文章摘要
张涛,赵东艳,薛峰,等.电力系统智能终端信息安全防护技术研究框架[J].电力系统自动化,2019,43(19):1-8. DOI: 10.7500/AEPS20180803003.
ZHANG Tao,ZHAO Dongyan,XUE Feng, et al.Research Framework of Cyber-security Protection Technologies for Smart Terminals in Power System[J].Automation of Electric Power Systems,2019,43(19):1-8. DOI: 10.7500/AEPS20180803003.
电力系统智能终端信息安全防护技术研究框架
Research Framework of Cyber-security Protection Technologies for Smart Terminals in Power System
DOI:10.7500/AEPS20180803003
关键词: 电力系统  智能终端  安全挑战与风险  安全防护
KeyWords: power system  smart terminal  challenge and risk of security  security protection
上网日期:2019-07-26
基金项目:
作者单位E-mail
张涛 全球能源互联网研究院有限公司, 江苏省南京市 210003
国家电网有限公司信息网络安全实验室, 江苏省南京市 210003 
 
赵东艳 北京智芯微电子科技有限公司, 北京市 102200  
薛峰 国电南瑞科技股份有限公司, 江苏省南京市 211106  
张波 全球能源互联网研究院有限公司, 江苏省南京市 210003
国家电网有限公司信息网络安全实验室, 江苏省南京市 210003 
zhangbo@geiri.sgcc.com.cn 
章锐 全球能源互联网研究院有限公司, 江苏省南京市 210003
国家电网有限公司信息网络安全实验室, 江苏省南京市 210003 
 
摘要:
      随着中国电网“三型两网”泛在电力物联网发展目标的提出,电力系统智能终端广泛互联、泛在接入,终端易成为攻击电网的主要目标和跳板。在此背景下,围绕电力系统智能终端安全互联和现场移动作业需求,对电力系统智能终端安全防护挑战及防护技术框架进行了阐述。构建了覆盖芯片层、终端层、交互层的电力系统智能终端防护框架,对芯片电路级可证明安全防护和内核故障自修复、融合可信计算和业务安全的异构终端主动免疫、面向不确定攻击特征的终端威胁精确感知与阻断、终端互联计算环境下电力系统智能终端安全接入和业务隔离等关键技术进行了详细展望。
Abstract:
      Along with the propose of the strategy of building power grid with ‘three functions and two networks' and developing ubiquitous Internet of Things, the power system terminals are widely interconnected and ubiquitous, so the terminals are often regarded as the target and springboard when power grid is attacked. Under this background, by focusing on the security interconnection of smart devices and demand of mobile operation in power system, this paper expounds the challenges and technical framework of the security protection for smart terminals of power system. This paper builds the protection framework for smart terminals of power system covering chip layer, terminal layer and interaction layer. This paper gives a detailed prospect for some key technologies, such as provable security protection in chip circuit layer and kernel fault self-recovery, active immunity of heterogeneous terminals integrating trusted computing and business security, precise perception and blocking of terminal threats with uncertain attack features, power terminal security access and business isolation in the terminal interconnection computation environment.
查看全文(Free!)   查看/发表评论  下载PDF阅读器