Background
The electric power internet of things mainly comprises a sensing layer, a network layer, a platform layer and an application layer from bottom to top, and main entities comprise an electric power internet of things terminal of the sensing layer, electric power internet of things terminal edge access equipment of the network layer and various service entities of the platform layer. In order to ensure the information security of the electric power internet of things system, an identity authentication system needs to be established for the electric power internet of things system. The existing identity authentication system mainly uses a Public Key Infrastructure (PKI) system based on a digital certificate, however, the PKI system is complex to use, in the power internet of things system, a power internet of things terminal manufacturer, a power internet of things edge access device provider and various service providers (ServiceProvider, SP) need to respectively construct their own root CA and sub-CA, so that the implementation of interconnection is complex, and the identity certificate needs to be verified on line during entity communication identity authentication. In order to ensure the information security of the electric power internet of things system, an identity authentication system needs to be established for the electric power internet of things system. The existing identity authentication system mainly uses a Public Key Infrastructure (PKI) system based on a digital certificate, however, the PKI system is complex to use, in the electric power internet of things system, an electric power internet of things terminal manufacturer, an electric power internet of things edge access equipment provider and various service providers (ServiceProvider, SP) need to respectively construct a self-based CA and a self-based sub-CA, so that the realization of interconnection and intercommunication is complex, and the identity certificate needs to be verified on line during entity communication identity authentication, and the complex interconnection and intercommunication process is difficult to meet the application of the electric power internet of things system;
in the information transmission of the power physical network, the most common example is that manual meter reading is gradually replaced by remote automatic meter reading, namely, the electricity utilization information of an electricity meter is collected; at present, most of electric meters used by domestic and foreign users are electronic electric energy meters, for example: single-phase electric energy meter, two-phase electric energy meter and three electric energy meters. Most domestic intelligent electric meters adopt a DL/T645 protocol, the protocol is designed primarily, only the integrity of functions and the reliability of electric meter data transmission are considered, and excessive consideration is not made for the safety of data. The intelligent electric meter has the following problems when collecting data and transmitting the data. The data acquisition unit and the intelligent electric meter lack identity authentication and authority discrimination, the data of the intelligent electric meter is acquired by the data acquisition unit and collected by the data aggregator and then transmitted to the data storage center, and in the process, the data acquired by the intelligent electric meter is transmitted in a plaintext form. An illegal person attacks the communication network by a man-in-the-middle attack means to obtain the control authority, and eavesdropping and intercepting the metering data to cause the disorder of the metering data and the error of the key parameter. This will cause leakage of electricity consumption information and cause immeasurable loss in the aspects of user and power grid pricing. Therefore, an information transmission device based on encrypted communication authentication of the power internet of things is provided.
Disclosure of Invention
The invention aims to provide an information transmission device based on encrypted communication authentication of the power internet of things, and the information transmission device is used for solving the problems in the background technology.
In order to achieve the purpose, the invention provides the following technical scheme: an information transmission device based on encrypted communication authentication of an electric power internet of things comprises an electric quantity charging module, an information transmission module and a plurality of intelligent electric meters, wherein the electric quantity charging module and the electric quantity charging module are used for collecting power utilization information of the intelligent electric meters; the information transmission module is used for uploading the electricity utilization information to a cloud server; and the information transmission module performs data encryption protection through an encryption module when transmitting the electricity utilization information.
Preferably, the encryption module comprises a plurality of groups of data transmission channels, the data transmitted by each group of data transmission channels are the same, a plurality of groups of power consumption data respectively enter the information transmission module for data processing, and the processed data are retransmitted to the cloud server;
the cloud server is internally provided with a comparison module, and multiple groups of data are compared through the comparison module.
Preferably, each group of data transmission channels is provided with different encryption algorithms, and the corresponding information transmission module for receiving data is provided with a decryption algorithm corresponding to the encryption algorithm.
Preferably, an encryption algorithm and a decryption algorithm are also set between the same information transmission module and the cloud server.
Preferably, each set of the encryption algorithm and the decryption algorithm are different.
Preferably, the comparison module verifies and compares different data, and uploads a plurality of groups of same data to the cloud server.
Preferably, the cloud server sends the wrong electricity utilization information to the mobile phone of the user, and the user can send the correct electricity utilization information to the cloud server by observing the electricity meter.
An intelligent ammeter comprises the information transmission device, wherein the ammeter electricity utilization information display adopts an LED diode to carry out digital display, the LED diode is controlled by a control chip, a digital keyboard used for inputting verification codes is arranged on a point meter, and when correct verification codes are input, the control chip can control the LED diode to display electricity utilization information.
Compared with the prior art, the invention has the beneficial effects that:
1. in addition, additional data, namely an encryption algorithm and a decryption algorithm, are added in the data transmission process, so that the data security is improved, and in addition, the data tampering difficulty is effectively avoided by adopting the data comparison mode.
