CN115243253A - 5G chip encryption and differential method - Google Patents

5G chip encryption and differential method Download PDF

Info

Publication number
CN115243253A
CN115243253A CN202210918421.7A CN202210918421A CN115243253A CN 115243253 A CN115243253 A CN 115243253A CN 202210918421 A CN202210918421 A CN 202210918421A CN 115243253 A CN115243253 A CN 115243253A
Authority
CN
China
Prior art keywords
switch
fault
node
goose
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210918421.7A
Other languages
Chinese (zh)
Inventor
刘广袤
李尊
张少峰
李飚
史少彧
薛源
郭志民
王佳琳
杨松林
王荷茵
邓虹
刘媛
李瑞国
王岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sanmenxia Power Supply Co Of State Grid Henan Electric Power Co
Original Assignee
Sanmenxia Power Supply Co Of State Grid Henan Electric Power Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sanmenxia Power Supply Co Of State Grid Henan Electric Power Co filed Critical Sanmenxia Power Supply Co Of State Grid Henan Electric Power Co
Priority to CN202210918421.7A priority Critical patent/CN115243253A/en
Publication of CN115243253A publication Critical patent/CN115243253A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02HEMERGENCY PROTECTIVE CIRCUIT ARRANGEMENTS
    • H02H7/00Emergency protective circuit arrangements specially adapted for specific types of electric machines or apparatus or for sectionalised protection of cable or line systems, and effecting automatic switching in the event of an undesired change from normal working conditions
    • H02H7/26Sectionalised protection of cable or line systems, e.g. for disconnecting a section on which a short-circuit, earth fault, or arc discharge has occured
    • H02H7/261Sectionalised protection of cable or line systems, e.g. for disconnecting a section on which a short-circuit, earth fault, or arc discharge has occured involving signal transmission between at least two stations
    • H02H7/262Sectionalised protection of cable or line systems, e.g. for disconnecting a section on which a short-circuit, earth fault, or arc discharge has occured involving signal transmission between at least two stations involving transmissions of switching or blocking orders
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00006Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment
    • H02J13/00016Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment using a wired telecommunication network or a data transmission bus
    • H02J13/00017Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment using a wired telecommunication network or a data transmission bus using optical fiber
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00006Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment
    • H02J13/00022Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network characterised by information or instructions transport means between the monitoring, controlling or managing units and monitored, controlled or operated power network element or electrical equipment using wireless data transmission
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J13/00Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the network; Circuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
    • H02J13/00032Systems characterised by the controlled or operated power network elements or equipment, the power network elements or equipment not otherwise provided for
    • H02J13/00036Systems characterised by the controlled or operated power network elements or equipment, the power network elements or equipment not otherwise provided for the elements or equipment being or involving switches, relays or circuit breakers
    • H02J13/0004Systems characterised by the controlled or operated power network elements or equipment, the power network elements or equipment not otherwise provided for the elements or equipment being or involving switches, relays or circuit breakers involved in a protection system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H02GENERATION; CONVERSION OR DISTRIBUTION OF ELECTRIC POWER
    • H02JCIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
    • H02J2213/00Indexing scheme relating to details of circuit arrangements for providing remote indication of network conditions of for circuit arrangements for providing remote control of switching means in a power distribution network
    • H02J2213/10Indexing scheme relating to details of circuit arrangements for providing remote indication of network conditions of for circuit arrangements for providing remote control of switching means in a power distribution network using simultaneously two or more different transmission means
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Power Engineering (AREA)
  • Signal Processing (AREA)
  • Remote Monitoring And Control Of Power-Distribution Networks (AREA)

Abstract

The invention relates to a 5G chip encryption and differential method, which comprises the following steps: by signing the data network name and anchoring the return call on a signing private network, the data packet can be connected only after being subjected to knock authorization authentication based on identity fine granularity and clear network boundary locking; the CPE of the front-end equipment and the dynamic network element secret key of the core network are distributed and bound with the 5G sim card in the DTU of the equipment to be combined with encryption authentication so as to carry out bidirectional 5G communication; the method comprises the steps that a user side is used for the first time, a main password and positioning information are input to submit to a server for registration and binding, a new password is randomly generated by a subsequent network element secret key based on password seeds and time, the method has randomness and non-guessability, and the CPE/DTU and the core network of the front-end equipment have a password generation function; before the DTU of the prepositive equipment is formally installed, beacon scanning is carried out, and a beacon which is confirmed to be legal is fixed to a special communication base station channel; the invention has the advantages of higher safety, realization of safe communication and on-site protection of the platform area data and good reliability of double judgment.

