首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 171 毫秒
1.
随着物联网与配电网深度融合,海量终端设备接入系统给配电物联网安全稳定运行带来巨大挑战。针对传统身份认证方式过于中心化且无法承载大规模终端等现状,设计一种基于区块链共识机制的配电物联网终端接入认证方法。由配电物联网网关负责对待接入终端节点登记注册,采用共识算法进行分布式认证,将合法终端上链存储。在传统PBFT算法的基础上,设计了配电物联网终端共识算法。该算法引入权重机制,根据终端节点权重选取认证节点,缩小共识规模;引入可验证随机函数增强主节点安全,避免启动视图切换协议,提高共识效率;结合实际应用场景优化一致性协议,降低通信开销。实验分析表明该方法可有效规避多种网络攻击,通信开销和吞吐量优于其他方法,系统抗攻击性较强,满足配电物联网对认证效率和系统可靠性等要求。  相似文献   

2.
智能配电网可以有效地提高配电系统的供电质量、实现分布式电源的并网优化运行与配电设备的高效运转、完成与用户之间的有效互动。无线传感器网络(Wireless Sensor Network,WSN)具有建设成本低、快速自组网等特点,在智能配电网通信系统中具有广阔的应用前景。论文通过总结智能配电终端在配电网的分布特征以及WSN在电力系统中的应用现状,分析了WSN的网络结构及其在智能配电网中的应用特点,并以此为基础给出了智能配电网WSN的设计原则。根据该原则设计了智能配电网WSN的分层体系结构,包括终端采集网、汇聚网和信息接入网。智能配电网的通信系统通常由多种通信方式组成,本文给出了与其他通信方式联合组网的设计方案,该方案通过构建业务终端层、接入层、骨干层和配电主站层,可以有效地扩展智能配电通信网的通信范围,提高智能配电网的网络数据完整性。  相似文献   

3.
为避免智能配电终端受到攻击,保障信息接入行为的安全性,针对5G通信环境下的智能配电终端零信任安全接入技术展开研究。在5G通信架构中,构造完整的Polar码定义模板,再根据滑窗编码时隙参数的取值范围,实现对智能配电终端传输数据的安全性编码处理。然后,以零信任传输协议为基础,定义与Scoket安全指令相关的信息文本,通过交叉编译的方式,将数据样本传输至配电终端的既定主机中。实验结果表明,5G通信架构提供了更加稳定的数据传输环境,单位时间内信息样本累积总量不会超过5.0×1013 bit,可以避免过量存储的数据信息对智能配电终端造成攻击,有效保障了信息接入行为的执行安全性;应用该技术后,终端与5G网络之间的通信延迟时间仅由10.0 ms增加至26.4 ms,时效性更强,更有助于实现实时接入响应和快速接入交互,满足实际应用需求。  相似文献   

4.
当前供电企业中压用户停电事件已实现从用电采集信息系统采集终端自动接入并推送到配电网供电可靠性管理系统,相比传统的手工录入,及时性和准确性有了较大的进步。然而,由于中压配电网设备规模大,涉及专业面广,数据传输链条长,可靠性中压停电事件的准确性、完整性依然受到多种因素限制,对供电可靠性指标统计分析及应用造成不利影响。本文基于配电网中压用户停电事件智能分析处理,通过对中压停电事件相关业务系统进行调研分析和数据交互设计,从中压用户停复电信号采集、处理、到自动推送至供电可靠性管理系统的全流程,运用大数据技术和动态配电网模型,实现用户采集终端停复电数据实时分析和停电事件智能补全增益,确保停电事件集成完整性、准确性有效提升。  相似文献   

5.
[目的/意义]将5G+量子保密技术应用于电力信息安全领域,构建配电网无线接入信息安全体系,为终端无线接入提供安全通道,提升系统安全性的同时,降低生产和运维成本,对于保障配电网安全运行,降本增效具有重要意义。[方法/过程]基于量子加密的电力5G配网终端开展研究工作,完成了量子保密通信与电力5G的配电自动化“三遥”(遥信、遥测、遥控)业务,在实验设计基础之上,在装有后台104软件的独立主机上开展实验,最后对实验数据进行统计检验。[结果/结论]基于5G的配电自动化“三遥”业务的量子加密方法,可以提供安全的通信,解决了长久以来的安全通信问题。  相似文献   

