Security Access of Power terminal on Trusted Computing in Smart Grid

Article Preview

Abstract:

With the development of interactive business for smart grid, for the security access requirement of kinds of business terminal, this paper proposed security access of power terminal on trusted network connection in power of things which combined with power of things and kinds of power terminals on the basis of trusted network connection. By discussing in detail security access architecture of power terminal and flow, the feasibility of program design is confirmed.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2659-2664

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] ZHAO Junhua, WEN Fushun, XUE Yusheng, LI Xue, DONG Zhaoyan: Cyber Physical Power Systems: Architecture, Implementation Techniques and Challenges. Automation of Electric Power Systems Vol. 34-16(2010), pp.1-7.

Google Scholar

[2] LIN Yu-feng, ZHONG Jin, Felix Wu: Discussion on smart grid supporting technologies. Power System Technology Vol. 3-12(2009), pp.8-14.

Google Scholar

[3] HU Xue-hao: Smart grid—A development trend of future power grid. Power System Technology Vol. 33-14(2009), pp.1-5.

Google Scholar

[4] ZHANG Wen-liang, LIU Zhuang-zhi, WANG Ming-jun: Research status and development trend of smart grid. Power System Technology Vol. 33-13(2009), pp.1-11.

Google Scholar

[5] Thomas Chen, Juan Carlos Sanchez-Aarnoutse: Petri Net Modeling of Cyber-Physical Attacks on Smart Grid. IEEE TRANSACTIONS ON SMART GRID Vol. 2-4(2011), pp.741-749.

DOI: 10.1109/tsg.2011.2160000

Google Scholar

[6] Oliver Kosut, Liyan Jia, Robert Thomas, and Lang Tong: Malicious Data Attacks on the Smart Grid. IEEE TRANSACTIONS ON SMART GRID Vol. 2-4(2011), pp.645-658.

DOI: 10.1109/tsg.2011.2163807

Google Scholar

[7] Le Xie, Yilin Mo, and Bruno Sinopoli: Integrity Data Attacks in Power Market Operations. IEEE TRANSACTIONS ON SMART GRID Vol. 2-4(2011), pp.659-666.

DOI: 10.1109/tsg.2011.2161892

Google Scholar

[8] Yichi Zhang, Lingfeng Wang, Weiqing Sun, Robert C. Green II, and Mansoor Alam: Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids. IEEE TRANSACTIONS ON SMART GRID Vol. 2-4(2011), pp.796-808.

DOI: 10.1109/tsg.2011.2159818

Google Scholar

[9] ZHANG Huan Guo, CHEN Lu, ZHANG Li Qiang: Research on trusted network connection. Chinese Journal of Computers Vol 33(2010), pp.706-716.

DOI: 10.3724/sp.j.1016.2010.00706

Google Scholar

[10] LIN Chuang, PENG Xue-Hai: Research on trustworthy networks. Chinese Journal of Computers Vol 28-5(2005), pp.751-758.

Google Scholar

[11] TCG. TNC Architecture V1. 4 R4. https: /www. trustedcomputinggroup. org.

Google Scholar

[12] Zhang-Huanguo, Chen-Lu, Zhang-Liqiang: Research on Trusted Network Connection. Journal of Computer Vol 33-1, pp.706-716.

Google Scholar