Key issue design of closed-loop management and control for generalized remote operation of protective relay oriented to information security

被引:0
|
作者
Jin N. [1 ]
Zhang L. [1 ]
Zhang J. [2 ]
Li Y. [1 ]
Zhu M. [1 ]
Hou L. [2 ]
机构
[1] State Grid Shaoxing Electric Power Supply Company, Shaoxing
[2] College of Automation, Hangzhou Dianzi University, Hangzhou
来源
Zhang, Jianmin (zhangjmhzcn@hdu.edu.cn) | 1600年 / Automation of Electric Power Systems Press卷 / 40期
基金
中国国家自然科学基金;
关键词
Closed-loop management and control; Generalized remote operation of protective relay; Information security; Operation order sheet; Secure operation module for protective relay;
D O I
10.7500/AEPS20160515001
中图分类号
学科分类号
摘要
The generalized remote operation of protective relay refers to all the business operation orders involving operational mode changes and operating maintenance arising from an external substation or an internal one. Such remote operation should follow a strict business control with high cyber security guarantee, which is an urgent engineering task demanding prompt solution. A closed-loop business supervising and control mechanism is proposed with the remote operation order sheet (ROS) uniformly signed and issued by the dispatch control center and uniquely executed by a novel secure operation module for protective relay (SOMR) in substation. The encrypted and extensive markup language formatted ROS will be prepared in safe zone III at the dispatch control center, and transferred to SOMR in IEC 61850 file mode, through a uniform ROS platform in safe zone I at the dispatch and control center. SOMR will execute ROS to target protective relays, to fulfill the orders such as protection setting, setting operation zone change, soft strap turn on or off, signal return, setting periodic verification, etc. plus the authorized site operations auto-monitoring and trace recording. The ROS modeling, and its digital signature and encryption selection, are also presented. Finally, the advantages and necessity of the proposed scheme are demonstrated. © 2016 Automation of Electric Power Systems Press.
引用
收藏
页码:117 / 122and167
相关论文
共 23 条
  • [1] Wang D., Chen C., Yan J., Et al., Pondering a new-generation security architecture model for power information network, Automation of Electric Power Systems, 40, 2, pp. 6-11, (2016)
  • [2] Yoo H., Shon T., Challenges and research directions for heterogeneous cyber-physical system based on IEC 61850: vulnerabilities, security requirements, and security architecture, Future Generation Computer Systems, 61, pp. 128-136, (2016)
  • [3] Power systems management and associated information exchange-data and communications security: IEC 62351, (2005)
  • [4] Network system management: implementation and application of the IEC 62351-7 standard
  • [5] Yang J., Tao W., Zhang J., Et al., Key technologies of substation prototype system conforming to IEC 62351 standard, Automation of Electric Power Systems, 39, 14, pp. 114-119, (2015)
  • [6] Sheng S., Chan W.L., Li K.K., Et al., Context information-based cyber security defense of protection system, IEEE Trans on Power Delivery, 22, 3, pp. 1477-1481, (2007)
  • [7] Zhu L., Shi D., Duan X., Evidence theory-based fake measurement identification and fault-tolerant protection in digital substations, IET Generation, Transmission & Distribution, 5, 1, pp. 119-126, (2011)
  • [8] Liu X., Shahidehpour M., Li Z., Et al., Power System Risk Assessment in Cyber Attacks Considering the Role of Protection Systems, (2016)
  • [9] Duan H., He F., Li Z., Et al., Online setting management system based on EMS and fault information system, Automation of Electric Power Systems, 30, 10, pp. 97-99, (2006)
  • [10] Wang D., Liu Y., Qiu X., Et al., Anticipated mode generating for on-line verification of relay protection setting based on maintenance tickets information, Automation of Electric Power Systems, 38, 19, pp. 81-84, (2014)