Design and Application of Information Security Protection for Distributed Fault Diagnosis System of Transmission Line

被引:0
|
作者
Zhou H. [1 ,2 ,3 ]
Rao D. [1 ,2 ]
Song B. [1 ,2 ,3 ]
Li Y. [1 ,2 ]
Zhang J. [1 ,2 ]
Lyu X. [1 ,2 ]
机构
[1] NARI Group Corporation, State Grid Electric Power Research Institute, Nanjing
[2] NARI Technology Co. Ltd., Nanjing
[3] State Key Laboratory of Smart Grid Protection and Control, Nanjing
关键词
Faults diagnosis system; Monitoring and maintenance center; Monitoring terminal; Security protection; Ultra-high voltage (UHV) transmission line;
D O I
10.7500/AEPS20181227003
中图分类号
学科分类号
摘要
As the key product application of fault location service for ultra-high voltage (UHV) transmission system, the distributed fault diagnosis system of transmission line is of great significance to the safety, reliability and economic operation of power system. By combining the development and application of practical system, this paper proposes a secure link application method for distributed fault diagnosis and monitoring terminal system based on security protection. This method uses the monitoring terminal embedded encryption chip to access the security gateway. After filtered by the security gateway, the access to the monitoring and maintenance center can be done. Isolated by the forward device, the monitoring and maintenance center sends message to App server station one way by means of identity authentication and digital signature, and the App server establishes a secure channel for mobile terminal. Through the trusted transformation of the entire link, malicious program attacks, malicious code implantation attacks, network eavesdropping and sniffing attacks are effectively prevented. By the identity checksum of the monitoring and maintenance center and the backup of the dual-machine data of the main/standby machine, the security of data and maintenance operation of the monitoring and maintenance center are guaranteed. The described system products have successfully passed the safety test and certification, and run steadily and reliably on the 1 000 kV UHV AC transmission line in Shaanxi Province of China. © 2019 Automation of Electric Power Systems Press.
引用
收藏
页码:193 / 199
页数:6
相关论文
共 21 条
  • [1] Wang D., Chen C., Yan J., Et al., Pondering a new-generation security architecture model for power information network, Automation of Electric Power Systems, 40, 2, pp. 6-11, (2016)
  • [2] Gao K., Xin Y., Li Z., Et al., Development and process of cybersecurity protection architecture for smart grid dispatching and control systems, Automation of Electric Power Systems, 39, 1, pp. 48-52, (2015)
  • [3] Ding M., Li X., Zhang J., Effect of SCADA-oriented cyber attack on power system reliability, Power System Protection and Control, 46, 11, pp. 37-45, (2018)
  • [4] Li P., Liu Y., Xin H., Et al., Vulnerability assessment for cyber-physical system of distribution network in distributed cooperative control mode, Automation of Electric Power Systems, 42, 10, pp. 22-29, (2018)
  • [5] Shi L., Jian Z., Vulnerability assessment of cyber physical power system based on dynamic attack-defense game model, Automation of Electric Power Systems, 40, 17, pp. 99-105, (2016)
  • [6] Xiao J., Zu G., He Q., Et al., Empirical analysis on distribution system security region, Automation of Electric Power Systems, 41, 3, pp. 153-160, (2017)
  • [7] Ni M., Yan J., Bo R., Et al., Power system cyber attack and its defense, Automation of Electric Power Systems, 40, 5, pp. 148-151, (2016)
  • [8] Tang Y., Chen Q., Li M., Et al., Overview on cyber-attacks against cyber physical power system, Automation of Electric Power Systems, 40, 17, pp. 59-69, (2016)
  • [9] Wang Z., Wang G., Tong J., Et al., Key management method for intelligent substations, Automation of Electric Power Systems, 40, 13, pp. 121-127, (2016)
  • [10] Gao L., Li S., Improved identity-based authenticated key exchange protocols, Computer Engineering, 11, 11, pp. 113-117, (2014)