Security Access of Power terminal on Trusted Computing in Smart Grid

被引:1
|
作者
Deng Song [1 ]
Lin Wei-min [1 ]
Zhang Tao [1 ]
Ma Yuan-yuan [1 ]
机构
[1] China Elect Power Res Inst, Nanjing 211106, Jiangsu, Peoples R China
关键词
power terminal; trusted computing; smart grid; security access;
D O I
10.4028/www.scientific.net/AMM.241-244.2659
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of interactive business for smart grid, for the security access requirement of kinds of business terminal, this paper proposed security access of power terminal on trusted network connection in power of things which combined with power of things and kinds of power terminals on the basis of trusted network connection. By discussing in detail security access architecture of power terminal and flow, the feasibility of program design is confirmed.
引用
收藏
页码:2659 / 2664
页数:6
相关论文
共 50 条
  • [1] Security Authentication Method of Terminal Trusted Access in Smart Grid
    Wang, Yufeng
    Wu, Lie
    Yang, Yun
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 337 - 345
  • [2] Research on Smart Mobile Terminal Security Technology Based on Trusted Computing
    Li, Ming
    Fang, Yuan
    Liu, Jun
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 3278 - 3281
  • [3] An Improved Grid Security Infrastructure by Trusted Computing
    YAN Fei~ 1
    2. College of Computer Science and Technology
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1805 - 1808
  • [4] A scheme based on trusted computing for terminal security
    Zhang, Jun
    Liu, Wei-peng
    Zhou, Zheng
    Li, Jian
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
  • [5] Trusted Grid computing with security binding and trust integration
    Song S.
    Hwang K.
    Kwok Y.-K.
    [J]. Journal of Grid Computing, 2005, 3 (1-2) : 53 - 73
  • [6] Trusted grid computing with security assurance and resource optimization
    Song, S
    Hwang, K
    [J]. PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 110 - 117
  • [7] Daonity: An experience on enhancing grid security by trusted computing technology
    Yan, Fei
    Qiang, Weizhong
    Shen, Zhidong
    Chen, Chunrun
    Zhang, Huanguo
    Zou, Deqing
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 227 - 235
  • [8] Based on Trusted Computing Solutions for Mobile Payment Terminal Security
    Yu, Haiyong
    Li, Peng
    [J]. NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 570 - 574
  • [9] Smart power grid and cloud computing
    Markovic, Dragan S.
    Zivkovic, Dejan
    Branovic, Irina
    Popovic, Ranko
    Cvetkovic, Dragan
    [J]. RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2013, 24 : 566 - 577
  • [10] DHT-based security infrastructure for trusted internet and grid computing
    Hwang, Kai
    Cai, Min
    Kwok, Yu-Kwong
    Song, Shanshan
    Chen, Yu
    Chen, Ying
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2006, 2 (04) : 412 - 433