|
|
Application and implementation of the security reinforcement for the secondary equipment configuration tool |
Liu Wenbiao, Wang Weijie, Jiang Nan, Qian Wei, Ji Ling |
Nanjing SAC Software Engineering Co. Ltd., Nanjing 211100 |
|
|
Abstract The configuration tool for the secondary equipment in smart substation could realize the functions of parameter configuration, function definition, monitoring, remote control operation and so on. It is imperative to study and improve its security protection ability to prevent the intrusion, tampering and illegal operation from the secondary equipment. In this paper, the security of configuration tools is strengthened by the following aspects, that is, the data security of communication security, data security storage and integrity is strengthened by the state cryptographic algorithms; access control based on the separation of the four powers; security at the code level; independent audit system. It can meet the basic requirements of cyber security level protection, reduce the information security risks of the secondary equipment to a certain extent, and improve the security of configuration and operation of the secondary equipment in smart substation.
|
Received: 02 December 2019
|
|
|
|
Cite this article: |
Liu Wenbiao,Wang Weijie,Jiang Nan等. Application and implementation of the security reinforcement for the secondary equipment configuration tool[J]. Electrical Engineering, 2020, 21(6): 141-145.
|
|
|
|
URL: |
http://dqjs.cesmedia.cn/EN/Y2020/V21/I6/141
|
[1] 童晓阳, 王晓茹. 乌克兰停电事件引起的网络攻击与电网信息安全防范思考[J]. 电力系统自动化, 2016, 40(7): 144-148. [2] 罗军舟, 杨明, 凌振, 等. 网络空间安全体系及关键技[J]. 中国科学:信息科学, 2016, 46(8): 939-968. [3] 李田, 苏盛, 杨洪明, 等. 电力信息物理系统的攻击行为与安全防护[J]. 电力系统自动化, 2017, 41(22): 162-167. [4] 颜诚, 吴文宣, 范元亮, 等. 电力CPS研究综述[J]. 电气技术, 2017, 18(6): 1-7, 12. [5] 李涛, 杨桂丹. 智能变电站二次安全防护系统设计与应用研究[J]. 电气技术, 2013, 14(1): 26-29. [6] 肖建民. 电力调度自动化二次安全防护方案分析[J]. 电气技术, 2016, 17(7): 157-160. [7] 刘念, 张建华, 段斌. 基于XML Security的变电站远程配置安全机制设计[J]. 电力自动化设备, 2009, 29(2): 113-116, 144. [8] 贺晓, 李俊, 陈洁羽, 等. 智能变电站配置文件管控系统建设方案研究[J]. 智慧电力, 2017, 45(8): 75-81. [9] GB/T 22239—2019. 信息安全技术网络安全等级保护基本要求[S]. [10] GB/T 28448—2012. 信息安全技术信息系统安全等级保护测评要求[S]. [11] GB/T 20945—2013. 信息安全技术信息系统安全审计产品技术要求和测试评价方法[S]. [12] 许勇刚, 冯扬, 汪爽. 智能变电站信息安全防护体系研究[J]. 电子测量技术, 2014, 37(10): 9-15, 28. [13] 佘冉君. SSL安全研究及实现[D]. 西安: 西安电子科技大学, 2015. [14] 骆钊, 严童, 谢吉华, 等. SM2加密体系在智能变电站远动通信中的应用[J]. 电力系统自动化, 2016, 40(19): 127-133. [15] 骆钊, 谢吉华, 顾伟, 等. 基于SM2密码体系的电网信息安全支撑平台开发[J]. 电力系统自动化, 2014, 38(6): 68-74. [16] 胡洋, 任振兴, 腾国山, 等. 一种基于IEC 62351的变电站远动通信混合加密算法[J]. 电力信息与通信技术, 2018, 16(5): 24-29. [17] DL/T1455—2015. 电力系统控制类软件安全性及其测评技术要求[S]. [18] 尤小明, 汤震宇, 胡绍谦, 等. 变电站内网安全监测装置的设计与实现[J]. 电气技术, 2018, 19(12): 92-96. |
|
|
|