6.
为提高配电网络安全,提出了一种配电网络安全网关系统。该系统包括配电网络防护终端、交互网关接入区及主站防护区这3个子系统。为确保数据的机密性和完整性,系统应用改进SM3算法对通信内容进行加密,从而确保数据的唯一性和可靠性。通过测试分析,与经典SM3算法的运行情况相比,改进后的SM3算法总运行时间减少将近26.9%。其中,压缩函数的效率显著提高了28.7%左右,证明了改进方案能有效提高SM3算法的运行效率。同时,对比了正常通信情况及网络安全威胁情况下,系统运行时主站和终端发送和接收验证包数量。对比结果表明,该系统能够应对网络攻击来验证系统的安全性。测试结果验证了所提系统在执行效率及安全性能方面的有效性。  相似文献   

7.
提出了家庭网关使用混合模式,机顶盒终端通过与家庭网关的配合接入2个网络平面,从而解决了IPTV业务使用桥接模式保障业务质量,同时满足OTT业务使用路由模式实现多屏互动。  相似文献   

8.
王玉峰  高雅娟 《计算机仿真》2022,39(4):341-344,356
物联网终端的接入影响数据网关信道容量,导致网关运行状态不稳定.提出物联网终端安全接入下数据网关状态预测方法.采用最短路径寻优法部署网关路由节点,构建物联网信道传输模型,在跨层优化理论基础上构建信道容量分析模型,利用拉格朗日对偶分解法求解信道容量分析模型.基于单周期预测模型和聚合预测模型构建多周期预测模型,实现物联网终端...  相似文献   

9.
网络隔离技术是目前网络安全领域研究的热点内容.针对多网接入应用环境下的安全隔离需求,本文设计了一种网络安全隔离与信息交换系统,采用基于硬件分区的网络隔离技术和基于IP报文还原的内容深度处理技术,实现了多个外部网络接入一个内部网络时外网间的安全隔离和内外网间的安全通信.本文设计的系统已应用于实际网络环境,表现出良好的安全性能.  相似文献   

10.
为全面提高全业务泛在电力物联网安全综合防御能力,解决目前全业务泛在电力物联网安全防护指导和终端认证机制的缺失和不足,本文提出一种泛在电力物联网可信安全接入方案。首先给电力物联网终端层设备确定一个唯一标识的指纹信息;然后结合该指纹信息,采用身份标识密码技术实现终端层设备的接入认证,阻断非法终端的接入;最后设计合法终端的身份信息安全传递机制,根据身份信息对合法终端的异常行为进行溯源。  相似文献   

11.
属性的识别对物体的识别起到了比较重要的作用,例如人脸验证和场景识别。提高属性的识别率对后面基于属性特征的应用的正确率有很大的影响。近些年来,有些工作也开始关注于属性的学习,而很多的工作都是基于属性之间独立的假设,但在实际中很多的属性都是强相关的,例如没有胡子和女性,光头和头发的颜色;很多的工作忽略了类别之间的不平衡性,例如光头的样本比例可能只占样本的很小一部分。基于这2个观察,本文提出一种基于多任务的类别不平衡的人脸属性识别网络架构,该网络结构是由Densenet修改而来。该方法比以往的方法效果要好,一定程度上缓解了不平衡问题,且参数少,计算效率更高,在公开人脸属性数据集CelebA和LFWA上的实验验证了该方法的有效性。  相似文献   

12.
Complexity, complication, contradiction, consumption, confusion, delusion, depression. Opportunity, inspiration, ingenuity, compassion, wisdom. Our world is perplexing, our times are fast moving, and our choices are many. To find an appropriate path is a daunting yet vital challenge that confronts us as individuals, as communities, and as a civilization. How sustainable is our world? How reasonable are our behaviors? The present article is a collection of thoughts on a series of intertwined issues related to the contemporary world, its environmental dimensions, and their present-day problems. The goal is to survey the landscape through a lens of Environmental Design, to provide some perspectives, to raise some questions, and to explore systems, beliefs, and values informing and influencing actions. It is important to consider how people's belief systems influence, inform, and shape actions. This holds true in realms political, spiritual, and cultural. It also proves relevant in the ways in which we imagine, design, develop, and construct our buildings, cities, spaces, and places.

