Font Size: a A A

Design And Application On Trusted Computing Of IED In Substation Automation

Posted on:2008-02-16Degree:MasterType:Thesis
Country:ChinaCandidate:J J LiFull Text:PDF
GTID:2132360218457856Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of network technology, new challenges of information security have also emerged. As the problems of information security have threatened the safety, stability, economy and optimal operation of electric power systems, and have had great impact on the actualization of"Digital Power Systems". It is particularly important, in the present information work of electric power systems, to do research on information security, to develop relevant applications, to establish information security policies that could protect electric power systems from attack and to devise measures that could recovery systems.Aiming at this security need, this thesis introduces the international standard of substation automation– IEC 61085 and its security demand in remote communication, the concept of trusted computing and its application in information security. Some aspects such as network construction of the system,information model and communication model of IED of substation for telecontrol are analyzed and designed.A new secure distributed telecontrol inform action transmission mode between IED of substation and dispatching center based on network is established. To the requirement of security, Trusted Computing method issued by Trusted Computing Group (TCG) was introduced into substation automation, and TPM must be embedded in IEDs with a trust chain set up, meanwhile System on Programmable Chip (SOPC) was used in order to expand the trust to remote platforms, then the platform of security remote communication was designed. In the end, the method of user's identification authentication has been design, and some experimentation proved security remote communication. This article has analyzed in detail on trusted computing under the system that wide area security defense-oriented, such as application and security of bottom IED device, electric substation cipher management, transformation protocol and dependable authentication. In addition, we have discussed originally the applied feasibility and advantages of this technique in future electric substation IED secure communication .The design coincides well with the latest international standards --- IEC61850. It provides a foundation for remote security communication in substation automation.
Keywords/Search Tags:trusted computing (TC), substation automation, IED, remote communication
PDF Full Text Request
Related items