Description

5G chip encryption and differential method
Technical Field
The invention belongs to the technical field of power grid data encryption, and particularly relates to a 5G chip encryption and differential method.
Background
The distribution network is wide in distribution, the topological structure is complex, the neutral point grounding mode is various, fault points are difficult to find, isolate and recover when the power distribution network is reduced, the traditional method for protecting, measuring and controlling the distribution network needs to establish a whole-network optical fiber communication special line and then control by a differential protection module, and the conditions of high laying difficulty, high cost, inflexible configuration, large external force damage risk and the like exist, so that the problems that distributed power sources are increased day by day and the power grid bearing risk is increased cannot be solved, the current market has a 2/3/4G wireless communication technology, and a platform area node is adopted for power grid state perception, but the working time delay is high due to the low transmission efficiency and the incapability of meeting the real-time safety isolation requirement (differential protection), the current market also has the condition of differential protection based on a 5G wireless communication technology, and static keys are adopted for network planning, capability opening, control forwarding and the like, so that the safety is low; the 'residual voltage locking' is adopted, the fault is isolated simply by calculating overcurrent and overvoltage logic, and the reliability is poor; therefore, it is necessary to provide a 5G chip encryption and differential method with higher security, secure penetration and local protection of the station data, and good reliability of double judgment.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide a 5G chip encryption and differential method which is higher in safety, realizes safe penetration and local protection of station data and is good in double judgment reliability.
The purpose of the invention is realized as follows: A5G chip encryption and differential method comprises the following steps:
step 1: firstly, anchoring a callback on a signed private network through a signed data network name, clearly locking the callback based on identity fine granularity and a network boundary, and connecting a single data packet after knocking authorization authentication;
and 2, step: the CPE of the front-end equipment and the dynamic network element secret key of the core network are distributed and bound with the 5G sim card in the DTU of the equipment to be combined with encryption authentication so as to carry out bidirectional 5G communication;
and 3, step 3: the method comprises the steps that a user side is used for the first time, a main password and positioning information are input to submit to a server for registration and binding, a new password is randomly generated by a subsequent network element secret key based on password seeds and time, the method has randomness and non-guessability, and the CPE/DTU and the core network of the front-end equipment have a password generation function;
and 4, step 4: before the DTU of the front equipment is formally installed, beacon scanning is carried out, a legal beacon immobilization special communication base station channel is confirmed, and therefore the channel is not changed and the Beidou positioning position is not changed, and invasion prevention can be achieved.
The DTU in the step 2 corresponds to a current transformer to be acquired to obtain phase current and zero sequence current, GOOSE information sent by a core network is combined, differential current and brake current are compared and calculated on the basis of 5G time synchronization, when interphase short circuit and single-phase metallic grounding fault of a small-resistance grounding system occur in a protection area, a unit starts a differential protection function, circuit breakers (three-phase tripping) on two sides of a fault cable are instantaneously tripped to realize fault isolation, the two side units are connected by virtue of an information channel, sample data of each phase current are transmitted to the opposite side in real time, current sample data on the opposite side are received, and the two side protection units perform phase splitting to calculate the differential current by utilizing local and opposite side current data after synchronous processing; meanwhile, the differential protection action marks of the devices on the transmitting side and the receiving side are involved in logic judgment, and when power supply is recovered, the communication between distributed DTUs is combined, and after local and opposite side information is added in particular, an operation basis is provided for specific differential protection actions.
The DTU identifies faults of a head end switch and a section switch, and in order to avoid the expansion of the main line fault, the DTU needs to be automatically and quickly positioned according to a preset plan to isolate the fault.
The method adopts PT recognition and GOOSE channel dual-source fault judgment, wherein the PT fault recognition method comprises the following steps: 1) When PT appears
Figure BDA0003776607830000031
When the condition (2) is satisfied, the fault occurs in the inter-phase grounding; 2) When PT appears
Figure BDA0003776607830000032
Figure BDA0003776607830000033
This indicates a ground fault between the BC phases passing through the transition resistance.
The GOOSE channel source fault judgment basis specifically includes: (a) Firstly, counting the number of messages received in each second, and when the receiving StNum is smaller than the StNum of the local machine, if the releasing end device is restarted, updating data, otherwise, discarding the data; when the received StNum is equal to the StNum of the local machine, judging that the SqNum is increased and the data is discarded, and the SqNum is unchanged or decreased, if the release terminal device is restarted, updating the data, otherwise, discarding the data; if the received StNum is larger than the StNum of the local machine and represents that the received StNum exceeds a set value, the network is considered to exist, and a suppression function is started; wherein the turn-on suppression function is specifically: (a1) Distinguishing GoCB on the network according to GOOSE identification and GoID in the network message, wherein the GoCB is a GoOSE control block which represents each group of GOOSE messages, calculating the number of the GOOSE messages received by each GoCB in each second, if the number of the messages received in each second is more than 200 frames, the value can be set, a device which is lower than 200 frames can process the messages without filtering once, if more than 50 frames indicate that the network is abnormal, the messages are considered to be possible, and the messages enter a suppression mode;
(b) After entering a suppression mode, establishing an aging timer, calculating CRC for the content of the data area of the GoCB, storing CRC with different calculation results in a CRC value cache table, receiving a repeated message with the same CRC value as that in the cache table within more than 1s, emptying the CRC value cache table, and receiving a message with a new CRC value; the entering the suppression mode specifically includes: (b1) Establishing an aging timer, wherein aging refers to that the message is old and can be discarded and replaced, the time of the timer is set to be 1s, an effective message can be mixed in the message, the effective message can be ensured not to be lost through the setting of 1s, the CRC of the content of a GOOSE message data area is calculated by adopting a CRC-32 algorithm, because a filtering mechanism is to discard the message with the consistent content of the GOOSE message data area of the same GoCB, the value, the quality and the time of the data area are only calculated, the calculated result is compared with the CRC stored in a CRC value cache table, if the comparison is not consistent, the calculated result is recorded in the table, otherwise, the message is discarded, the CRC cache table is cleared for more than 1s, and the CRC of the content of the GOOSE message data area is calculated and is directly filled into a new CRC cache table;
(c) After entering a suppression mode, filtering the message, and processing 2 frames of GOOSE messages at most every 9ms, wherein the GOOSE messages are respectively a 9ms first frame and a first frame inconsistent with the CRC value of a first frame data area; the method specifically comprises the following steps: (c1) After entering the inhibition mode, in order to ensure the performance of the CPU, the CPU is not seized by the messages, so that only 2 frames of GOOSE messages are processed every 9ms, namely the first frame message received every 9ms and the first frame message with the CRC value inconsistent with the CRC value in the cache table, and the messages with more than 2 frames are discarded; the message is processed once every 9ms, no pressure is applied to the CPU, and meanwhile, if the correct message transmission exists within 9ms, the device can also correctly process the message because the CRC is inconsistent with the CRC of the message, so that the normal GOOSE message processing under the environment is ensured, the requirement on the normal trip action time can be met, and the influence of the message on the CPU efficiency can be restrained.
The dynamic password in the step 3 comprises a time factor, a position factor and an event factor, and the dynamic password and the equipment position are combined, so that the safety of power grid communication is ensured.
The method determines the optimal solution of the platform area load transfer based on the neural network intelligent algorithm model when the power supply is recovered: when a line has a fault, the switch at the contact position completes the recovery of power supply in a non-fault area according to the isolation condition of a fault section and the judgment of whether the switch can have load transfer power to perform switching-on or keep switching-off, the whole process is completed before the reclosing of the outgoing line breaker of the transformer substation, and when a plurality of contact switches exist at the same time, the load transfer can be performed on the plurality of contact switches according to the priority order.
The method comprises the following steps of determining a platform area load transfer optimal solution based on a neural network intelligent algorithm model when power supply is recovered: when a power distribution network system has a short-circuit fault, in the process of power supply recovery of the power distribution network system, generally closing an interconnection switch directly or indirectly connected with a healthy power loss area, and correspondingly closing a section switch in a power failure area so as to recover power supply to a non-fault area and maintain the radial structure of the power distribution network, wherein the essence of power supply recovery is to change the on/off states of the interconnection switch and the section switch in the network on the premise of meeting various operation constraints of the power distribution network, and find a power loss area recovery power supply scheme for realizing one or more optimization targets, which belongs to the switch combination optimization problem of the interconnection switch/section switch, so that the essence of power supply recovery of the power distribution network is a multi-target and multi-constraint nonlinear combination optimization problem, and the mathematical model is as follows:
(1) Maximum recoverable electrical load capacity:
Figure BDA0003776607830000051
wherein M is i The size of the load of the power outage region; lambda [ alpha ] i The weight coefficient of the load i in the outage area represents the priority level of the load; n is a load set of all the unrecovered power supplies of the system;
(2) Minimum number of switching operations:
Figure BDA0003776607830000052
wherein, T s A set of pre-fault tie switches; s s Is a set of pre-fault sectionalizing switches; k k The state of the switch, 1 represents closing and 0 represents opening;
(3) Minimum line loss:
Figure BDA0003776607830000053
wherein, I i Is the branch effective value; r is i Is a branch resistance; n is a radical of hydrogen i The branch circuits in the feeder line related to the power supply recovery can be taken in the actual calculation for the total number of the branch circuits of the whole system;
(4) The load distribution of the feeder lines is balanced as much as possible:
Figure BDA0003776607830000054
wherein S is i Apparent power, S, for feeder i imax Is the maximum allowed apparent power of feeder i, and M is the number of feeders;
(5) The average power failure time of a user is as small as possible: y is 5 = min (AITC), wherein AITC is user average power off time;
