• HOME
  • About Journal
    • Historical evolution
    • Journal Honors
  • Editorial Board
    • Members of Committee
    • Director of the Committee
    • President and Editor in chief
  • Submission Guide
    • Instructions for Authors
    • Manuscript Processing Flow
    • Model Text
    • Procedures for Submission
  • Academic Influence
  • Open Access
  • Ethics&Policies
    • Publication Ethics Statement
    • Peer Review Process
    • Academic Misconduct Identification and Treatment
    • Advertising and Marketing
    • Correction and Retraction
    • Conflict of Interest
    • Authorship & Copyright
  • Contact Us
  • Chinese
Site search        
文章摘要
智能变电站计量系统安全防护技术探讨
Explore of The Smart Substation Measuring System Security Protection Technology
Received:February 25, 2015  Revised:February 25, 2015
DOI:
中文关键词: 智能变电站  计量系统  数据加密  密钥协商  访问控制
英文关键词: Smart  Substation, Measuring  System, Data  Encryption, Key  Agreement, Access  control
基金项目:
Author NameAffiliationE-mail
Cen Wei* China Electric Power Research Institute cenwei@epri.sgcc.com.cn 
Cao Yongfeng China Electric Power Research Institute  
Zhai Feng China Electric Power Research Institute  
Liang Xiaobing China Electric Power Research Institute  
Fu Yilun China Electric Power Research Institute  
Hits: 1738
Download times: 656
中文摘要:
      针对智能变电站计量系统的特点及其存在的安全隐患,本文从数据加密、安全认证与密钥协商协议设计、访问控制等方面探讨了智能变电站计量系统安全防护技术。该技术已应用于智能变电站计量系统并经过安全性验证,验证结果表明智能变电站计量系统安全防护技术可有效抵抗病毒、DDos、重放等多种攻击,可以高效地实现身份认证及密钥协商,可以在不影响传输数据实时性和可靠性的前提条件下有效拦截非授权设备访问系统,具有较高的推广应用价值。
英文摘要:
      According to the characteristics and the existed potential safety hazard of the smart substation measuring system, this paper has explored the smart substation measuring system security protection technology from data encryption, designing of security authentication and key agreement protocol, access control and etc. Above technology has been used in smart substation measuring system and has been verified, the verify results show that the smart substation measuring system security protection technology can effectively against such attacks as viruses, DDos, replay and so on, effectively realize the identity authentication and key agreement, effective block the unauthorized device to access to the system at the premise condition of not affect the transmission data’s real-time performance and reliability. So, it has high popularization and application value.
View Full Text   View/Add Comment  Download reader
Close
  • Home
  • About Journal
    • Historical evolution
    • Journal Honors
  • Editorial Board
    • Members of Committee
    • Director of the Committee
    • President and Editor in chief
  • Submission Guide
    • Instructions for Authors
    • Manuscript Processing Flow
    • Model Text
    • Procedures for Submission
  • Academic Influence
  • Open Access
  • Ethics&Policies
    • Publication Ethics Statement
    • Peer Review Process
    • Academic Misconduct Identification and Treatment
    • Advertising and Marketing
    • Correction and Retraction
    • Conflict of Interest
    • Authorship & Copyright
  • Contact Us
  • 中文页面
Address: No.2000, Chuangxin Road, Songbei District, Harbin, China    Zip code: 150028
E-mail: dcyb@vip.163.com    Telephone: 0451-86611021
© 2012 Electrical Measurement & Instrumentation
黑ICP备11006624号-1
Support:Beijing Qinyun Technology Development Co., Ltd