Appropriate solutions to some of our most daunting problems will arise through the concerted efforts, open dialogue, and collective wisdom of the wide array of stakeholders, professionals, politicians, decision makers, and citizens (both engaged and disenfranchised) who have the will and wherewithal to make a difference and to make the world safer, healthier, and better. It seems vital for us to critically examine, and question, our belief systems and their connections to the ways we define, refine, and realize progress. Architecture and Environmental Design, in both a philosophical and a practical sense, reflect as well as form greater aspirations, directions, and events of our times.  相似文献   

13.
传统异构数据库存储复制技术只注重数据安全性,忽略了异构数据库存储复制的时效性与可靠性。为此,本文提出一种新的区域网络异构数据库存储复制技术。首先构建区域网络中异构数据库存储框架,通过定向随机游走方法对电力企业灾备中心异构数据进行存储,依据多叉索引树对异构数据库中的数据进行查询处理。然后采用一致性树分布备份技术对本地灾备中心数据进行备份,把待恢复数据分割成若干部分,通过若干差异远程备份服务器实现数据恢复。将所提技术应用于电力企业灾备中心,结果表明,所提技术有很高的存储、复制及备份恢复性能。  相似文献   

14.
针对分数阶加热系统,提出一种基于改进粒子群优化算法的分数阶PIλDμ控制方法。首先,将细菌趋化行为机制引入带收缩因子的粒子群优化算法中,解决粒子群优化算法中由于只存在吸引操作没有排斥操作导致种群多样性失去的问题,从而避免PSO早熟收敛及陷入局部最优;然后使用改进PSO算法优化分数阶PIλDμ控制器的参数;最后,以加热系统为被控对象,分别采用改进粒子群优化算法、标准粒子群优化算法、遗传算法优化分数阶PIλDμ控制器的参数。仿真结果表明,使用该改进算法整定分数阶PIλDμ控制器参数,控制器能有效地抑制模型参数的摄动,系统鲁棒性更强。  相似文献   

15.
针对航路网络关键节点识别问题,从航路网络结构中心性角度出发,构建完整航路网路结构和复杂拓扑模型,分别从度中心性、中介中心性和结构中心性这3个角度分析航路网络,并依托PAJEK可视化平台,对航路网络中介中心性和结构中心性进行仿真可视。在此基础上,借助AutoCAD,从中介性和紧密性角度对航路关键节点进行识别的可视化,从中得到对航路网络效能发挥具有重要支撑作用的航路点,仿真结果表明,提取的关键节点在实际航路网络运行中具有衔接枢纽、分配流量等重要作用,在路网重要节点识别研究中具有创新优势。  相似文献   

16.
属性加密(Attribute-BasedEncryption,ABE)将密钥和密文与一系列属性相关联,被广泛应用于云计算的访问控制中。针对现有撤销方案效率低下的问题,提出一种更高效、细粒度的访问控制方案。方案中采用的访问结构可以表达任意涉及布尔运算符的访问策略;在加密过程中,构建一种属性用户组随机密钥分发方法,并结合ABE实现双重加密,将所有撤销操作转化成属性级别细粒度的撤销;新方案的数据始终以密文形式存在于服务器上,降低了对服务器的安全限制,可以将大部分密文重加密任务转移给云服务器执行,有效利用云服务器的计算能力,提升系统的运行效率,减少通信开销。  相似文献   