(6) And recovering the network power flow constraint of power supply:
Figure BDA0003776607830000055
wherein, P i +jQ i Injection power for node i;
Figure BDA0003776607830000056
voltages of nodes i and j respectively;
Figure BDA0003776607830000057
is the mutual admittance between the nodes i and j;
(7) Branch capacity restriction of restoration power supply: | P l |≤P lmax Wherein P is l Is the active power flowing through branch l; p lmax Is the maximum capacity of branch l;
(8) Restoring the node voltage constraint of the power supply: u shape i.min ≤U i ≤U i.max Wherein, U i.min 、U i.max In order to ensure the minimum value and the maximum value of the voltage of the node i when the distribution network normally operates.
The method is characterized in that when power supply is recovered, the fault detection related logic based on the neural network intelligent algorithm model specifically comprises the following steps:
(1) When the node fault detection logic: when a distribution network has a fault, the phase current flowing through a non-feeder line of the node is greater than a setting fixed value or the zero sequence current is greater than the setting fixed value, the node fault is judged, a node fault GOOSE output signal is triggered instantaneously, the signal is kept along with an overcurrent state, meanwhile, in order to guarantee reliability, the shortest time for keeping the state after the signal is triggered is greater than 300ms, when a feeder line switch detects the fault, the node fault GOOSE output signal is directly tripped and triggered instantaneously, the signal is kept along with the overcurrent state, in order to guarantee reliability, the shortest time for keeping the state after the signal is triggered is greater than 300ms;
(2) When the fault removal logic: when the system has a fault, if the node is not a last switch and the phase current is greater than a setting fixed value or the zero-sequence current is greater than the setting fixed value, and nodes on one side and only one side of the nodes on the M side and the N side do not send out a node fault GOOSE signal, the node switch is tripped after the set fault is cut off and delayed; if the node is a final switch, the phase current is greater than a setting fixed value or the zero-sequence current is greater than the setting fixed value, and a node fault GOOSE signal of any node of the M side and the N side is received, the node is tripped after setting delay; if the node switch is not tripped in the switch failure time, triggering the switch trip-resistant GOOSE output signal; latching the fault removal logic when an overcurrent latching signal of the feeder switch is received;
(3) When the fault isolation logic: if the node does not detect a fault and receives a 'node fault' GOOSE signal with only one node on the M side or the N side, the node switch is tripped after setting delay, and the last switch completes fault isolation according to the logic requirement; if the switch is switched off by a combined transformer and has no current in the time of switch failure, triggering a fault isolation success GOOSE output signal; if the node switch is not tripped in the switch failure time, triggering the switch to reject the trip GOOSE output signal; latching the fault isolation logic when receiving a feeder switch overcurrent latching signal;
(4) When the first switch is in a voltage loss protection logic: when the distributed FA function is put into use, the node is a first switch and GOOSE communication of the node is normal, if the switch is switched on and the voltage of a line is 3s, the first switch is automatically put into use for voltage loss protection, the fault can be quickly isolated when the fault occurs between a power supply point and the first switch, and after the voltage loss protection of the first switch is put into use, if both sides of the node are not voltage and the node has no current, the node is tripped through setting delay, and meanwhile, the judgment of the tripping failure of the switch is started; if the switch is switched off by a combined transformer and has no current in the time of switch failure, triggering a fault isolation success GOOSE output signal; if the node switch is not tripped in the switch failure time, triggering the switch to reject the trip GOOSE output signal;
(5) When the switch fails, the jump logic: after the node switch trips due to conventional protection or distributed FA actions, judging that the switch fails and rejects after failure judgment time, and triggering a 'switch rejecting trip' GOOSE output signal for starting an adjacent side switch; when the node receives a 'switch tripping rejection' GOOSE signal of a node at the M side or the N side, and the node switch is in an on position and is not tripped, the node switch is tripped by a failure joint tripping instantaneous action; if the node does not detect the fault and the trip is successful, triggering a GOOSE output signal of fault isolation success;
(6) When the power restoration logic: after the fault isolation is successful, each node in the area sequentially forwards a 'fault isolation success' GOOSE signal to two sides, and after the power supply recovery charging of the node is completed and the voltage of one side of the power supply side and the load side is lost, the 'fault isolation success' GOOSE signal is received, and after setting delay, the switch of the node is started to be switched on to complete the power supply transfer process; after fault isolation is completed, a power transfer process is started, load testing is required according to a power transfer safety principle, a power supply recovery method is characterized in that information such as network topology and electric quantity of each power distribution terminal is centralized to a master station according to the method, the master station performs power supply strategy solving, and finally a power supply recovery scheme is issued to each intelligent terminal to be executed.
The invention has the beneficial effects that: the invention relates to a 5G chip encryption and differential method, which has the following advantages: the safety of the 5G DTU is improved by adopting a double-fit safety mode, faults are mutually proved from double sources, the method is more accurate, and misjudgment can be obviously reduced; the intelligent distributed DTU of the neural network can play a role in calculating the edge of a central logic unit, and 5G high-speed, high-capacity and low-delay business calculation and operation can greatly relieve the relay protection pressure of the power distribution network; the invention adopts CPE and the dynamic network element secret key of the core network to distribute, the position is bound and compared with the traditional static secret key, the security is higher; compared with the traditional 'residual voltage locking' method for isolating faults by simply calculating overcurrent and overvoltage logic, the method has higher reliability and lower misjudgment rate by adopting a double-judgment method (double-fault judgment and load conversion capacity); the invention has the advantages of higher safety, realization of safe communication and on-site protection of the data of the transformer area and good reliability of double judgment.
Drawings
FIG. 1 is a flow chart of a 5G chip encryption and differential method according to the present invention.
FIG. 2 is a flow chart of a PT identification method of the 5G chip encryption and differential method of the present invention.
Fig. 3 is a flow chart illustrating the GOOSE channel source failure determination according to the encryption and differential method of the 5G chip of the present invention.
FIG. 4 is a logic diagram of a load transfer optimal solution of the encryption and differential method of the 5G chip according to the present invention.
Fig. 5 is a flow chart of fault judgment and algorithm before differential protection of the encryption and differential method of the 5G chip according to the present invention.
FIG. 6 is a schematic diagram of a topology structure of a 5G chip encryption and differential method according to the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
Example 1
As shown in fig. 1-6, a 5G chip encryption and differential method includes the following steps:
step 1: firstly, anchoring a callback on a signed private network through a signed data network name, clearly locking the callback based on identity fine granularity and a network boundary, and connecting a single data packet after knocking authorization authentication;
step 2: the CPE of the front-end equipment and the dynamic network element secret key of the core network are distributed and bound with the 5G sim card in the DTU of the equipment to be combined with encryption authentication so as to carry out bidirectional 5G communication;
and 3, step 3: the method comprises the steps that a user side is used for the first time, a main password and positioning information are input to submit to a server for registration and binding, a new password is randomly generated by a subsequent network element secret key based on password seeds and time, the method has randomness and non-guessability, and the CPE/DTU and the core network of the front-end equipment have a password generation function;
and 4, step 4: before the DTU of the front-end equipment is formally installed, beacon scanning is carried out, a legal beacon immobilization special communication base station channel is confirmed, and therefore the fact that one of safety communication guarantee preconditions is that the channel is unchanged and the Beidou positioning position is unchanged is guaranteed, and invasion prevention can be achieved.
The DTU in the step 2 corresponds to a current transformer to be acquired to obtain phase current and zero sequence current, GOOSE information is sent by a core network, differential current and brake current are compared and calculated on the basis of 5G time synchronization, when inter-phase short circuit and single-phase metallic grounding fault of a small resistance grounding system occur in a protection area, a unit starts a differential protection function, circuit breakers (three-phase tripping) on two sides of a fault cable are instantaneously tripped off to realize fault isolation, the two side units are connected by virtue of an information channel, sampling data of each phase current are transmitted to the opposite side in real time, current sampling data on the opposite side are received at the same time, and the two side protection units perform phase-splitting current calculation by utilizing local and opposite side current data after synchronization processing; meanwhile, the differential protection action marks of the devices on the transmitting side and the receiving side are involved in logic judgment, and when power supply is recovered, the communication between distributed DTUs is combined, and after local and opposite side information is added in particular, an operation basis is provided for specific differential protection actions.
The DTU identifies faults of a head end switch and a section switch, and in order to avoid the expansion of the main line fault, the DTU needs to be automatically and quickly positioned according to a preset plan to isolate the fault.
The method adopts PT recognition and GOOSE channel dual-source fault judgment, wherein the PT fault recognition method comprises the following steps: 1) When PT appears
Figure BDA0003776607830000101
When the condition (2) is satisfied, the fault occurs in the inter-phase grounding; 2) When PT appears
Figure BDA0003776607830000102
Figure BDA0003776607830000103
This is the case, which represents the occurrence of a ground fault between BC phases passing through the transition resistance.
The GOOSE channel source fault judgment basis specifically includes: (a) Firstly, counting the number of messages received in each second, and when the receiving StNum is smaller than the StNum of the local machine, if the releasing end device is restarted, updating data, otherwise, discarding the data; when the received StNum is equal to the StNum of the local machine, judging that SqNum is increased and discarded, and the SqNum is unchanged or decreased, if the release end device is restarted, updating the data, otherwise, discarding the data; if the received StNum is larger than the StNum of the local machine and represents that the received StNum exceeds a set value, the network is considered to exist, and a suppression function is started; wherein the turn-on suppression function is specifically: (a1) Distinguishing GoCB on the network according to GOOSE identification and GoID in the network message, wherein the GoCB is a GoOSE control block which represents each group of GOOSE messages, calculating the number of the GOOSE messages received by each GoCB in each second, and if the number of the messages received by each GoCB in each second is more than 200 frames, the value can be set, the device which is lower than 200 frames can process the messages without filtering once, if the number of the messages received by each GoCB in each second is more than 200 frames, the messages are considered to be possibly messages, and the GoCB enters a suppression mode;
