Research and Application of Remote Operating Permission Security Control System of Protection Information Master Station

被引:0
|
作者
Liu M. [1 ]
Tang Z. [1 ]
Cao X. [1 ]
Hu S. [1 ]
机构
[1] NR Electric Co., Ltd., Nanjing
来源
关键词
Network security; Permission management; Protection information system; Remote control; Security gateway;
D O I
10.13335/j.1000-3673.pst.2020.2024
中图分类号
学科分类号
摘要
The wide application of remote control business for modifying settings and switching setting groups in the master station of the protection information system puts forward higher requirements for the operation authority control and the network security. Combined with the features of the power system master station and the substation communication architectures and the current implementation status of the remote control business, the operation permission security control system is studied and developed. The design ideas, the system structure, the message processing flow, the device hardware design schemes and the system deployment schemes are expounded. The permission management of remote modifying settings and the network security protection are strengthened under the conditions that the existing business system architectures, the applied programs and the system configuration remain completely constant. The verification examples in both the laboratory and application sites are given, the application effects are summarized, and the further research direction of the usage scenarios to be expanded is prospected. © 2022, Power System Technology Press. All right reserved.
引用
收藏
页码:412 / 419
页数:7
相关论文
共 21 条
  • [1] LEI Ming, CHEN Yicong, LIU Feng, Et al., Online monitoring and analysis system based on D5000 for relay protections, Power System Technology, 44, 3, pp. 1197-1202, (2020)
  • [2] SHENG Haihua, ZHAO Jiyuan, XI Honglei, On-line management and control scheme for relay protection settings of smart grid, Automation of Electric Power Systems, 40, 15, pp. 154-158, (2016)
  • [3] HUA Huangsheng, LIU Yuquan, WANG Li, Et al., Control model for remote modification of relay protection setting group and its application, Automation of Electric Power Systems, 36, 21, pp. 81-86, (2012)
  • [4] HOU Xiandong, WANG Banghui, LIU Wei, Et al., Approach of relay protection setting remote operation based on operating files, Electric Power Engineering Technology, 37, 1, pp. 147-152, (2018)
  • [5] WANG Gang, ZHANG Qianyun, HUANG Ling, Et al., Research and development of the function of remote modifying setting value based on bi-directional interaction acknowledgment mechanism, Smart Grid, 4, 1, pp. 96-100, (2016)
  • [6] WANG Dong, CHEN Chuanpeng, YAN Jia, Et al., Pondering a new-generation security architecture model for power information network, Automation of Electric Power Systems, 40, 2, pp. 6-11, (2016)
  • [7] KURT M N, YILMAZ Y, WANG Xiaodong, Distributed quickest detection of cyber-attacks in smart grid, IEEE transactions on information forensics and security, 13, 8, pp. 2015-2030, (2018)
  • [8] XI Yu, ZOU Junxiong, CAI Zexiang, Et al., Information security protection method for smart substation communication network based on message identification and flow control, Power System Technology, 41, 2, pp. 624-629, (2017)
  • [9] TANG Yi, LI Mengya, WANG Qi, Et al., A review on research of cyber-attacks and defense in cyber physical power systems part two detection and protection, Automation of Electric Power Systems, 43, 10, pp. 1-9, (2019)
  • [10] CHEN Biyun, DAI Qiaoling, Evaluation model of operation execution capability of power dispatcher, Proceedings of the CSU-EPSA, 31, 8, pp. 1-6, (2019)