Font Size: a A A

Study On The Key Problems Of Electric Power Information Security Transmission

Posted on:2017-04-12Degree:MasterType:Thesis
Country:ChinaCandidate:H ZhangFull Text:PDF
GTID:2322330515967046Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Along with the management of electric power enterprise model to the flat,intensive development,in existing communications network based on the realization of IMS(IP multimedia subsystem)integrated access.Through analysis and studies,taking into account the case of transmission of information confidentiality,integrity,based on the SIP(Session Initiation Protocol)and PKI(Public Key Infrastructure)technology,the security solution.Safety design of the existing communications network,and increase the work of integrated information transmission and security encryption,by means of cryptography to achieve IP(Internet Protocol Internet Protocol)telephone systems,encryption,end up with the following results:Study ZXECS IBX1000 E network switching equipment based on the SIP protocol,analyzed the network set its working principle and equipment of each module.With its powerful processing capabilities and flexible scalability,combined with access to IMS vision,effective application of user side equipment IAD(Integrated Access Devices)/AG(Access Gateway): AG600,targeted to design and rational planning of the multiple devices draw the topology.Fusion factory,many models of communication equipment and implement an integrated business application,against the unsafe factors in the network,analyze the importance of power enterprise information security.Information security techniques,mathematical algorithms described and H.323(packet-based multimedia communications systems)compare with the SIP protocol.Proposed SIP protocol and PKI technology and combined use of IP networking protocols and multimedia session control protocol,using the appropriate network encryption,network security and IP communications security.SIP protocol security-enhanced design,without changing the number of network interaction based on the realization of authentication and key agreement.In the secure transmission of information,based on symmetric cryptography,voice transmission is realized in the process of encryption,to protect the confidentiality of IP telephone systems.By encrypting IP telephone system hardware and software to connect as set authentication,and finally completed the transfer of power information network security policy.Test results show that this article meet the requirements of electric power information security transmission proved the correctness and reliability of the programme.
Keywords/Search Tags:Information transmission, IMS integrated access, IP telephone systems, Security encryption
PDF Full Text Request
Related items