• HOME
  • About Journal
    • Historical evolution
    • Journal Honors
  • Editorial Board
    • Members of Committee
    • Director of the Committee
    • President and Editor in chief
  • Submission Guide
    • Instructions for Authors
    • Manuscript Processing Flow
    • Model Text
    • Procedures for Submission
  • Academic Influence
  • Open Access
  • Ethics&Policies
    • Publication Ethics Statement
    • Peer Review Process
    • Academic Misconduct Identification and Treatment
    • Advertising and Marketing
    • Correction and Retraction
    • Conflict of Interest
    • Authorship & Copyright
  • Contact Us
  • Chinese
Site search        
文章摘要
用电信息采集系统中集中器脆弱性分析
Vulnerability analysis of concentrator in AMR/AMI
Received:February 19, 2019  Revised:March 04, 2019
DOI:10.19753/j.issn1001-1390.2020.08.020
中文关键词: 采集终端  脆弱性  非法入侵  安全防御
英文关键词: acquisition terminal, vulnerability, illegal intrusion, security defens
基金项目:基于博弈论的不确定信息下电力虚假数据攻击与防御行为特征研究
Author NameAffiliationE-mail
Dong Chongchong State Grid Hubei Electric Power Co., Ltd. Metrology Center 1191241626@qq.com 
Xia Shuibin State Grid Hubei Electric Power Co., Ltd. Metrology Center 1510879435@qq.com 
Sun Bingyu State Grid Hubei Electric Power Co., Ltd. Metrology Center 525036951@qq.com 
He Huan State Grid Hubei Electric Power Co., Ltd. Metrology Center 775172722@qq.com 
Yu He State Grid Hubei Electric Power Co., Ltd. Metrology Center 1480968003@qq.com 
Zhang Long* School of Electronic Information, Wuhan University 1020473235@qq.com 
Hits: 1781
Download times: 537
中文摘要:
      用电信息采集系统中集中器起着至关重要的作用,然而其系统本身面临诸如硬件攻击、软件漏洞、网络攻击的安全性威胁。文中首先讨论了集中器的的构成、特点、功能及其安全问题,然后分析了集中器的脆弱性问题的来源、易受到的攻击方式及相对应的预防措施。最后,以通过对集中器的控制实现对主站的攻击为例,采用MD5withRSA数字签名算法从集中器安全防护入手解决非法入侵主站的问题,结合其通信的特点以及存在的脆弱点进行保护,与以往的方法对比提高了其运行的安全性。
英文摘要:
      The concentrator in AMR/AMI plays a vital role , but the system itself faces security threats such as hardware attacks, software vulnerabilities, and network attacks. This paper first discusses the composition, characteristics, functions and security of the concentrator, and then analyzes the source of the concentrator''s vulnerability, the vulnerable attack methods and the corresponding preventive measures. Finally, taking the attack on the primary station by controlling the concentrator as an example, the problem of illegally invading the primary station is solved from the aspects of intrusion detection and protection, and the characteristics of the communication and the existing vulnerable points are protected, and the previous method. Contrast improves the security of its operation.
View Full Text   View/Add Comment  Download reader
Close
  • Home
  • About Journal
    • Historical evolution
    • Journal Honors
  • Editorial Board
    • Members of Committee
    • Director of the Committee
    • President and Editor in chief
  • Submission Guide
    • Instructions for Authors
    • Manuscript Processing Flow
    • Model Text
    • Procedures for Submission
  • Academic Influence
  • Open Access
  • Ethics&Policies
    • Publication Ethics Statement
    • Peer Review Process
    • Academic Misconduct Identification and Treatment
    • Advertising and Marketing
    • Correction and Retraction
    • Conflict of Interest
    • Authorship & Copyright
  • Contact Us
  • 中文页面
Address: No.2000, Chuangxin Road, Songbei District, Harbin, China    Zip code: 150028
E-mail: dcyb@vip.163.com    Telephone: 0451-86611021
© 2012 Electrical Measurement & Instrumentation
黑ICP备11006624号-1
Support:Beijing Qinyun Technology Development Co., Ltd