ZHANG Lei, LI Yan, GU Siting, YUAN Yanfang, WANG Zhenlin, FANG Mu, YOU Xinhong. Security and trustworthy protection model and evaluation system of distribution automation under the new power system[J]. Microelectronics & Computer, 2023, 40(12): 70-80. DOI: 10.19304/J.ISSN1000-7180.2022.0696
Citation: ZHANG Lei, LI Yan, GU Siting, YUAN Yanfang, WANG Zhenlin, FANG Mu, YOU Xinhong. Security and trustworthy protection model and evaluation system of distribution automation under the new power system[J]. Microelectronics & Computer, 2023, 40(12): 70-80. DOI: 10.19304/J.ISSN1000-7180.2022.0696

Security and trustworthy protection model and evaluation system of distribution automation under the new power system

  • The ubiquitous power Internet of Things(IoT) is an important direction for the development of the current new power system. The ubiquitous power IoT can naturally support the construction of active distribution networks in terms of operation mode and topology. However, due to the complex operating environment of the distribution network, it is necessary to realize the ubiquitous IoT and panoramic views based on the distribution IoT. In terms of perception, it is also necessary to directly face the dynamic changes in the distribution network structure and boundary caused by the flexible and diverse access environments and methods of the IoT, a large number of terminals, and the higher security risks faced. It is urgent to take into account the inside and outside, multi-dimensional integration of power distribution automation security and trusted protection research. This paper firstly introduces the architecture of the distribution automation system under the new power system, and proposes a trusted protection model for distribution automation security; secondly, establishes an evaluation system of equal protection indicators based on trusted computing, and analyzes the feasibility of its application to the security of distribution automation systems; Furthermore, the proposed distribution automation security trusted protection model is evaluated, and its integrity measurement and trusted network connection process are analyzed. Finally, the security under this architecture is briefly summarized.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return