17.
This paper proposes a method for robust reduced-order H filter design for polytopic uncertain systems, using linear matrix inequalities (LMIs). Sufficient LMI conditions for both robust full- and reduced-order H filter design are derived. Convex optimization problems are formulated and solved to obtain optimal H filters by using the resulting LMI conditions. The resulting conditions do not involve any non-convex rank constraints, and thus the proposed method for H filter design guarantees global optimum solutions. Numerical examples are presented to show the effectiveness of the proposed method. Recommended by Editorial Board member Huanshui Zhang under the direction of Editor Young Il Lee. This work was supported by the Brain Korea 21 Project and the Basic Research Program of the Korea Science and Engineering Foundation under grant R01-2006-000-11373-0. Hyoun-Chul Choi received the B.S., M.S., and Ph.D. degrees in Control and Instrumentation Engineering from Ajou University, Suwon, Korea, in 1995, 1997, and 2006, respectively. He was a Visiting Researcher at Griffith University, Brisbane, Australia, from 2001 to 2002, and a Postdoctoral researcher at Ajou University, Suwon, Korea, from 2006 to 2007. Since 2008, he has been with ASRI, School of Electrical Engineering and Computer Science, Seoul National University, Seoul, Korea, where he is currently a Postdoctoral Researcher. His research interests include LMI-based control, optimal and robust control, network-based control, and mechatronics. Dongkyoung Chwa received the B.S. and M.S. degrees from the Department of Control and Instrumentation Engineering in 1995 and 1997, respectively, and the Ph.D. degree from the School of Electrical and Computer Engineering in 2001, all from Seoul National University, Seoul, Korea. From 2001 to 2003, he was a Postdoctoral Researcher with Seoul National University. In 2003, he was a Visiting Research Fellow at The University of New South Wales, Australian Defence Force Academy, and was the Honorary Visiting Academic at the University of Melbourne, Melbourne, Australia. In 2004, he was a BK21 Assistant Professor with Seoul National University. Since 2005, he has been an Assistant Professor with the Department of Electrical and Computer Engineering, Ajou University, Suwon, Korea. His research interests are nonlinear, robust, and adaptive control theories and their applications to the robotics, underactuated systems including wheeled mobile robots, underactuated ships, cranes, and guidance and control of flight systems. Suk-Kyo Hong received the B.S., M.S., and Ph.D. degrees in Electrical Engineering from Seoul National University, Seoul, Korea, in 1971, 1973, and 1981, respectively. His major graduate research works were centered on speed control of induction motors. He was an Exchange Professor at Rensselaer Polytechnic Institute, Troy, NY, from 1982 to 1983, and at the Institut National de Recherche en Informatique et en Automatique, France, from 1988 to 1989. He has been with the faculty of the Department of Electrical and Computer Engineering, Ajou University, Suwon, Korea, since 1976, and was a Visiting Professor at Griffith University, Australia, in 2001 and 2002. His current research interests include robust robot control, microprocessor applications, factory automation, and computer integrated manufacturing.  相似文献   

18.
网络安全是一门涉及计算机科学、网络技术、密码技术、信息安全技术、应用数学、教论、信论等多种学科的综合性学科,它涉及的因素主要包括物理安全、系统安全、信息安全和文化安全等范围。局域网络中人为的、非人为的,有意的、无意的;非法用户入侵、计算机病毒、黑客的不断侵袭等随时威胁局域网的安全。随着计算机网络技术迅速发展,网络安全问题也日渐突出。该文分析了威胁局域网安全的主要因素,探讨了从物理环境、网络层、应用层以及管理制度方面,运用VPN、NAT、VLAN、IDS、身份验证等技术构建安全局域网的策略。  相似文献   

19.
针对传统支持向量机(SupportVectorMachine,SVM)无法有效处理非平衡分类的问题,提出一种基于增量学习的非平衡SVM分类方法(ImbalancedSVMBasedonIncrementalLearning,ISVM_IL)。该方法首先提取多数类样本中的部分样本,与少数类样本合并参与训练得到初始分类器,然后根据分类器与其他样本的关系,选择距离分类器最近的样本作为增量样本加入训练集参与训练,从而减小实际参与训练的负类数据规模,提高非平衡分类的性能。实验结果表明,本文提出的ISVM_IL方法可以有效提高非平衡分类中重要的少数类样本的分类性能。  相似文献   

20.
In this paper, we propose a new topology called theDual Torus Network (DTN) which is constructed by adding interleaved edges to a torus. The DTN has many advantages over meshes and tori such as better extendibility, smaller diameter, higher bisection width, and robust link connectivity. The most important property of the DTN is that it can be partitioned into sub-tori of different sizes. This is not possible for mesh and torus-based systems. The DTN is investigated with respect to allocation, embedding, and fault-tolerant embedding. It is shown that the sub-torus allocation problem in the DTN reduces to the sub-mesh allocation problem in the torus. With respect to embedding, it is shown that a topology that can be embedded into a mesh with dilation δ can also be embedded into the DTN with less dilation. In fault-tolerant embedding, a fault-tolerant embedding method based on rotation, column insertion, and column skip is proposed. This method can embed any rectangular grid into its optimal square DTN when the number of faulty nodes is fewer than the number of unused nodes. In conclusion, the DTN is a scalable topology well-suited for massively parallel computation. Sang-Ho Chae, M.S.: He received the B.S. in the Computer Science and Engineering from the Pohang University of Science and Technology (POSTECH) in 1994, and the M.E. in 1996. Since 1996, he works as an Associate Research Engineer in the Central R&D Center of the SK Telecom Co. Ltd. He took part in developing SK Telecom Short Message Server whose subscribers are now over 3.5 million and Advanced Paging System in which he designed and implemented high availability concepts. His research interests are the Fault Tolerance, Parallel Processing, and Parallel Topolgies. Jong Kim, Ph.D.: He received the B.S. degree in Electronic Engineering from Hanyang University, Seoul, Korea, in 1981, the M.S. degree in Computer Science from the Korea Advanced Institute of Science and Technology, Seoul, Korea, in 1983, and the Ph.D. degree in Computer Engineering from Pennsylvania State University, U.S.A., in 1991. He is currently an Associate Professor in the Department of Computer Science and Engineering, Pohang University of Science and Technology, Pohang, Korea. Prior to this appointment, he was a research fellow in the Real-Time Computing Laboratory of the Department of Electrical Engineering and Computer Science at the University of Michigan from 1991 to 1992. From 1983 to 1986, he was a System Engineer in the Korea Securities Computer Corporation, Seoul, Korea. His major areas of interest are Fault-Tolerant Computing, Performance Evaluation, and Parallel and Distributed Computing. Sung Je Hong, Ph.D.: He received the B.S. degree in Electronics Engineering from Seoul National University, Korea, in 1973, the M.S. degree in Computer Science from Iowa State University, Ames, U.S.A., in 1979, and the Ph.D. degree in Computer Science from the University of Illinois, Urbana, U.S.A., in 1983. He is currently a Professor in the Department of Computer Science and Engineering, Pohang University of Science and Technology, Pohang, Korea. From 1983 to 1989, he was a staff member of Corporate Research and Development, General Electric Company, Schenectady, NY, U.S.A. From 1975 to 1976, he was with Oriental Computer Engineering, Korea, as a Logic Design Engineer. His current research interest includes VLSI Design, CAD Algorithms, Testing, and Parallel Processing. Sunggu Lee, Ph.D.: He received the B.S.E.E. degree with highest distinction from the University of Kansas, Lawrence, in 1985 and the M.S.E. and Ph.D. degrees from the University of Michigan, Ann Arbor, in 1987 and 1990, respectively. He is currently an Associate Professor in the Department of Electronic and Electrical Engineering at the Pohang University of Science and Technology (POSTECH), Pohang, Korea. Prior to this appointment, he was an Associate Professor in the Department of Electrical Engineering at the University of Delaware in Newark, Delaware, U.S.A. From June 1997 to July 1998, he spent one year as a Visiting Scientist at the IBM T. J. Watson Research Center. His research interests are in Parallel, Distributed, and Fault-Tolerant Computing. Currently, his main research focus is on the high-level and low-level aspects of Inter-Processor Communications for Parallel Computers.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号