentication method and device, WAP and user terminal
CN107438001A (en) * 2016-05-26 2017-12-05 北京博文广成信息安全技术有限公司 Dynamic CFL certificate verification algorithms
CN106230784A (en) * 2016-07-20 2016-12-14 杭州华三通信技术有限公司 A kind of device authentication method and device
CN111149334A (en) * 2017-11-23 2020-05-12 阿姆有限公司 Remote device control
CN111372247A (en) * 2019-12-23 2020-07-03 国网天津市电力公司 Terminal secure access method and terminal secure access system based on narrowband Internet of things
CN112784278A (en) * 2020-12-31 2021-05-11 科东(广州)软件科技有限公司 Trusted starting method, device and equipment of computer system
CN113591109A (en) * 2021-07-23 2021-11-02 上海瓶钵信息科技有限公司 Method and system for communication between trusted execution environment and cloud

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
MAHESWARA RAO VALLURI: "Digital signature scheme based on truncated polynomial over finite fields", 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST) *
林璟锵等: "PKI技术的近年研究综述", 密码学报 *
莫楚栋;梁伯勤;: "嵌入式可信平台设计及在信息防泄露中的应用", 教育信息技术, no. 2 *

Also Published As

Publication number Publication date
CN114845298B (en) 2023-11-28

Similar Documents

Publication Publication Date Title
CN1268093C (en) Distribution method of wireless local area network encrypted keys
CA2744972C (en) Native wi-fi architecture for 802.11 networks
US7339915B2 (en) Virtual LAN override in a multiple BSSID mode of operation
US8964634B2 (en) Wireless home mesh network bridging adaptor
JP4611289B2 (en) Wireless service point network
US9071968B2 (en) Method, apparatus, and system for centralized 802.1X authentication in wireless local area network
US20090016529A1 (en) Method and system for prevention of unauthorized communication over 802.11w and related wireless protocols
US20090019539A1 (en) Method and system for wireless communications characterized by ieee 802.11w and related protocols
US11388590B2 (en) Cryptographic security in multi-access point networks
US20050201342A1 (en) Wireless access point network and management protocol
Zhou et al. Efficient application of GPRS and CDMA networks in SCADA system
CN111711625A (en) Power system information security encryption system based on power distribution terminal
US20140181279A1 (en) Virtual Console-Port Management
Singh et al. Analysis of security issues and their solutions in wireless LAN
CN114845298B (en) Overhead optical cable monitoring and transmitting system based on trusted WLAN
US11432138B1 (en) Secure communications among access points
CN102883265B (en) The positional information method of sending and receiving of access user, equipment and system
JP2004207965A (en) High speed authentication system and method for wireless lan
US20130191635A1 (en) Wireless authentication terminal
CN113613205B (en) Network access mechanism suitable for wireless avionics internal communication network
CN115378578A (en) SD-WAN (secure digital-to-Wide area network) implementation method and system based on SM4 cryptographic key
US20210282013A1 (en) Connecting access point to wireless multi-hop network
CA3205828A1 (en) Monitoring secured network using network tap devices
CN110995562A (en) Distributed wind power plant wireless networking system
Zhao et al. The Cooperative Authentication Mechanism and Performance Evaluation for Unmanned Systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant