期刊文献+

基于可信计算的保护控制设备主动防护技术研究与实现

Research and Implementation of Active Protection Technology for Protection and Control Equipment Based on Trusted Computing
下载PDF
导出
摘要 变电站保护控制设备在边界安全防护体系下得以安全稳定运行,但随着信息化、网络化技术不断应用,变电站网络安全要求也在发生变化,过度依赖边界防护的保护控制设备缺乏本体主动防护能力的问题逐渐突显。文章比较分析了不同主动防护技术后,选择了基于可信计算的主动防护技术进行研究,结合保护控制设备的高实时、高可靠等特点,给出了适合保护控制设备的可信计算双体系架构和具体硬软件实现方案。最后,保护监控设备主动防护效果通过了第三方检测机构的验证,且防护功能的增加并未对设备的功能和性能产生明显的影响,该方案具备工程化应用和推广价值。 The protection and control equipment of substations can operate safely and stably under the boundary security protection system.However,with the continuous application of information technology and networking technology,the network security requirements of substations are also changing.The problem of excessive reliance on boundary protection for protection and control equipment lacking the ability to actively protect itself is gradually becoming prominent.After comparing and analyzing different active protection technologies,this paper chooses active protection technology based on trusted computing for research.Combining the characteristics of high real-time and high reliability of protection and control devices,a dual system architecture of trusted computing and specific hardware and software implementation solutions suitable for protection and control devices is proposed.Finally,the active protection effect of the protection monitoring equipment has been verified by third-party testing institutions,and the increase in protection functions has not had a significant impact on the functionality and performance of the original equipment.This plan has engineering application and promotion value.
作者 林青 胡绍谦 汤震宇 陈宝鼎 LIN Qing;HU Shaoqian;TANG Zhenyu;CHEN Baoding(NR Electric Co.,Ltd.,Nanjing 211102,Jiangsu Province,China;NARI Group Corporation,Nanjing 211106,Jiangsu Province,China)
出处 《电力信息与通信技术》 2024年第1期31-38,共8页 Electric Power Information and Communication Technology
基金 国家重点研发计划项目(2021YFB2401000)。
关键词 变电站 保护控制设备 边界防护 主动防护 可信计算 双体系架构 substation protection and control equipment boundary protection active protection trusted computing dual system architecture
  • 相关文献

参考文献20

二级参考文献188

共引文献190

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部