Font Size: a A A

Study On Relay Protection Setting Online Distribution Management System And Its Security Protection Technology

Posted on:2018-07-17Degree:MasterType:Thesis
Country:ChinaCandidate:S T ZhuFull Text:PDF
GTID:2322330533469913Subject:Electrical engineering and its automation
Abstract/Summary:PDF Full Text Request
The safety and stability of the power system are the key to ensure the normal operation of the power system,and relay protection plays an irreplaceable role in maintaining the security and stability of the power system.With the development of power system informatization,it has been widely studied to improve the distribution and management efficiency of relay protection by means of informatization.In recent years,the attacks on power system through the communication network have occurred in the target of power data/information.On the basis of analyzing the specific requirements and information security threats of the online distribution management system of relay protection,this paper studies the information security technology applicable to the system,gives the security scheme,designs and realizes the relay protection fixed value on-line distribution management system.Firstly,the paper analyzes the distribution and management process of relay protection,determines the management flow of the fixed value single on-line distribution,analyzes the functional requirements and potential security threats of the system,and determines the system security requirements and main functions of the system.Secondly,the system is distinguished from the perspective of system function model,system object model and system dynamic model.This paper presents the use case diagram,Class diagram and sequence diagram of the system UML model,constructs the function model of the relay protection fixed value on-line distribution management system,describes the function model,the object model and the dynamic model of the system,and completes the basic design,the structure design and the detailed design of the system.Then,security,running speed and operational resources of symmetric and asymmetric cryptographic algorithms are compared and discussed,and the system Communication encryption scheme is designed.Based on fingerprint identification technology,the system dual factor authentication scheme is designed.According to the rules of the set-valued on-line transfer process and the role-level design,this paper gives the step of the role privilege assignment,designs the system access control strategy,constructs the system secure channel based on the SSL protocol,gives the security protection means of the system security threat,and completes the overall design of the system securityFinally,the function modules of each function of the system are given,the realization flow of the system user role and the Privilege Assignment management scheme is analyzed,the identity authentication and the access control module are completed,the SSL protocol certificate of the server is made,and the SSL protocol communication configuration is completed.Combining with the UML activity diagram of the System User role,the realization process of the fixed value to single on-line transfer and the device parameter uploading the module is given.Using database,Open SSL and other development tools.The system server configuration and client software are realized,which verifies the reliability and stability of the system scheme design.
Keywords/Search Tags:Relay protection, Relay Setting online transmission, TBAC, SSL/TLS
PDF Full Text Request
Related items