(b) After entering a suppression mode, establishing an aging timer, calculating CRC for the content of the data area of the GoCB, storing CRC with different calculation results in a CRC value cache table, receiving a repeated message with the same CRC value as that in the cache table within more than 1s, emptying the CRC value cache table, and receiving a message with a new CRC value; the entering the suppression mode specifically includes: (b1) Establishing an aging timer, wherein aging refers to that the message is old and can be discarded and replaced, the time of the timer is set to be 1s, an effective message can be mixed in the message, the effective message can be ensured not to be lost through the setting of 1s, the CRC of the content of a GOOSE message data area is calculated by adopting a CRC-32 algorithm, because a filtering mechanism is to discard the message with the consistent content of the GOOSE message data area of the same GoCB, the value, the quality and the time of the data area are only calculated, the calculated result is compared with the CRC stored in a CRC value cache table, if the comparison is not consistent, the calculated result is recorded in the table, otherwise, the message is discarded, the CRC cache table is cleared for more than 1s, and the CRC of the content of the GOOSE message data area is calculated and is directly filled into a new CRC cache table;
(c) After entering a suppression mode, filtering the message, and processing 2 frames of GOOSE messages at most every 9ms, wherein the GOOSE messages are respectively a 9ms first frame and a first frame inconsistent with the CRC value of a first frame data area; the method specifically comprises the following steps: (c1) After entering the suppression mode, in order to ensure the performance of the CPU, the CPU is not completely seized by the messages, so that only 2 frames of GOOSE messages are processed every 9ms, namely the first frame message received every 9ms and the first frame message with the CRC value inconsistent with the CRC value in the cache table, and the messages with more than 2 frames are discarded; the message is processed once every 9ms, no pressure is applied to the CPU, and meanwhile, if the correct message transmission exists within 9ms, the device can also correctly process the message because the CRC is inconsistent with the CRC of the message, so that the normal GOOSE message processing under the environment is ensured, the requirement on the normal trip action time can be met, and the influence of the message on the CPU efficiency can be restrained.
The dynamic password in the step 3 comprises a time factor, a position factor and an event factor, and the dynamic password and the equipment position are combined, so that the safety of power grid communication is ensured.
The method determines the optimal solution of the platform area load transfer based on the neural network intelligent algorithm model when the power supply is recovered: when a line has a fault, the switch in the interconnection position performs switching-on or switching-off holding judgment according to the fault section isolation condition and whether the switch can have load switching-on power, and power restoration in a non-fault area is completed.
The method determines the optimal solution of the platform area load transfer based on the neural network intelligent algorithm model when the power supply is recovered: when a power distribution network system has a short-circuit fault, in the process of power supply recovery of the power distribution network system, generally closing an interconnection switch directly or indirectly connected with a healthy power loss area, and correspondingly closing a section switch in a power failure area so as to recover power supply to a non-fault area and maintain the radial structure of the power distribution network, wherein the essence of power supply recovery is to change the on/off states of the interconnection switch and the section switch in the network on the premise of meeting various operation constraints of the power distribution network, and find a power loss area recovery power supply scheme for realizing one or more optimization targets, which belongs to the switch combination optimization problem of the interconnection switch/section switch, so that the essence of power supply recovery of the power distribution network is a multi-target and multi-constraint nonlinear combination optimization problem, and the mathematical model is as follows:
(1) Maximum recoverable electrical load capacity:
Figure BDA0003776607830000121
wherein M is i The load size of the power-off area; lambda [ alpha ] i The weight coefficient of the load i in the outage area represents the priority level of the load; n is a load set of all the unrecovered power supplies of the system;
(2) Minimum number of switching operations:
Figure BDA0003776607830000122
wherein, T s A set of pre-fault tie switches; s s Is a set of pre-fault sectionalizers; k k The state of the switch, 1 represents closing and 0 represents opening;
(3) Minimum line loss:
Figure BDA0003776607830000123
wherein, I i Is the effective value of the branch; r i Is a branch resistance; n is a radical of hydrogen i The branch circuits in the feeder line related to power supply recovery can be selected in actual calculation for the total number of the branch circuits of the whole system;
(4) The load distribution of the feeder lines is balanced as much as possible:
Figure BDA0003776607830000124
wherein S is i Apparent power, S, for feeder i imax Is the maximum allowed apparent power of feeder i, and M is the number of feeders;
(5) Average user outage time is as small as possible: y is 5 = min (AITC), wherein AITC is user average power off time;
(6) And recovering the network power flow constraint of power supply:
Figure BDA0003776607830000125
wherein, P i +jQ i Injection power for node i;
Figure BDA0003776607830000126
voltages of nodes i and j, respectively;
Figure BDA0003776607830000127
is the mutual admittance between the nodes i and j;
(7) Branch capacity restriction of restoration power supply: | P l |≤P lmax Wherein P is l Active power flowing through branch l; p lmax Is the maximum capacity of branch l;
(8) Restoring the node voltage constraint of the power supply: u shape i.min ≤U i ≤U i.max Wherein, U i.min 、U i.max In order to ensure the minimum value and the maximum value of the voltage of the node i when the distribution network normally operates.
The method is characterized in that when power supply is recovered, the fault detection related logic based on the neural network intelligent algorithm model specifically comprises the following steps:
(1) When the node fault detection logic: when a distribution network has a fault, the phase current flowing through a non-feeder line of the node is greater than a setting fixed value or the zero sequence current is greater than the setting fixed value, the node fault is judged, a node fault GOOSE output signal is triggered instantaneously, the signal is kept along with an overcurrent state, meanwhile, in order to guarantee reliability, the shortest time for keeping the state after the signal is triggered is greater than 300ms, when a feeder line switch detects the fault, the node fault GOOSE output signal is directly tripped and triggered instantaneously, the signal is kept along with the overcurrent state, in order to guarantee reliability, the shortest time for keeping the state after the signal is triggered is greater than 300ms;
(2) When the fault removal logic: when the system has a fault, if the node is not a last switch and the phase current is greater than a setting fixed value or the zero-sequence current is greater than the setting fixed value, and nodes on one side and only one side of the nodes on the M side and the N side do not send out a node fault GOOSE signal, the node switch is tripped after the set fault is cut off and delayed; if the node is a last switch, the phase current is greater than a setting fixed value or the zero sequence current is greater than the setting fixed value, and a node fault GOOSE signal of any node of the M side and the N side is received, the node is tripped after setting delay; if the node switch is not tripped in the switch failure time, triggering the switch to reject the trip GOOSE output signal; latching fault removal logic when a feeder switch overcurrent latch signal is received;
(3) When the fault isolation logic: if the node does not detect a fault and receives a 'node fault' GOOSE signal with only one node on the M side or the N side, the node switch is tripped after setting delay, and the last switch completes fault isolation according to the logic requirement; if the switch is switched off by a combined transformer and has no current in the time of switch failure, triggering a fault isolation success GOOSE output signal; if the node switch is not tripped in the switch failure time, triggering the switch to reject the trip GOOSE output signal; latching the fault isolation logic when receiving a feeder switch overcurrent latching signal;
(4) When the first switch is in a voltage loss protection logic: when the distributed FA function is put into use, the node is a first switch and GOOSE communication of the node is normal, if the switch is switched on and the voltage of a line is 3s, the first switch is automatically put into use for voltage loss protection, the fault can be quickly isolated when the fault occurs between a power supply point and the first switch, and after the voltage loss protection of the first switch is put into use, if both sides of the node are not voltage and the node has no current, the node is tripped through setting delay, and meanwhile, the judgment of the tripping failure of the switch is started; if the switch is switched off by a combined transformer and has no current in the time of switch failure, triggering a fault isolation success GOOSE output signal; if the node switch is not tripped in the switch failure time, triggering the switch to reject the trip GOOSE output signal;
(5) When the switch fails, the jump logic: after the node switch trips due to conventional protection or distributed FA action, judging that the switch fails to reject the trip after failure judgment time, and triggering a 'switch reject trip' GOOSE output signal for starting an adjacent side switch; when the node receives a 'switch rejection' GOOSE signal of a node at the M side or the N side, and the node switch is in an on position and is not tripped, the node switch is tripped by a malfunction joint tripping instantaneous action; if the node does not detect the fault and the trip is successful, triggering a GOOSE output signal of fault isolation success;
(6) When the power restoration logic: after the fault isolation is successful, each node in the region sequentially forwards a 'fault isolation success' GOOSE signal to two sides, and when the power supply recovery charging of the node is completed and the voltage of the power supply side and the load side is lost, the 'fault isolation success' GOOSE signal is received, and the switch of the node is started to be switched on after setting delay, so that the power supply transfer process is completed; after fault isolation is completed, a power transfer and supply process is started, load testing is required according to a power transfer and supply safety principle, a power supply recovery method is that information such as network topology, electric quantity and the like of each power distribution terminal is concentrated to a master station according to the method, the master station carries out power supply strategy solving, and finally a power supply recovery scheme is issued to each intelligent terminal to be executed.
In this embodiment, a 5G encryption chip is placed in an intelligent algorithm and a differential DTU, differential security protection is performed in an SA networking + slicing + MEC intelligent distribution network area, and the beidou positioning and encryption chip are used together, so that the function of converting the coordinate of the DTU device into a parameter encryption function is provided, which is one of the precondition security conditions for processing messages (authorization is possible only if the coordinate is consistent with a background record), and a beidou differential positioning and 5G random password double-matching security mode is provided, and the authorization is performed only if the password is consistent by using a 5G slicing + random password technology, which is also a precondition security condition for processing messages;
