Font Size: a A A

Research On The Security Of Communication System In Wind Turbine

Posted on:2011-10-11Degree:MasterType:Thesis
Country:ChinaCandidate:X YuFull Text:PDF
GTID:2132330332463940Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Along with the quick step of new energy sources development and use, using wind power for electricity generation has become a hot topic in present world. Our country is rich in wind power sources, and the use of wind energy is always be regarded by government, meanwhile the construction of wind farm is extending day by day. In the practical run process of the wind farm, wind turbine's correlated operator need to acquire the necessary real time information to implement remote diagnosis and remote maintenance, for assurance of natural work in wind farm, by using Internet to access remote wind turbines. In the process of information exchange between every type users and wind turbines, supervisory data and control command are easily to be wiretapped and tampered by unauthorized user when they are being transferred on the network which is based on TCP/IP. As a high-cost important foundation establishment, the wind turbine which connects a state's security does not allow the security hidden trouble like this to exist.Aiming at the embedded environment the wind turbine in wind farm work in, and following the suggestion which is put forward by IEC 62351-3 standard's authorization model, the paper has designed a wind turbine security controller. Then, taking the client accessing remote Neimenggu Zhuozi wind farm for example, the paper has implemented a wind turbine security controller named WT-key by programming. After system test, the validity related to the security controller insuring wind turbine communication's security is validated. The material work can be summarized as follows:(1) In allusion to the wind farm's real demand and the shortage of existing wind farm SCADA system, the paper has designed wind turbine long-distance access model in which user can access wind turbine directly. Afterwards, on the base of continuing to use quondam wind turbine and according as IEC 62351-3 standard, the paper has added security controller for wind turbine long-distance access model and constructed wind turbine security long-distance access model which insures the security of access control and data transfer while user is communicating with wind turbine.(2)On the base of cryptogram technology, and in allusion to the every merit of hardware encryption, the paper has completed particular design for cryptogram operation module of wind turbine security controller by the use of a cipher chip. Then, the paper has imported Role-Based Access Control at the face of wind farm practical situation, and has finished particular design for access control module. In the end, the paper has completed particular design for communication security module through analyzing implement to embedding SSL based on cipher chip by the use of MatrixSSL.(3)Taking the client accessing remote Neimenggu Zhuozi wind farm for example, the paper has constructed a network based on long-distance online maintenance, and on the base of this network, the paper has completed a simple security controller named WT-key by consulting the particular design scheme of security controller referred before and validated the validity of its security function.
Keywords/Search Tags:IEC 62351-3, security controller, access control, cipher chip, communication security
PDF Full Text Request
Related items