Cyber Security Protection of Power System Equipment Based on Chip-Level Trusted Computing

被引:2
作者
Xi, Wei [1 ]
Li, Xiaobo [1 ]
Feng, Qihui [1 ]
Yao, Hao [1 ]
Cai, Tiantian [1 ]
Yu, Yang [1 ]
机构
[1] China Southern Power Grid, Digital Grid Res Inst, Guangzhou, Peoples R China
关键词
power equipment; cyber security; trusted computing; embedded system; on-chip security; INTERNET; IOT;
D O I
10.3389/fenrg.2022.842938
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
This article proposes a network security protection scheme for power system embedded devices based on chip-level trusted computing, gives the overall architecture of power equipment chip-level trusted computing, introduces the principle of trust chain transfer within power terminals, and proposes the method of using the on-chip SRAM inside the main control chip of power system embedded devices as the PUF to construct the trusted root. Furthermore, we propose a complete trust transfer mechanism from booting trust to the loading that trust on operating system and application, and give the corresponding program design framework and program logic. The chip-level trusted computing program designed in this article was applied in a distribution automation DTU device equipped with the FUXI chip that is developed by the China Southern Power Grid and the Sylix OS operating system. Finally, we carry out the security protection test. The validity of the designed program is verified by running malicious programs to attack the power equipment. The results show that the designed program can effectively detect and intercept illegal programs, and provide an effective solution for the security protection of power equipment in the open network environment.
引用
收藏
页数:13
相关论文
共 33 条
[1]  
[Anonymous], 2018, 33163 3GPP TS
[2]  
[Anonymous], 2018, 33220 3GPP TS
[3]   Basic concepts and taxonomy of dependable and secure computing [J].
Avizienis, A ;
Laprie, JC ;
Randell, B ;
Landwehr, C .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) :11-33
[4]   Review of Internet of Things (IoT) in Electric Power and Energy Systems [J].
Bedi, Guneet ;
Venayagamoorthy, Ganesh Kumar ;
Singh, Rajendra ;
Brooks, Richard R. ;
Wang, Kuang-Ching .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (02) :847-870
[5]   Managing Contingencies in Smart Grids via the Internet of Things [J].
Ciavarella, Stefano ;
Joo, Jhi-Young ;
Silvestri, Simone .
IEEE TRANSACTIONS ON SMART GRID, 2016, 7 (04) :2134-2141
[6]  
Efe A., 2019, INT J MULTIDISCIP ST, V01, P38
[7]  
Ekberg J., 2007, Mobile Trusted Module (MTM)
[8]  
[冯登国 Feng Dengguo], 2020, [中国科学. 信息科学, Scientia Sinica Informationis], V50, P1127
[9]  
[冯登国 Feng Dengguo], 2011, [计算机研究与发展, Journal of Computer Research and Development], V48, P1332
[10]   Design and implementation of secure Windows platform based on TCM [J].
Feng, Wei ;
Qin, Yu ;
Feng, Deng-Guo ;
Yang, Bo ;
Zhang, Ying-Jun .
Tongxin Xuebao/Journal on Communications, 2015, 36 (08)