in order to prevent the differential protection caused by the 5G communication jitter from generating false operation and refusal operation, multi-source rechecking, PT identification and GOOSE are carried out on the judgment basis, edge calculation is carried out on the DTU body, and the comparison is carried out without error; when the line interconnection switch has a fault, the DTU communicates with an adjacent DTU, the DTU edge calculates to directly make a judgment of switching on or switching off according to the isolation condition of a fault section and whether a load switching power can be provided, and the recovery power supply of a non-fault area is completed; the encryption adopts the combination of symmetric and asymmetric encryption algorithms, an SDK development API function interface is provided by C language, the conversion of multiple types and multiple parameters is realized based on Beidou elevation coordinate conversion, and the encryption, decryption and calling of data are realized by using 5G slices and random passwords.
In order to overcome the defects of the existing wireless communication security technology, when the service data of a transformer area enters a 5G channel, whether the service data is changed or not is discovered, when a DTU and CPE are attacked by hackers and malicious codes are implanted, the dimensionality is monitored from the body security, the security access and the security, and the multiple authentication and isolation are carried out by using an end, an edge, a network and a cloud through real-time security reinforcement; according to the method, PT recognition and GOOSE channel dual-source fault judgment are adopted, the optimal solution of the load transfer supply of the transformer area is determined based on a neural network intelligent algorithm model when power supply is recovered, and a background audit agrees to issue a 5G DTU for execution, so that the DTU differential protection capability is improved.
The invention relates to a 5G chip encryption and differential method, which has the following advantages: the safety of the 5G DTU is improved by adopting a double-fit safety mode, faults are mutually proved from double sources, the method is more accurate, and misjudgment can be obviously reduced; the intelligent distributed DTU of the neural network can play a role in calculating the edge of a central logic unit, and 5G high-speed, high-capacity and low-delay business calculation and operation can greatly relieve the relay protection pressure of the power distribution network; the invention adopts CPE and the dynamic network element secret key of the core network to distribute, the position is bound and compared with the traditional static secret key, the security is higher; compared with the traditional 'residual voltage locking' for isolating faults by simply calculating overcurrent and overvoltage logic, the method has higher reliability and lower misjudgment rate, is applied to the safe communication and on-site protection of the station data of the actual power distribution of a power grid, ensures the information safety of the power grid by using end, edge, network and cloud multiple authentication, distributing CPE (customer premise equipment) and a core network dynamic network element secret key and binding with a 5G sim card in a device DTU (data terminal unit) and combining with encryption measures, adopts PT (potential transformer) identification and GOOSE (generic object oriented substation event) channel dual-source fault judgment, determines the optimal solution of station load transfer based on a neural network intelligent algorithm model when the power supply is recovered, and approves the issuing of a 5G DTU by an audit background, so that the differential protection capability of the DTU can be improved; the invention has the advantages of higher safety, realization of safe communication and on-site protection of the data of the transformer area and good reliability of double judgment.
Example 2
As shown in fig. 1-6, a 5G chip encryption and differential method includes the following steps:
step 1: firstly, anchoring a callback on a signed private network through a signed data network name, clearly locking the callback based on identity fine granularity and a network boundary, and connecting a single data packet after knocking authorization authentication;
step 2: the CPE of the front-end equipment and the dynamic network element secret key of the core network are distributed and bound with the 5G sim card in the DTU of the equipment to be combined with encryption authentication so as to carry out bidirectional 5G communication;
and step 3: the method comprises the steps that a user side is used for the first time, a main password and positioning information are input to submit to a server for registration and binding, a new password is randomly generated by a subsequent network element secret key based on password seeds and time, the method has randomness and non-guessability, and the CPE/DTU and the core network of the front-end equipment have a password generation function;
and 4, step 4: before the DTU of the front equipment is formally installed, beacon scanning is carried out, a legal beacon immobilization special communication base station channel is confirmed, and therefore the channel is not changed and the Beidou positioning position is not changed, and invasion prevention can be achieved.
The DTU in the step 2 corresponds to a current transformer to be acquired to obtain phase current and zero sequence current, GOOSE information sent by a core network is combined, differential current and brake current are compared and calculated on the basis of 5G time synchronization, when interphase short circuit and single-phase metallic grounding fault of a small-resistance grounding system occur in a protection area, a unit starts a differential protection function, circuit breakers (three-phase tripping) on two sides of a fault cable are instantaneously tripped to realize fault isolation, the two side units are connected by virtue of an information channel, sample data of each phase current are transmitted to the opposite side in real time, current sample data on the opposite side are received, and the two side protection units perform phase splitting to calculate the differential current by utilizing local and opposite side current data after synchronous processing; meanwhile, the differential protection action marks of the devices on the transmitting side and the receiving side are involved in logic judgment, and when power supply is recovered, the communication between distributed DTUs is combined, and after local and opposite side information is added in particular, an operation basis is provided for specific differential protection actions.
In this embodiment, the differential intelligent protection method of the present invention is as follows: s1: acquiring data of each distribution network subsection area from PT and GOOSE channels; s2: judging whether a fault exists according to the sampling value of the S1, if so, marking on an electric power geographic information platform by using Beidou positioning, and simultaneously giving a suggestion by combining local and opposite side information by using a neural network intelligent algorithm; (S2-1) when the protection configuration of the outgoing line switch of the transformer substation fails: the transformer substation outgoing switch is put into a three-section type overcurrent protection function, wherein overcurrent I-section protection delay is 0S, the protection range is from the outgoing switch to an FA head end switch, overcurrent III-section protection is put into the protection range, the delay is set to 0.3S, the FA system fault clearing time is mainly considered to be within 150ms, when a power distribution network system fails, the FA system is used for clearing faults, and when the FA system cannot clear the faults, the overcurrent III-section protection of the transformer substation outgoing switch is used as backup protection to complete the fault clearing function;
(S2-2) when the head end switch protection configuration fails: the head end switch needs to be additionally put into a head switch voltage-loss tripping protection function besides the distributed feeder automation function, so that the fault can be quickly isolated when the fault occurs between a power supply point and the head switch, the isolation is successful, then the isolation success is sent to the adjacent switch, when the nearest interconnection switch receives the signal, whether power supply recovery logic is met or not is judged, if the power supply recovery logic is met, power supply recovery is carried out, and if the power supply recovery logic is not met, the action is not carried out;
(S2-3) when the section switch protection configuration fails: the sectional switch is configured to have a distributed feeder automation function, a fault removal phase overcurrent fixed value and a fault removal zero sequence fixed value are set, the phase overcurrent fixed values of all the sectional switches can be set to be the same fixed value, and the fixed value is required to be larger than a short-circuit current generated by a system when any short-circuit fault occurs; all zero sequence fixed values can be set to be the same fixed value, and the fixed value is required to be larger than the grounding current generated by single-phase grounding of any position of the system (the transient grounding tripping function is proposed to be put into other grounding systems through a resistance grounding system); the section switch sends a node fault signal to an adjacent switch through a 5G channel under the condition that a fault is detected by a node, simultaneously judges whether the node fault signal of the adjacent switch is received or not, judges whether the fault occurs in the node or not according to fault removal and fault isolation logic, and takes a correct action mode;
(S2-4) when the feeder switch protection configuration fails: the feeder line protection is provided with three-section overcurrent protection, zero-sequence overcurrent protection and transient grounding tripping functions, the feeder line switch acquires an overcurrent fault signal and directly trips and sends an overcurrent latching signal to an upper-level switch, the upper-level switch is a section switch, when the section switch acquires the overcurrent latching signal, the fault is judged not to be positioned on a main line, the protection is reliable and motionless, and the feeder line switch completes the fault removal function. When the feeder switch refuses to operate, failure logic is triggered, and the failure is isolated by the superior switch failure protection in a bypassing way;
(S2-5) when the tie switch protection configuration fails: the interconnection switch is switched into a distributed feeder automation function and a local node power supply recovery function, the interconnection switch completes power supply recovery charging, receives a fault isolation success GOOSE signal after the single side of a power supply side and a load side loses voltage, starts the local node switch to switch on after setting delay, and completes a power transfer process.
The DTU identifies faults of a head end switch and a section switch, and in order to avoid the expansion of the main line fault, the DTU needs to be automatically and quickly positioned according to a preset plan to isolate the fault.
The method adopts PT recognition and GOOSE channel dual-source fault judgment, wherein the PT fault recognition method comprises the following steps: 1) When PT appears
Figure BDA0003776607830000191
When the condition (2) is satisfied, the fault occurs in the inter-phase grounding; 2) When PT appears
Figure BDA0003776607830000192
Figure BDA0003776607830000193
This is the case, which represents the occurrence of a ground fault between BC phases passing through the transition resistance.
The GOOSE channel source fault judgment basis specifically includes: (a) Firstly, counting the number of messages received in each second, and when the receiving StNum is smaller than the StNum of the local machine, if the releasing end device is restarted, updating data, otherwise, discarding the data; when the received StNum is equal to the StNum of the local machine, judging that the SqNum is increased and the data is discarded, and the SqNum is unchanged or decreased, if the release terminal device is restarted, updating the data, otherwise, discarding the data; if the received StNum is larger than the StNum of the local machine and represents that the received StNum exceeds a set value, the network is considered to exist, and a suppression function is started; wherein the start-up inhibiting function is specifically: (a1) Distinguishing GoCB on the network according to GOOSE identification and GoID in the network message, wherein the GoCB is a GoOSE control block which represents each group of GOOSE messages, calculating the number of the GOOSE messages received by each GoCB in each second, if the number of the messages received in each second is more than 200 frames, the value can be set, a device which is lower than 200 frames can process the messages without filtering once, if more than 50 frames indicate that the network is abnormal, the messages are considered to be possible, and the messages enter a suppression mode;
