CN-122001657-A - Electric power information protection method and system based on communication security
Abstract
The application relates to the technical field of data security, in particular to a power information protection method and system based on communication security, wherein the method comprises the steps of acquiring various power information data of each edge device in real time; and according to the change characteristics of the correlation degree between the various power information data and other power information data in the current period and the difference between the correlation response values, acquiring the sensitive characteristic values of the various power information data in the current period, combining the positions of the edge devices, clustering all the power information data in the current period, and selecting a corresponding encryption algorithm for the various power information data in each cluster to encrypt the data. The application realizes the dynamic balance of communication safety and system load by adaptively selecting the encryption algorithm for various electric power information data.
Inventors
- LU TENG
- LIU MENGQI
- SHI JIN
- LIU JUNWEN
- LI WEILIANG
- YUAN ZHOU
- LI XIAOMENG
- CUI ZHAOWEI
- LI QINGBO
- LIN BINGJIE
- XIA ANG
- WANG ZIMENG
Assignees
- 国家电网有限公司信息通信中心
Dates
- Publication Date
- 20260508
- Application Date
- 20260210
Claims (10)
- 1. The electric power information protection method based on communication safety is characterized by comprising the following steps: acquiring various electric power information data of each edge device of the electric power system in real time; the whole data monitoring time is divided into a plurality of time periods, and the association response value of each type of power information data in the current time period is obtained according to the discrete degree of the time interval between adjacent extreme points in each type of power information data in the current time period and the significance degree of the data change trend of each type of power information data; Acquiring sensitive characteristic values of various power information data in the current period according to the difference between the correlation degree of the various power information data and other power information data in the historical stable operation period and the correlation degree of the current period and the correlation response value between the various power information data and other power information data in the current period; clustering all kinds of power information data in the current period based on the positions of the edge devices corresponding to the kinds of power information data in the current period and the sensitive characteristic values, and selecting a corresponding encryption algorithm for each kind of power information data in each cluster according to the average level of the sensitive characteristic values of all the power information data in each cluster.
- 2. The method for protecting power information based on communication security as claimed in claim 1, wherein the method for obtaining the association response value of each type of power information data in the current period is as follows: acquiring all extreme points of various power information data in a current period; counting standard deviations of time differences between all adjacent extreme points of various power information data in a current period; acquiring trend characteristic values of various power information data in the current period according to the change trend of various power information data in the current period; And the association response values of various power information data in the current period and the standard deviation and the trend characteristic values are in positive correlation.
- 3. The method for protecting power information based on communication security as claimed in claim 2, wherein the method for obtaining trend feature values of various types of power information data in the current period is as follows: Trend statistics corresponding to all maximum values and trend statistics corresponding to all minimum values in various power information data in a current period are respectively obtained; And recording the average value of the absolute values of the trend statistics of all extreme points of various types of power information data in the current period as the trend characteristic value of various types of power information data in the current period.
- 4. The power information protection method based on communication security as claimed in claim 1, wherein the method for acquiring the sensitive characteristic value of each type of power information data in the current period is as follows: Counting the ratio of the association response values of various power information data and other various power information data in the current period; acquiring standard correlation factors and current correlation factors between various types of power information data and any other type of power information data based on correlation degrees between various types of power information data and any other type of power information data in a historical period and a current period; counting absolute differences between standard correlation factors and current correlation factors between various power information data and other various power information data; and all kinds of power information data in the current period of time are in positive correlation with the ratio and the absolute difference.
- 5. The method of claim 4, wherein the standard correlation factor between each type of power information data and any other type of power information data is a pearson correlation coefficient between each type of power information data and stable data of any other type of power information data, and wherein the stable data of each type of power information data is power information data corresponding to any history period when each edge device is in stable operation.
- 6. The method of claim 4, wherein the current correlation factor between each type of power information data and any other type of power information data is a pearson correlation factor between each type of power information data and any other type of power information data in the current period.
- 7. The power information protection method based on communication security as claimed in claim 1, wherein the clustering of all kinds of power information data in the current period is as follows: Acquiring a distance coefficient between any two types of electric power information data according to the positions of the edge devices corresponding to the various types of electric power information data and the sensitive characteristic values; And taking all the types of power information data in the current period as input of a condensation hierarchical clustering algorithm, and measuring the distance between two corresponding types of power information data according to the distance coefficient between any two types of power information data, so that all the types of power information data in the current period are divided into a plurality of clusters.
