Realization of Safety Reinforced Terminal Equipment for Secondary System of Substation

被引:0
|
作者
Wang X. [1 ,2 ]
Zhou K. [1 ,2 ]
Wu C. [2 ]
机构
[1] Electric Power Research Institute of Guangxi Power Grid Co Ltd, Nanning
[2] Guangxi Power Grid Co., Ltd, Nanning
关键词
Grid system; Microcontrollers; Safety reinforcement terminal; Substation safety;
D O I
10.16339/j.cnki.hdxbzkb.2022269
中图分类号
学科分类号
摘要
With the high integration of informatization and industrialization, the degree of intelligence and automation of the secondary system of substations has been continuously enhanced. While enjoying the convenience, we also need to face the challenges and threats brought by the Internet. In view of the confidentiality, integrity and other security threats that the secondary system applications or tools may face during the calculation and transmission process, the enhanced security terminal protection technology based on the USB interface has become a research hotspot. Although the traditional enhanced security terminal equipment is easy to produce, the algorithms in it have been specified by the manufacturer and downloaded to the corresponding equipment. Considering that the security requirements of different scenarios are quite different, and different users have multi-level security requirements, the AVR microcontroller is programmed through the Arduino IDE platform, and an enhanced security terminal equipment with general algorithms is designed and implemented, which not only realizes functions such as identity authentication and content encryption, but also meets the personalized needs of users' independent choices and improves the security and controllability of the entire secondary system. After the test, the usability and robustness of the terminal are preliminarily proved. © 2022, Editorial Department of Journal of Hunan University. All right reserved.
引用
收藏
页码:69 / 77
页数:8
相关论文
共 16 条
  • [11] HU W, WU Q H, LIU S L, Et al., Design of secure eID and identity authentication agreement in mobile terminal based on Chinese cryptographic algorithm and blockchain, Netinfo Security, 7, pp. 7-15, (2018)
  • [12] ZHANG P, CHEN C S, HU H G., Authenticated encryption modes based on block ciphers, Netinfo Security, 11, pp. 8-17, (2014)
  • [13] LI M, SHI G Z, LOU J P., USB Key identity authentication scheme based on encryption service platform, Computer Applications and Software, 35, 9, pp. 288-291, (2018)
  • [14] XU H B, LI Y H., The application of DES encryption algorithm to protect data security in the file transfer, Netinfo Security, 6, pp. 24-26, (2009)
  • [15] ZHANG J H, GUO X B, FU X., AES encryption algorithm analysis and the application in information security, Netinfo Security, 5, pp. 31-33, (2011)
  • [16] CUI G Y., To build international market security made in China-decoding the international exploration and practice of flying integrity, China Information Security, 10, pp. 74-76, (2018)