(b) After entering a suppression mode, establishing an aging timer, calculating CRC for the content of the data area of the GoCB, storing CRC with different calculation results in a CRC value cache table, receiving a repeated message with the same CRC value as that in the cache table within more than 1s, emptying the CRC value cache table, and receiving a message with a new CRC value; the entering the suppression mode specifically includes: (b1) Establishing an aging timer, wherein aging refers to that the message is old and can be discarded and replaced, the time of the timer is set to be 1s, an effective message can be mixed in the message, the effective message can be ensured not to be lost through the setting of 1s, the CRC of the content of a GOOSE message data area is calculated by adopting a CRC-32 algorithm, because a filtering mechanism is to discard the message with the consistent content of the GOOSE message data area of the same GoCB, the value, the quality and the time of the data area are only calculated, the calculated result is compared with the CRC stored in a CRC value cache table, if the comparison is not consistent, the calculated result is recorded in the table, otherwise, the message is discarded, the CRC cache table is cleared for more than 1s, and the CRC of the content of the GOOSE message data area is calculated and is directly filled into a new CRC cache table;
(c) After entering a suppression mode, filtering the message, and processing 2 frames of GOOSE messages at most every 9ms, wherein the GOOSE messages are respectively a 9ms first frame and a first frame inconsistent with the CRC value of a first frame data area; the method specifically comprises the following steps: (c1) After entering the inhibition mode, in order to ensure the performance of the CPU, the CPU is not seized by the messages, so that only 2 frames of GOOSE messages are processed every 9ms, namely the first frame message received every 9ms and the first frame message with the CRC value inconsistent with the CRC value in the cache table, and the messages with more than 2 frames are discarded; the message is processed once every 9ms, no pressure is applied to the CPU, and meanwhile, if the correct message transmission exists within 9ms, the device can also correctly process the message because the CRC is inconsistent with the CRC of the message, so that the normal GOOSE message processing under the environment is ensured, the requirement on the normal trip action time can be met, and the influence of the message on the CPU efficiency can be restrained.
The dynamic password in the step 3 comprises a time factor, a position factor and an event factor, and the dynamic password and the equipment position are combined, so that the safety of power grid communication is ensured.
The method determines the optimal solution of the platform area load transfer based on the neural network intelligent algorithm model when the power supply is recovered: when a line has a fault, the switch at the contact position completes the recovery of power supply in a non-fault area according to the isolation condition of a fault section and the judgment of whether the switch can have load transfer power to perform switching-on or keep switching-off, the whole process is completed before the reclosing of the outgoing line breaker of the transformer substation, and when a plurality of contact switches exist at the same time, the load transfer can be performed on the plurality of contact switches according to the priority order.
The method determines the optimal solution of the platform area load transfer based on the neural network intelligent algorithm model when the power supply is recovered: when a power distribution network system has a short-circuit fault, in the process of power supply recovery of the power distribution network system, generally closing an interconnection switch directly or indirectly connected with a healthy power loss area, and correspondingly closing a section switch in a power failure area so as to recover power supply to a non-fault area and maintain the radial structure of the power distribution network, wherein the essence of power supply recovery is to change the on/off states of the interconnection switch and the section switch in the network on the premise of meeting various operation constraints of the power distribution network, and find a power loss area recovery power supply scheme for realizing one or more optimization targets, which belongs to the switch combination optimization problem of the interconnection switch/section switch, so that the essence of power supply recovery of the power distribution network is a multi-target and multi-constraint nonlinear combination optimization problem, and the mathematical model is as follows:
(1) Maximum recoverable electrical load capacity:
Figure BDA0003776607830000211
wherein M is i The load size of the power-off area; lambda [ alpha ] i The weight coefficient is the load i in the outage region and represents the priority level of the load; n is a load set of all unrecovered power supplies of the system;
(2) Minimum number of switching operations:
Figure BDA0003776607830000212
wherein, T s A set of pre-fault tie switches; s s Is a set of pre-fault sectionalizers; k k The state of the switch, 1 represents closing and 0 represents opening;
(3) Minimum line loss:
Figure BDA0003776607830000213
wherein, I i Is the effective value of the branch; r i Is a branch resistance; n is a radical of i The branch circuits in the feeder line related to power supply recovery can be selected in actual calculation for the total number of the branch circuits of the whole system;
(4) The load distribution of the feeder lines is balanced as much as possible:
Figure BDA0003776607830000214
wherein S is i For feeder i sending end apparent power, S imax Is the maximum allowed apparent power of feeder i, and M is the number of feeders;
(5) The average power failure time of a user is as small as possible: y is 5 = min (AITC), wherein AITC is user average power off time;
(6) And recovering the network power flow constraint of power supply:
Figure BDA0003776607830000215
wherein, P i +jQ i Injection power for node i;
Figure BDA0003776607830000216
voltages of nodes i and j, respectively;
Figure BDA0003776607830000217
is the mutual admittance between the nodes i and j;
(7) Branch capacity restriction of restoration power supply: i P l |≤P lmax Wherein P is l Is the active power flowing through branch l; p lmax Is the maximum capacity of branch l;
(8) Restoring node voltage constraints of power supply: u shape i.min ≤U i ≤U i.max Wherein, U i.min 、U i.max In order to ensure the minimum value and the maximum value of the voltage of the node i when the distribution network normally operates.
The method is characterized in that when power supply is recovered, the fault detection related logic based on the neural network intelligent algorithm model specifically comprises the following steps:
(1) When the node fault detection logic: when a distribution network has a fault, the phase current flowing through a non-feeder line of the node is greater than a setting fixed value or the zero sequence current is greater than the setting fixed value, the node fault is judged, a node fault GOOSE output signal is triggered instantly, the signal is kept along with an overcurrent state, meanwhile, in order to ensure reliability, the shortest time of state keeping after signal triggering should be greater than 300ms, when a feeder switch detects the fault, the node fault GOOSE output signal is tripped directly and triggered instantly, the signal is kept along with the overcurrent state, in order to ensure reliability, the shortest time of state keeping after signal triggering should be greater than 300ms;
(2) When the fault removal logic: when the system has a fault, if the node is not a last switch and the phase current is greater than a setting fixed value or the zero-sequence current is greater than the setting fixed value, and nodes on one side and only one side of the nodes on the M side and the N side do not send out a node fault GOOSE signal, the node switch is tripped after the set fault is cut off and delayed; if the node is a last switch, the phase current is greater than a setting fixed value or the zero sequence current is greater than the setting fixed value, and a node fault GOOSE signal of any node of the M side and the N side is received, the node is tripped after setting delay; if the node switch is not tripped in the switch failure time, triggering the switch to reject the trip GOOSE output signal; latching the fault removal logic when an overcurrent latching signal of the feeder switch is received;
(3) When the fault isolation logic: if the node does not detect a fault and receives a 'node fault' GOOSE signal with only one node on the M side or the N side, the node switch is tripped after setting delay, and the last switch completes fault isolation according to the logic requirement; if the switch is switched off by a combined transformer and has no current in the time of switch failure, triggering a fault isolation success GOOSE output signal; if the node switch is not tripped in the switch failure time, triggering the switch to reject the trip GOOSE output signal; latching the fault isolation logic when receiving a feeder switch overcurrent latching signal;
(4) When the first switch is in a voltage loss protection logic: when the distributed FA function is put into use, the node is a first switch and GOOSE communication of the node is normal, if the switch is switched on and the voltage of a line is 3s, the first switch is automatically put into use for voltage loss protection, the fault can be quickly isolated when the fault occurs between a power supply point and the first switch, and after the voltage loss protection of the first switch is put into use, if both sides of the node are not voltage and the node has no current, the node is tripped through setting delay, and meanwhile, the judgment of the tripping failure of the switch is started; if the switch is switched off by a combined transformer and has no current in the time of switch failure, triggering a fault isolation success GOOSE output signal; if the node switch is not tripped in the switch failure time, triggering the switch to reject the trip GOOSE output signal;
(5) When the switch fails, the jump logic: after the node switch trips due to conventional protection or distributed FA actions, judging that the switch fails and rejects after failure judgment time, and triggering a 'switch rejecting trip' GOOSE output signal for starting an adjacent side switch; when the node receives a 'switch rejection' GOOSE signal of a node at the M side or the N side, and the node switch is in an on position and is not tripped, the node switch is tripped by a malfunction joint tripping instantaneous action; if the node does not detect the fault and the trip is successful, triggering a fault isolation success GOOSE output signal;
(6) When the power restoration logic: after the fault isolation is successful, each node in the area sequentially forwards a 'fault isolation success' GOOSE signal to two sides, and after the power supply recovery charging of the node is completed and the voltage of one side of the power supply side and the load side is lost, the 'fault isolation success' GOOSE signal is received, and after setting delay, the switch of the node is started to be switched on to complete the power supply transfer process; after fault isolation is completed, a power transfer and supply process is started, load testing is required according to a power transfer and supply safety principle, a power supply recovery method is that information such as network topology, electric quantity and the like of each power distribution terminal is concentrated to a master station according to the method, the master station carries out power supply strategy solving, and finally a power supply recovery scheme is issued to each intelligent terminal to be executed.
The invention relates to a 5G chip encryption and differential method, which has the following advantages: the safety of the 5G DTU is improved by adopting a double-fit safety mode, faults are mutually proved from double sources, the method is more accurate, and misjudgment can be obviously reduced; the intelligent distributed DTU of the neural network can play a role in calculating the edge of a central logic unit, and can greatly relieve the relay protection pressure of the power distribution network by adding 5G high-speed, high-capacity and low-delay service calculation and operation; the invention adopts CPE and the dynamic network element secret key of the core network to distribute, the position is bound and compared with the traditional static secret key, the security is higher; compared with the traditional 'residual voltage locking' method for isolating faults by simply calculating overcurrent and overvoltage logic, the double-judgment method (double-fault judgment and load conversion capacity) is higher in reliability and lower in misjudgment rate; the invention has the advantages of higher safety, realization of safe communication and on-site protection of the data of the transformer area and good reliability of double judgment.