- 8. The power information protection method based on communication security as claimed in claim 7, wherein the method for obtaining the distance coefficient between any two kinds of power information data is as follows: Acquiring position coordinates of each edge device; counting normalization values of Euclidean distances between position coordinates of edge equipment corresponding to any two types of power information data; counting normalized values of absolute differences between sensitive characteristic values of any two types of power information data; And the distance coefficient between any two types of power information data and the two normalization values are in positive correlation.
- 9. The method for protecting power information based on communication security as claimed in claim 1, wherein the specific process of selecting the corresponding encryption algorithm for each type of power information data in each cluster is as follows: If the average value of the sensitive characteristic values of all the types of power information data in any cluster is greater than or equal to a preset level threshold, encrypting all the types of power information data in the cluster by adopting an AES-256 algorithm; Otherwise, encrypting various electric power information data in the cluster by adopting an AES-128 algorithm.
- 10. A communication security based power information protection system comprising a memory, a processor and a computer program stored in said memory and running on said processor, characterized in that said processor implements the steps of a communication security based power information protection method according to any one of claims 1-9 when said computer program is executed.
Description
Electric power information protection method and system based on communication security Technical Field The application relates to the technical field of data security, in particular to a power information protection method and system based on communication security. Background The power system is in the process of converting to intellectualization and digitalization, wherein the protection of power information is the core content for guaranteeing energy safety. The protection of the safety of the power information directly influences the stable operation of the power grid, and if the conditions of stealing, tampering and interruption occur in the power information acquisition and transmission process, the problems of large-area power failure, user information leakage, invalid scheduling instructions and the like can be caused, so that the energy safety is influenced. At present, the safety protection of power information is generally realized in the aspect of power system communication by combining methods such as transmission encryption, terminal protection and the like, wherein the transmission encryption refers to the encryption transmission communication of data by utilizing an encryption protocol and an encryption algorithm. However, in the current electric power information protection processing process, a unified encryption processing mode is generally adopted for electric power information data of all types of terminal equipment by the traditional encryption processing method, however, under the condition of multi-source information characteristic difference and complex communication environment interference, the sensitivity of various types of electric power information data to interference is different, and further, the protection requirements on electric power information safety are also different, if the electric power information is processed by adopting the unified encryption processing method, the protection level of some electric power information data is possibly too low, so that leakage risks of electric power information are possibly caused, and the protection level of some electric power information data is possibly too high, so that the encryption and decryption speeds are slower. Therefore, the existing power information protection system has a great potential safety hazard. Disclosure of Invention In order to solve the technical problems, the application aims to provide a power information protection method and system based on communication security, and the adopted technical scheme is as follows: In a first aspect, an embodiment of the present application provides a method for protecting electric power information based on communication security, including the steps of: acquiring various electric power information data of each edge device of the electric power system in real time; the whole data monitoring time is divided into a plurality of time periods, and the association response value of each type of power information data in the current time period is obtained according to the discrete degree of the time interval between adjacent extreme points in each type of power information data in the current time period and the significance degree of the data change trend of each type of power information data; Acquiring sensitive characteristic values of various power information data in the current period according to the difference between the correlation degree of the various power information data and other power information data in the historical stable operation period and the correlation degree of the current period and the correlation response value between the various power information data and other power information data in the current period; clustering all kinds of power information data in the current period based on the positions of the edge devices corresponding to the kinds of power information data in the current period and the sensitive characteristic values, and selecting a corresponding encryption algorithm for each kind of power information data in each cluster according to the average level of the sensitive characteristic values of all the power information data in each cluster. Preferably, the method for acquiring the association response value of each type of power information data in the current period comprises the following steps: acquiring all extreme points of various power information data in a current period; counting standard deviations of time differences between all adjacent extreme points of various power information data in a current period; acquiring trend characteristic values of various power information data in the current period according to the change trend of various power information data in the current period; And the association response values of various power information data in the current period and the standard deviation and the trend characteristic values are in positive correlation. Preferably, the method for obtaining the trend char