Discussion on Security Protection Technology of Smart Distribution Grid

Article Preview

Abstract:

Smart distribution grid is an open grid, in the process of its deployment must be fully consider its safety problems. Based on the technical system and features of smart distribution grid, the security of smart distribution grid is divided into three levels, smart distribution grid may be the emergence of new safety issues, from data acquisition and processing, information transmission and information applications, this paper expounded on the security technology of the future smart distribution grid.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 614-615)

Pages:

1646-1650

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Shuyong Chen, Shufang Song, Lanxin Li,Jie Shen. Power System Technology, 2009, 33(8) :1-7(in Chinese).

Google Scholar

[2] Ji Li. Journal of ANHUI Electrical Engineering Professional Technique College, 2007, 12(3) :33-35(in Chinese).

Google Scholar

[3] Bingyin Xu, Tianyou Li, Yongduan Xue, Wenlong Jin. Distribution & Utilization, 2009, 26(3):81-84(in Chinese).

Google Scholar

[4] Hongbin Sun, Yingjie Zhang. China Rural Water and Hydropower, 2012, 0(2):131-134(in Chinese).

Google Scholar

[5] MCGRANA GHAN M, GOODMAN F. Technical and system requirements for advanced distribution automation/ /Proceedings of the 18th International Conference on Electricity Distribution, June 6-9, 2005, Turin, Italy:5p.

DOI: 10.1049/cp:20051374

Google Scholar

[6] Bingyin Xu, Tianyou Li, Yongduan Xue, Wenlong Jin. Distribution & Utilization, 2009, 26(6):19-23 (in Chinese).

Google Scholar

[7] Dongxue Li, Jianyi Li. China Chemical Trade, 2012,4(2):28-30 (in Chinese).

Google Scholar

[8] Vespignani A. The fragility of interdependency[J]. Nature, 2010, 464(7291):984-985.

DOI: 10.1038/464984a

Google Scholar

[9] Bompard E, Napoli R, Xue F. Vulnerability of interconnected power systems to malicious attacks under limited information [J]. European Transactions on Electrica Power, 2008, 18(8):820-834.

DOI: 10.1002/etep.274

Google Scholar

[10] Jinchang Liu, Zhengyue Lai, Chengyue Yang, Haosong Li. Electric Power Information Technology, 2010, (9):13-16(in Chinese).

Google Scholar

[11] Shengwei Mei, Yingying Wang, Laijun Chen. High Voltage Engineering, 2011, 37(3): 672-679 (in Chinese).

Google Scholar

[12] ERGEN S C. ZigBee/IEEE 802.15.4 Summary[R]. Berkeley, CA, USA; University of California Berkeley, 2004; 4-21.

Google Scholar

[13] HAMLYN A, CHEUNG H, MANDERT, et a1. Network Security Management and Authentication of Actions for Smart Grids Operations [C]. Montreal: Electrical Power Conference,2007.

DOI: 10.1109/epc.2007.4520302

Google Scholar

[14] KHURANA H, HADLEY M, LU N, et a1. Smart-Grid Security issues[J]. Security&Privacy, 2010,8(1):81-85.

DOI: 10.1109/msp.2010.49

Google Scholar