2. According to the invention, through a mode of feeding back the information of the electric meter by the user, namely under the condition that the data is tampered, the cloud server can still obtain correct electric meter information, so that the possibility that the data cannot be correctly counted due to tampering is avoided.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-4, the present invention provides a technical solution: an information transmission device based on encrypted communication authentication of an electric power internet of things comprises an electric quantity charging module, an information transmission module 3 and a plurality of intelligent electric meters 11, wherein the electric quantity charging module and the electric quantity charging module are used for collecting electricity utilization information of the intelligent electric meters 11; the information transmission module 3 is used for uploading the electricity utilization information to the cloud server 5; and the information transmission module 3 performs data encryption protection through the encryption module 2 when transmitting the electricity utilization information.
The encryption module 2 comprises a plurality of groups of data transmission channels, the data transmitted by each group of data transmission channels are the same, a plurality of groups of power consumption data respectively enter the information transmission module 3 for data processing, and the processed data are retransmitted to the cloud server 5;
the cloud server 5 is internally provided with a comparison module, and a plurality of groups of data are compared through the comparison module.
In order to avoid data tampering, data collected by the electric quantity charging module are divided into multiple parts, the multiple parts of data are the same, four groups of the same data can be adopted, namely the same group of data are duplicated into four parts by using a control chip, the four parts of data are respectively transmitted to the information transmission module 3 through different transmitters, the four groups of data are transmitted to the cloud server 5 by the same information transmission module 3, the four groups of data are compared by the comparison module 9 arranged on the cloud server 5, if the comparison results of the four groups of data are the same, the data are not tampered, if the four groups of data are different, the data are tampered, and the possibility of tampering can be improved by arranging four groups of data transmission channels.
The electric quantity acquisition module can adopt a meter reader, a GPRS transmission module and the like, the meter reader is respectively connected with the GPRS transmission module and the ammeter 11, and the same information transmission module 3 is provided with a GPRS receiving module for receiving information; the GPRS network and the internet are based on IP protocols and can be connected to each other, so that the information transmission is more convenient than general wireless transmission.
Preferably, each group of the data transmission channels is provided with different encryption algorithms 8, and the information transmission module 3 corresponding to the data transmission channels and used for receiving the data is provided with a decryption algorithm 7 corresponding to the encryption algorithm 8.
In order to prevent multiple groups of data from being simultaneously tampered, an encryption algorithm 8 is added in each data transmission process, namely the encryption algorithm 8 is added in the power utilization information, and the encryption algorithm 8 can be decrypted only through a decryption algorithm 7 on the information transmission module 3, so that the data are obtained.
An encryption algorithm 8 and a decryption algorithm 7 are also provided between the same information transmission module 3 and the cloud server 5.
Each set of said encryption 8 and decryption 7 algorithms is different.
In order to reduce the possibility of the decryption algorithm 7 being broken, both the encryption algorithm 8 and the decryption algorithm 7 on the different data transmission paths are set to be of different types, which algorithms may randomly use the existing encryption algorithm 8.
The data encryption algorithm 8 and the cryptographic algorithm are the general names of the encryption algorithm 8 and the decryption algorithm 7, and are the core of the cryptosystem. A cryptographic algorithm can be seen as a combination of exchanges. When the input is plaintext, the output is ciphertext after the transformation. This is the process of the encryption exchange, in which case the cryptographic algorithm is referred to as encryption algorithm 8. On the contrary, when the input is the ciphertext, the ciphertext is output as the plaintext through the cryptographic transformation, which is the process of the decryption exchange, and the cryptographic algorithm is called as the decryption algorithm 7. The common encryption algorithm 8 is: AES, RSA/ECC, Diffie-hellman, SHA-1/SHA-256.
DES can be used here to generate a maximum packet size of 64 bits using a 56-bit key and the 8 th bit of each group of additional 8-bit parity bits as parity bits. This is an iterative block cipher using a technique known as Feistel in which the encrypted text block is divided in half. Applying a round function to one half of the sub-keys, and then performing exclusive-or operation on the output and the other half; the two halves are then swapped and the process continues, but the last cycle is not swapped. DES uses 16 rounds of rotation, uses XOR, permutation, substitution, and shift operations, four basic operations.
The comparison module 9 performs verification and comparison on different data, and uploads a plurality of groups of same data to the cloud server 5.
The cloud server 5 sends the wrong electricity utilization information to the mobile phone of the user, and the user can send the correct electricity utilization information to the cloud server 5 by observing the electricity meter 11.
How to realize the comparison of the data, firstly determining a group of data, comparing the group of data with the rest data in sequence, if the comparison data are different, stopping the comparison immediately, and if the comparison of all the data is finished, determining the data which is not tampered; this may be implemented using a memory, a processor, and a computer program running on the processor.
An intelligent ammeter 11 comprises the information transmission device, wherein the electricity utilization information of the ammeter 11 is displayed by adopting an LED diode 10 for digital display and is controlled by a control chip, a digital keyboard 12 for inputting a verification code is arranged on the electricity utilization information counting meter, and when the correct verification code is input, the control chip can control the LED diode 10 to display the electricity utilization information.
When a comparison error occurs in the comparison module 9 on the cloud server 5, that is, one group of data is tampered, the cloud server 5 sends the tampering information to the user bound with the electric meter 11 in the form of a short message or a public number, and sends the random verification code of the electric meter 11 to the user, and the user can check the actual display value of the electric meter 11 through the verification code and send the actual value to the cloud server 5 in time.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.