Claims (9)

1. A5G chip encryption and differential method is characterized in that: the method comprises the following steps:
step 1: firstly, anchoring a callback on a signed private network through a signed data network name, clearly locking the callback based on identity fine granularity and a network boundary, and connecting a single data packet after knocking authorization authentication;
step 2: the CPE of the front-end equipment and the dynamic network element secret key of the core network are distributed and bound with the 5G sim card in the DTU of the equipment to be combined with encryption authentication so as to carry out bidirectional 5G communication;
and step 3: the method comprises the steps that a user side is used for the first time, a main password and positioning information are input to submit to a server for registration and binding, a new password is randomly generated by a subsequent network element secret key based on password seeds and time, the method has randomness and non-guessability, and the CPE/DTU and the core network of the front-end equipment have a password generation function;
and 4, step 4: before the DTU of the front-end equipment is formally installed, beacon scanning is carried out, a legal beacon immobilization special communication base station channel is confirmed, and therefore the fact that one of safety communication guarantee preconditions is that the channel is unchanged and the Beidou positioning position is unchanged is guaranteed, and invasion prevention can be achieved.
2. The encryption and differential method for 5G chip according to claim 1, wherein: the DTU in the step 2 corresponds to a current transformer to be acquired to obtain phase current and zero sequence current, GOOSE information sent by a core network is combined, differential current and brake current are compared and calculated on the basis of 5G time synchronization, when interphase short circuit and single-phase metallic grounding fault of a small-resistance grounding system occur in a protection area, a unit starts a differential protection function, circuit breakers (three-phase tripping) on two sides of a fault cable are instantaneously tripped to realize fault isolation, the two side units are connected by virtue of an information channel, sample data of each phase current are transmitted to the opposite side in real time, current sample data on the opposite side are received, and the two side protection units perform phase splitting to calculate the differential current by utilizing local and opposite side current data after synchronous processing; meanwhile, the differential protection action marks of the devices on the transmitting side and the receiving side are involved in logic judgment, and when power supply is recovered, the communication between distributed DTUs is combined, and after local and opposite side information is added in particular, an operation basis is provided for specific differential protection actions.
3. The encryption and differential method for 5G chip according to claim 2, wherein: the DTU identifies faults of a head end switch and a section switch, and in order to avoid the expansion of the main line fault, the DTU needs to be automatically and quickly positioned according to a preset plan to isolate the fault.
4. The encryption and differential method for 5G chip according to claim 3, wherein: the method adopts PT recognition and GOOSE channel dual-source fault judgment, wherein the PT fault recognitionThe method comprises the following steps: 1) When PT appears
Figure FDA0003776607820000021
When the condition (2) is satisfied, the fault occurs in the inter-phase grounding; 2) When PT appears
Figure FDA0003776607820000022
This is the case, which represents the occurrence of a ground fault between BC phases passing through the transition resistance.
5. The encryption and differential method for 5G chip according to claim 4, wherein: the GOOSE channel source fault judgment basis specifically includes: (a) Firstly, counting the number of messages received in each second, and when the receiving StNum is smaller than the StNum of the local machine, if the releasing end device is restarted, updating data, otherwise, discarding the data; when the received StNum is equal to the StNum of the local machine, judging that the SqNum is increased and the data is discarded, and the SqNum is unchanged or decreased, if the release terminal device is restarted, updating the data, otherwise, discarding the data; if the received StNum is larger than the StNum of the local machine and represents that the received StNum exceeds a set value, the network is considered to exist, and a suppression function is started; wherein the turn-on suppression function is specifically: (a1) Distinguishing GoCB on the network according to GOOSE identification and GoID in the network message, wherein the GoCB is a GoOSE control block which represents each group of GOOSE messages, calculating the number of the GOOSE messages received by each GoCB in each second, if the number of the messages received in each second is more than 200 frames, the value can be set, a device which is lower than 200 frames can process the messages without filtering once, if more than 50 frames indicate that the network is abnormal, the messages are considered to be possible, and the messages enter a suppression mode;
(b) After entering a suppression mode, establishing an aging timer, calculating CRC for the content of the data area of the GoCB, storing CRC with different calculation results in a CRC value cache table, receiving a repeated message with the same CRC value as that in the cache table within more than 1s, emptying the CRC value cache table, and receiving a message with a new CRC value; the entering the suppression mode specifically includes: (b1) Establishing an aging timer, wherein aging refers to that the message is old and can be discarded and replaced, the time of the timer is set to be 1s, an effective message can be mixed in the message, the effective message can be ensured not to be lost through the setting of 1s, the CRC of the content of a GOOSE message data area is calculated by adopting a CRC-32 algorithm, because a filtering mechanism is to discard the message with the consistent content of the GOOSE message data area of the same GoCB, the value, the quality and the time of the data area are only calculated, the calculated result is compared with the CRC stored in a CRC value cache table, if the comparison is not consistent, the calculated result is recorded in the table, otherwise, the message is discarded, the CRC cache table is cleared for more than 1s, and the CRC of the content of the GOOSE message data area is calculated and is directly filled into a new CRC cache table;
(c) After entering a suppression mode, filtering the message, and processing 2 frames of GOOSE messages at most every 9ms, wherein the GOOSE messages are respectively a 9ms first frame and a first frame inconsistent with the CRC value of a first frame data area; the method comprises the following specific steps: (c1) After entering the inhibition mode, in order to ensure the performance of the CPU, the CPU is not seized by the messages, so that only 2 frames of GOOSE messages are processed every 9ms, namely the first frame message received every 9ms and the first frame message with the CRC value inconsistent with the CRC value in the cache table, and the messages with more than 2 frames are discarded; the message is processed once every 9ms, no pressure is applied to the CPU, and meanwhile, if the correct message transmission exists within 9ms, the device can also correctly process the message because the CRC is inconsistent with the CRC of the message, so that the normal GOOSE message processing under the environment is ensured, the requirement on the normal trip action time can be met, and the influence of the message on the CPU efficiency can be restrained.
6. The encryption and differential method for 5G chip according to claim 1, wherein: the dynamic password in the step 3 comprises a time factor, a position factor and an event factor, and the dynamic password and the equipment position are combined, so that the safety of power grid communication is ensured.
7. The encryption and differential method for 5G chip according to claim 1, wherein: the method comprises the following steps of determining a platform area load transfer optimal solution based on a neural network intelligent algorithm model when power supply is recovered: when a line has a fault, the switch at the contact position completes the recovery of power supply in a non-fault area according to the isolation condition of a fault section and the judgment of whether the switch can have load transfer power to perform switching-on or keep switching-off, the whole process is completed before the reclosing of the outgoing line breaker of the transformer substation, and when a plurality of contact switches exist at the same time, the load transfer can be performed on the plurality of contact switches according to the priority order.
8. The encryption and differential method for 5G chip according to claim 7, wherein: the method determines the optimal solution of the platform area load transfer based on the neural network intelligent algorithm model when the power supply is recovered: when a power distribution network system has a short-circuit fault, in the process of power supply recovery of the power distribution network system, generally closing an interconnection switch directly or indirectly connected with a healthy power loss area, and correspondingly closing a section switch in a power failure area so as to recover power supply to a non-fault area and maintain the radial structure of the power distribution network, wherein the essence of power supply recovery is to change the on/off states of the interconnection switch and the section switch in the network on the premise of meeting various operation constraints of the power distribution network, and find a power loss area recovery power supply scheme for realizing one or more optimization targets, which belongs to the switch combination optimization problem of the interconnection switch/section switch, so that the essence of power supply recovery of the power distribution network is a multi-target and multi-constraint nonlinear combination optimization problem, and the mathematical model is as follows:
(1) Maximum recoverable electrical load capacity:
Figure FDA0003776607820000041
wherein M is i The size of the load of the power outage region; lambda i The weight coefficient is the load i in the outage region and represents the priority level of the load; n is a load set of all unrecovered power supplies of the system;
(2) Minimum number of switching operations:
Figure FDA0003776607820000042
wherein, T s A set of pre-fault tie switches; s. the s Is a set of pre-fault sectionalizers; k k The state of the switch, 1 represents closing and 0 represents opening;
(3) Minimum line loss:
Figure FDA0003776607820000043
wherein,I i Is the effective value of the branch; r i Is a branch resistance; n is a radical of i The branch circuits in the feeder line related to power supply recovery can be selected in actual calculation for the total number of the branch circuits of the whole system;
(4) The load distribution of the feeder lines is balanced as much as possible:
Figure FDA0003776607820000044
wherein S is i For feeder i sending end apparent power, S imax M is the number of feeders i, the maximum allowed apparent power of the feeder i;
(5) Average user outage time is as small as possible: y is 5 = min (AITC), wherein AITC is user average power off time;
(6) And recovering the network power flow constraint of power supply:
Figure FDA0003776607820000051
wherein, P i +jQ i Injection power for node i;
Figure FDA0003776607820000052
voltages of nodes i and j, respectively;
Figure FDA0003776607820000053
is the mutual admittance between the nodes i and j;
(7) Branch capacity restriction of restoration power supply: | P l |≤P lmax Wherein, P l Is the active power flowing through branch l; p lmax Maximum capacity for branch l;
(8) Restoring node voltage constraints of power supply: u shape i.min ≤U i ≤U i.max Wherein, U i.min 、U i.max In order to ensure the minimum value and the maximum value of the voltage of the node i when the distribution network normally operates.
9. The 5G chip encryption and differential method according to claim 8, wherein: the method is characterized in that when power supply is recovered, the fault detection related logic based on the neural network intelligent algorithm model specifically comprises the following steps:
(1) When the node fault detection logic: when a distribution network has a fault, the phase current flowing through a non-feeder line of the node is greater than a setting fixed value or the zero sequence current is greater than the setting fixed value, the node fault is judged, a node fault GOOSE output signal is triggered instantaneously, the signal is kept along with an overcurrent state, meanwhile, in order to guarantee reliability, the shortest time for keeping the state after the signal is triggered is greater than 300ms, when a feeder line switch detects the fault, the node fault GOOSE output signal is directly tripped and triggered instantaneously, the signal is kept along with the overcurrent state, in order to guarantee reliability, the shortest time for keeping the state after the signal is triggered is greater than 300ms;
(2) When the fault removal logic: when the system has a fault, if the node is not a last switch and the phase current is greater than a setting fixed value or the zero-sequence current is greater than the setting fixed value, and nodes on one side and only one side of the nodes on the M side and the N side do not send out a node fault GOOSE signal, the node switch is tripped after the set fault is cut off and delayed; if the node is a last switch, the phase current is greater than a setting fixed value or the zero sequence current is greater than the setting fixed value, and a node fault GOOSE signal of any node of the M side and the N side is received, the node is tripped after setting delay; if the node switch is not tripped in the switch failure time, triggering the switch trip-resistant GOOSE output signal; latching fault removal logic when a feeder switch overcurrent latch signal is received;
(3) When the fault isolation logic: if the node does not detect a fault and receives a 'node fault' GOOSE signal with only one node on the M side or the N side, the node switch is tripped after setting delay, and the last switch completes fault isolation according to the logic requirement; if the switch is switched off by a combined transformer and has no current in the time of switch failure, triggering a fault isolation success GOOSE output signal; if the node switch is not tripped in the switch failure time, triggering the switch to reject the trip GOOSE output signal; latching the fault isolation logic when receiving a feeder switch overcurrent latching signal;
(4) When the first switch is in a voltage loss protection logic: when the distributed FA function is put into use, the node is a first switch and GOOSE communication of the node is normal, if the switch is switched on and the voltage of a line is 3s, the first switch is automatically put into use for voltage loss protection, the fault can be quickly isolated when the fault occurs between a power supply point and the first switch, and after the voltage loss protection of the first switch is put into use, if both sides of the node are not voltage and the node has no current, the node is tripped through setting delay, and meanwhile, the judgment of the tripping failure of the switch is started; if the switch is switched from a closed state to an open state within the switch failure time and no current flows, triggering a GOOSE output signal of failure isolation success; if the node switch is not tripped in the switch failure time, triggering the switch to reject the trip GOOSE output signal;
(5) When the switch fails, the trip logic: after the node switch trips due to conventional protection or distributed FA actions, judging that the switch fails and rejects after failure judgment time, and triggering a 'switch rejecting trip' GOOSE output signal for starting an adjacent side switch; when the node receives a 'switch tripping rejection' GOOSE signal of a node at the M side or the N side, and the node switch is in an on position and is not tripped, the node switch is tripped by a failure joint tripping instantaneous action; if the node does not detect the fault and the trip is successful, triggering a GOOSE output signal of fault isolation success;
(6) When the power restoration logic: after the fault isolation is successful, each node in the area sequentially forwards a 'fault isolation success' GOOSE signal to two sides, and after the power supply recovery charging of the node is completed and the voltage of one side of the power supply side and the load side is lost, the 'fault isolation success' GOOSE signal is received, and after setting delay, the switch of the node is started to be switched on to complete the power supply transfer process; after fault isolation is completed, a power transfer and supply process is started, load testing is required according to a power transfer and supply safety principle, a power supply recovery method is that information such as network topology, electric quantity and the like of each power distribution terminal is concentrated to a master station according to the method, the master station carries out power supply strategy solving, and finally a power supply recovery scheme is issued to each intelligent terminal to be executed.
CN202210918421.7A 2022-08-01 2022-08-01 5G chip encryption and differential method Pending CN115243253A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210918421.7A CN115243253A (en) 2022-08-01 2022-08-01 5G chip encryption and differential method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210918421.7A CN115243253A (en) 2022-08-01 2022-08-01 5G chip encryption and differential method

