Font Size: a A A

Research On Commanication Security Technology Of Friendly Wind Power Grid Connected Power Control Substation

Posted on:2016-08-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y N SuFull Text:PDF
GTID:2272330470972208Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the expansion of the scale of wind farm, wind power capacity continues to improve, has posed a challenge to the power system stability control, power control sub station is the realization of dispatching system of unified management of the effective means of wind farm. The existing power control sub station for active and reactive power control logic for more research, but the research on information security system is less, such as operating system vulnerabilities, and the intrusion of existing software platform of the virus code, packet transmission risk and safety operation of information leaks to be malicious control and other security issues.This paper focuses on the information security function in power control sub station system, security chip to increase the company’s existing common hardware platform based on the embedded hardware platform, build a trusted base at the bottom of the system; Increase the driver and trusted software layer of TCG stack on the TPM security chip in the embedded software platform, through the TPM driver and TCG software stack is constructed by combining software and hardware architecture of embedded real time operating system trusted; The framework of the hardware and software based on the construction safety, safe and reliable embedded software platform through the research on the component library, configuring the kernel and the trusted chain model and loading mechanism, as well as safe and reliable character with independent intellectual property rights of the programmable logic component runtime environment; The research has the encryption and authentication, intrusion detection security functional components design method; design of telnet and FTP of universal service, file transfer, communication mechanism of the general protocol access to basic frame, and made a detailed analysis and design on the general framework of protocol processing based on a typical power system application protocol in the application layer data; finally, the original data of Ethernet service flow of communication encryption and decryption attempt to reduce risk of data transmission.The software of man-machine interface as power control sub station, realize the key information of station equipment for monitoring on the one hand, has the control function of the equipment, on the other hand, a detailed analysis of three module relates to the safe operation of the:The communication module, the logical configuration and user authority management function, respectively, for the three modules of the functional decomposition, and focus on the realization of the function of the software analysis and design.
Keywords/Search Tags:Power control, communication, information security, encryption, decryption, monitoring
PDF Full Text Request
Related items