Cyber Security Protection of Power System Equipment Based on Chip-Level Trusted Computing

被引:1
|
作者
Xi, Wei [1 ]
Li, Xiaobo [1 ]
Feng, Qihui [1 ]
Yao, Hao [1 ]
Cai, Tiantian [1 ]
Yu, Yang [1 ]
机构
[1] China Southern Power Grid, Digital Grid Res Inst, Guangzhou, Peoples R China
来源
关键词
power equipment; cyber security; trusted computing; embedded system; on-chip security; INTERNET; IOT;
D O I
10.3389/fenrg.2022.842938
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
This article proposes a network security protection scheme for power system embedded devices based on chip-level trusted computing, gives the overall architecture of power equipment chip-level trusted computing, introduces the principle of trust chain transfer within power terminals, and proposes the method of using the on-chip SRAM inside the main control chip of power system embedded devices as the PUF to construct the trusted root. Furthermore, we propose a complete trust transfer mechanism from booting trust to the loading that trust on operating system and application, and give the corresponding program design framework and program logic. The chip-level trusted computing program designed in this article was applied in a distribution automation DTU device equipped with the FUXI chip that is developed by the China Southern Power Grid and the Sylix OS operating system. Finally, we carry out the security protection test. The validity of the designed program is verified by running malicious programs to attack the power equipment. The results show that the designed program can effectively detect and intercept illegal programs, and provide an effective solution for the security protection of power equipment in the open network environment.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] A multi-level security model based on trusted computing
    Jia, Zhao
    Liu Ji-qiang
    Jing, Chen
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 448 - +
  • [2] Investigation of a gravity-immune chip-level spray cooling for thermal protection of laser-based wireless power transmission system
    Wang, Ji-Xiang
    Li, Yun-Ze
    Li, Guang-Chao
    Xiong, Kai
    Ning, Xianwen
    INTERNATIONAL JOURNAL OF HEAT AND MASS TRANSFER, 2017, 114 : 715 - 726
  • [3] Design and implementation of security operating system based on trusted computing
    Nie, Xiao-Wei
    Feng, Deng-Guo
    Che, Jian-Jun
    Wang, Xin-Pu
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2776 - +
  • [4] A cloud computing based system for cyber security management
    Xu, Guobin
    Yu, Wei
    Chen, Zhijiang
    Zhang, Hanlin
    Moulema, Paul
    Fu, Xinwen
    Lu, Chao
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2015, 30 (01) : 29 - 45
  • [5] Challenges and Prospects of Cyber Security Protection for New Power System
    Zhou J.
    Zhang X.
    Shao L.
    Ying H.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2023, 47 (08): : 15 - 24
  • [6] Efficiency of chip-level versus external power combining
    Bryerton, EW
    Weiss, MD
    Popovic, Z
    IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES, 1999, 47 (08) : 1482 - 1485
  • [7] Security Protection and Testing System for Cyber-Physical Based Smart Power Grid
    Zheng, Luolin
    Gao, Tiefeng
    Zhang, Xiaofei
    PROCEEDINGS OF 2019 INTERNATIONAL FORUM ON SMART GRID PROTECTION AND CONTROL (PURPLE MOUNTAIN FORUM), VOL I, 2020, 584 : 847 - 857
  • [8] Development of a Chip-Level Ultimate Security Device Using Reactive Composites
    Sevely, Florent
    Wu, Tao
    Pelloquin, Sylvain
    Seguier, Lionel
    Mesnilgrente, Fabien
    Rossi, Carole
    20TH INTERNATIONAL CONFERENCE ON MICRO AND NANOTECHNOLOGY FOR POWER GENERATION AND ENERGY CONVERSION APPLICATIONS (POWERMEMS 2021), 2021, : 204 - 207
  • [9] Security strategy of DRM based on trusted computing
    Yan, Jianhong
    Peng, Xinguang
    Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234
  • [10] A Novel Chip-Level Blockchain Security Solution for the Internet of Things Networks
    Watanabe, Hiroshi
    Fan, Howie
    TECHNOLOGIES, 2019, 7 (01)