Realization of Safety Reinforced Terminal Equipment for Secondary System of Substation

被引:0
|
作者
Wang X. [1 ,2 ]
Zhou K. [1 ,2 ]
Wu C. [2 ]
机构
[1] Electric Power Research Institute of Guangxi Power Grid Co Ltd, Nanning
[2] Guangxi Power Grid Co., Ltd, Nanning
关键词
Grid system; Microcontrollers; Safety reinforcement terminal; Substation safety;
D O I
10.16339/j.cnki.hdxbzkb.2022269
中图分类号
学科分类号
摘要
With the high integration of informatization and industrialization, the degree of intelligence and automation of the secondary system of substations has been continuously enhanced. While enjoying the convenience, we also need to face the challenges and threats brought by the Internet. In view of the confidentiality, integrity and other security threats that the secondary system applications or tools may face during the calculation and transmission process, the enhanced security terminal protection technology based on the USB interface has become a research hotspot. Although the traditional enhanced security terminal equipment is easy to produce, the algorithms in it have been specified by the manufacturer and downloaded to the corresponding equipment. Considering that the security requirements of different scenarios are quite different, and different users have multi-level security requirements, the AVR microcontroller is programmed through the Arduino IDE platform, and an enhanced security terminal equipment with general algorithms is designed and implemented, which not only realizes functions such as identity authentication and content encryption, but also meets the personalized needs of users' independent choices and improves the security and controllability of the entire secondary system. After the test, the usability and robustness of the terminal are preliminarily proved. © 2022, Editorial Department of Journal of Hunan University. All right reserved.
引用
收藏
页码:69 / 77
页数:8
相关论文
共 16 条
  • [1] AN Y, ZHAO B, LI Y M., Research on software protection method based on USB Key, 19th IEEE International Symposium on Asynchronous Circuits and Systems, pp. 210-213, (2013)
  • [2] LANG Q Y, WU M C, ZHANG N, Et al., Application research of Arduino in the development of pressure monitoring project, Technology Wind, 12, (2019)
  • [3] SUN L J, LONG Y, HUANG X, Et al., Discussion on the reform of electronic technology experiment teaching based on Arduino, Electronics World, 3, pp. 34-35, (2019)
  • [4] LIU Y H, SHEN C X., An Information security function and application model, Journal of Computer-Aided Design & Computer Graphics, 17, 12, pp. 2734-2738, (2005)
  • [5] YANG J, ZHOU J., Analysis on the security threats of ID authentication and threat defense measure, Netinfo Security, 11, pp. 83-84, (2010)
  • [6] ZHAO D D, LUO W J., One-time password password authentication scheme based on the negative database, Engineering Applications of Artificial Intelligence: The International Journal of Intelligent Real-Time Automation, 62, pp. 396-404, (2017)
  • [7] GAO M., Talking about the application of symmetric encryption algorithm and asymmetric encryption algorithm, Electronics World, 15, pp. 59-60, (2015)
  • [8] CAI M., Analysis on the application of data encryption technology in computer network communication security, Telecom World, 26, 5, pp. 92-93, (2019)
  • [9] WU Z H, ZHAO J N, ZHU Y, Et al., Comparative study on application of Chinese cryptographic algorithms and international cryptographic algorithms in vehicle microcotrollers, Netinfo Security, 8, pp. 68-75, (2019)
  • [10] LIU J D, TIAN Y, WANG S H, Et al., A fast new one-way cryptographic hash function, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, pp. 302-306, (2010)