Publications (1)

Publication Number Publication Date
CN115243253A true CN115243253A (en) 2022-10-25

Family

ID=83677629

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210918421.7A Pending CN115243253A (en) 2022-08-01 2022-08-01 5G chip encryption and differential method

Country Status (1)

Country Link
CN (1) CN115243253A (en)

Similar Documents

Publication Publication Date Title
US20200412167A1 (en) Method and system for fast reconfiguration of power supply network in tens of milliseconds after power grid failure
CN107947134A (en) A kind of type on the spot overlaps formula singlephase earth fault positioning isolation and restoration methods
CN107204663B (en) Backup protection method for distributed intelligent power distribution network
CN112165090A (en) Cooperative self-healing system and method
CN109004631B (en) Network-based power distribution network self-adaptive backup protection control method
CN111786364A (en) Distributed complex power distribution network fault rapid self-healing control method and system
CN112821560B (en) Distributed self-healing protection method for overhead line distribution network
CN111682508A (en) Differential protection and rapid self-healing method suitable for regional power distribution network
CN109245072B (en) Self-adaptive in-situ feeder automation fault processing method based on regional sequence number
CN108683161B (en) Differential backup protection method applied to intelligent power distribution network
CN106684822A (en) Transformer dead-zone fault protection method and breaker failure protection method
CN107134761A (en) A kind of power distribution network distributed intelligence control method based on regional agency pattern
CN114256819B (en) Terminal-based self-healing control method for platform area
Wei et al. Distribution system protection with communication technologies
CN109510192B (en) Power distribution network and self-healing method thereof
CN106787131B (en) A kind of two rank region spare power automatic switching system and prepared auto restart control method
CN114157018B (en) Distributed feeder automation recovery method based on line load rate and peer-to-peer communication
CN115243253A (en) 5G chip encryption and differential method
CN113629672A (en) Method and device for rapidly and intelligently isolating faults of power distribution network in zero second after overcurrent
CN112271711A (en) Distributed fault protection method and device for transformer substation
CN107069707B (en) A kind of feeder automation fault handling method
CN108493928B (en) Distributed feeder automation distribution line topology ad hoc network method
CN114614451B (en) Remote backup protection method, protection device and hierarchical relay protection system for station domain layer
CN114362374B (en) Method and system for preventing contact switch from being switched on after active load shedding of distribution network
Chen et al. Research and Application of the Scheme of Relay Protection and Self-healing for Distribution Network Based on 5G

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination