电力巡线无人机信息安全风险分析与防护
CSTR:
作者:
通讯作者:

杨浩(1980-),男,硕士,高级工程师,主要从事电力系统网络安全防护研究;E-mail:318448632@qq.com

中图分类号:

TM863

基金项目:

国家自然科学基金(51777015);湖南省教育厅科学研究项目(重点项目)(15A005)


Cyber security defense of unmanned aerial vehicle in power utilities
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [25]
  • | | | |
  • 文章评论
    摘要:

    针对电力行业大量采用民用消费级无人机进行输电线路巡线可能存在的信息安全隐患展开风险分析。首先,结合无人机实时性要求高、通信链路不稳定、GPS导航信号易篡改和飞航路径需保密等特点,指出应用专业级无人机进行输电线路巡线需要解决的信息安全问题。接着提出无人机及地面控制系统中基于对称密钥的控制信号、 航拍数据加密通信与存储、密钥分发机制和基于无人机惯性导航系统的虚构 GPS信号综合评估与甄别方法,以及基于云安全的无人机恶意软件检测的加固措施,所提方法为专业级巡线无人机的信息安全提供保障。

    Abstract:

    The paper performs the risk analysis of potential cybersecurity problems in residential consumer unmanned aerial vehicles (UAVs) adopted by power utilities for the transmission line inspection. Considering the realtime requirement, unstable communication links, easytotamper GPS navigation signal, and flight path confidentiality, the paper shows the cybersecurity matters in applying professional UAVs for the transmission line inspection. After that, the paper proposes the evaluation and screening method in UAVs and ground control systems for falsified GPS signals, which is based on the symmetric encryption control signal, encrypted communication and storage of aerial data, key distribution mechanism, and inertial guidance system in UAVs. Moreover, the cloud security malwaredetectionbased reinforcement measure is also proposed. The proposed method and measure ensure the cybersecurity of professional patrol UAVs.

    参考文献
    [1] 郭敬东,陈彬,王仁书,等.基于YOLO的无人机电力线路杆塔巡检图像实时检测[J].中国电力,2019,52(7):17-23.GUO Jingdong,CHEN Bin,WANG Renshu,et al.YOLObased realtime detection of power line poles from unmanned aerial vehicle inspection vision[J].Electric Power,2019,52(7):17-23.
    [2] 刘正坤,陈伦清,王昊.无人机辅助电网巡检作业的应用现状与思考[J].南方能源建设,2017,4(2):115-119.LIU Zhengkun,CHEN Lunqing,WANG Hao.Application status and reflections of electrical network inspection aided by unmanned aerial vehicle[J].Sothern Energy Construction,2017,4(2):115-119.
    [3] 钱金菊,麦晓明,王柯,等.广东电网大型无人直升机电力线路规模化巡检应用及效果[J].广东电力,2016,29(5):124-129.QIAN Jinju,MAI Xiaoming,WANG Ke,et al.Application and effect of large scale inspection on power lines by using large unmanned helicopter in Guangdong Power Grid[J].Guangdong Electric Power,2016,29(5):124-129.
    [4] 范亮,汤坚.架空输电线路三维建模方法现状及展望[J].南方能源建设,2017,4(2):120-125.FAN Liang,TANG Jian.Expectation and review on overhead transmission lines 3D modeling methods[J].Sothern Energy Construction,2017,4(2):120-125.
    [5] 张文峰,彭向阳,陈锐民,等.基于无人机红外视频的输电线路发热缺陷智能诊断技术[J].电网技术,2014,38(5):1334-1338.ZHANG Wenfeng,PENG Xiangyang,CHEN Ruimin,et al.Intelligent diagnostic techniques of abnormal heat defect in transmission lines based on unmanned helicopter infrared video[J].Power System Technology,2014,38(5):1334-1338.
    [6] 彭向阳,陈驰,徐晓刚,等.基于无人机激光扫描的输电通道安全距离诊断技术[J].电网技术,2014,38(11):3254-3259.PENG Xiangyang,CHEN Chi,XU Xiaogang,et al.Transmission corridor safety distance diagnosis based on point cloud and unmanned aerial vehicle loaded airborne laser scanning[J].Power System Technology,2014,38(11):3254-3259.
    [7] 麦晓明,刘正军,彭向阳,等.无人机电力线路安全巡检航线及任务规划软件系统设计[J].广东电力,2013,26(12):81-85.MAI Xiaoming,LIU Zhengjun,PENG Xiangyang,et al.Design on safe inspection route and mission planning software systems for unmanned aerial vehicle electric power circuit[J].Guangdong Electric Power,2013,26(12):81-85.
    [8] Kim Hartmann,Christoph Steup.The vulnerability of UAVs to cyberattacksAn approach to the risk assessment[C]//5th International Conference on Cyber Conflict,Tallinn,Estonia,2013.
    [9] Michal Podhradsky,Calvin Coopmans,Nathan Hoffer.Improving communication security of open source UAVs:Encrypting radio control link[C]//International Conference on Unmanned Aircraft Systems,Miami,FL,USA,2017.
    [10] Kwanwoong Yoon,Daejun Park,Yujin Yim,et al.Security authentication system using encrypted channel on UAV network[C]//First IEEE International Conference on Robotic Computing,Taichung,China,2017.
    [11] 罗昊,苏盛,杨浩,等.基于FPGA的电力巡线无人机硬件加密通信方法[J].中国电力,2019,52(7):11-16.LUO Hao,SU Sheng,YANG Hao,et al.FPGAbased hardware encryption of power line patrol drones[J].Electric Power,2019,52(7):11-16.
    [12] 黄玲,赵锴,李继东,等.基于特征金字塔和多任务学习的绝缘子图像检测[J].电测与仪表,2021,58(4):37-43.HUANG Ling,ZHAO Kai,LI Jidong,et al.Insulator image detection based on feature pyramid and multitask learning[J].Electrical Measurement and Instrumentation,2021,58(4):37-43.
    [13] 袁红林,胡爱群.射频指纹的产生机理与惟一性[J].东南大学学报(自然科学版),2009,39(2):230-233.YUAN Honglin,HU Aiqun.Fountainhead and uniqueness of RF fingerprint[J].Journal of Southeast University(Natural Science Edition),2009,39(2):230-233.
    [14] 彭福先,张玮,祝晓军,等.基于激光点云精确定位的输电线路无人机自主巡检系统研究[J].智慧电力,2019,47(7):117-122.PENG Fuxian,ZHANG Wei,ZHU Xiaojun,et al.Autonomous patrol inspection system of unmanned aerial vehicle for electric transmission lines based on precise positioning of laser point cloud[J].Smart Power,2019,47(7):117-122.
    [15] 吴育武,刘佳陇,陈春,等.基于多旋翼无人机的输电通道自主巡检技术研究[J].电网与清洁能源,2020,36(10):84-89.WU Yuwu,LIU Jialong,CHEN Chun,et al.Research on autonomous patrol inspection technology of power transmission channel based on multirotor UAV[J].Power System and Clean Energy,2020,36(10):84-89.
    [16] 闫占杰,吴德伟,何晶,等.GPS转发欺骗式干扰源部署方法[J].现代雷达,2015,37(3):75-79.YAN Zhanjie,WU Dewei,HE Jing,et al.Deployment method of jammer in GPS repeater deception jamming[J].Modern Radar,2015,37(3):75-79.
    [17] 王海洋,姚志成,范志良,等.对GPS接收机的欺骗式干扰试验研究[J].火力与指挥控制,2016,41(7):184-187.WANG Haiyang,YAO Zhicheng,FAN Zhiliang,et al.Experiment study of spoofing jamming on GPS receiver[J].Fire Control & Command Control,2016,41(7):184-187.
    [18] 李四海,刘洋,张会锁,等.惯性信息辅助的卫星导航欺骗检测技术[J].中国惯性技术学报,2013,21(3):336-340.LI Sihai,LIU Yang,ZHANG Huisuo,et al.Inertial measurements aided GNSS spoofing detection techniques[J].Journal of Chinese Inertial Technology,2013,21(3):336-340.
    [19] 董惠,郝鹏飞,王纯,等.GPS欺骗式干扰环境下MVDR算法的性能分析[J].计算机工程与科学,2016,38(11):2216-2220.DONG Hui,HAO Pengfei,WANG Chun,et al.Performance analysis of MVDR algorithm in GPS deception jamming environment[J].Computer Engineering & Science,2016,38(11):2216-2220.
    [20] 史文森,朱海,蔡鹏.基于接收信号DOA估计的GPS欺骗式干扰信号识别技术[J].舰船科学技术,2013,35(4):111-116.SHI Wensen,ZHU Hai,CAI Peng.The GPS deception jamming identification technology of based on the DOA of received signal[J].Ship Science and Technology,2013,35(4):111-116.
    [21] 史密,陈树新,吴昊,等.拒止环境实现注入的GPS欺骗干扰[J].空军工程大学学报(自然科学版),2015,16(6):27-31.SHI Mi,CHEN Shuxin,WU Hao,et al.A GPS spoofing patternbased on denial environment[J].Journal of Air Force Engineering University(Natural Science Edition),2015,16(6):27-31.
    [22] Leonard Petnga,Huan Xu.Security of unmanned aerial vehicles:Dynamic state estimation under cyberphysical attacks[C]//International Conference on Unmanned Aircraft Systems,Arlington,VA,USA,2016.
    [23] Hichem Sedjelmaci,Sidi Mohammed Senouci,Nirwan Ansari.A hierarchical detection and response system to enhance security against lethal cyberattacks in UAV networks[J].IEEE Transactions on Systems,Man,and Cybernetics:Systems,2017,99:113.
    [24] 朱炳铨,郭逸豪,郭创新,等.信息失效威胁下的电力信息物理系统安全评估与防御研究综述[J].电力系统保护与控制,2021,49(1):178-187.ZHU Bingquan,GUO Yihao,GUO Chuangxin,et al.A survey of the security assessment and security defense of a cyber physical power system under cyber failure threat[J].Power System Protection and Control,2021,49(1):178-187.
    [25] 宋新明,谢从珍,夏云峰,等.高压交流电场对WIFI无线通信影响的实验研究[J].高压电器,2019,55(12):125-131.SONG Xinming,XIE Congzhen,XIA Yunfeng,et al.Experimental research of the influence of high voltage AC electric field on WIFI network communication[J].High Voltage Electrical Apparatus,2019,55(12):125-131.
    相似文献
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

杨浩,林楠,袁晨,等.电力巡线无人机信息安全风险分析与防护[J].电力科学与技术学报,2021,36(4):172-180.
Yang Hao, Lin Nan, Yuan Chen, et al. Cyber security defense of unmanned aerial vehicle in power utilities[J]. Journal of Electric Power Science and Technology,2021,36(4):172-180.

复制
分享
文章指标
  • 点击次数:280
  • 下载次数: 2054
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 在线发布日期: 2021-08-28
文章二维码