Font Size: a A A

Research On Endogenous Security Of Energy Internet Based On Trusted Computing And Blockchain

Posted on:2021-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:P F WeiFull Text:PDF
GTID:2518306305472934Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
In recent years,they have connected to the energy Internet to large-scale distributed energy sources,electric vehicles,and intelligent collection terminals.They have many types,huge numbers,and different access characteristics t.Similarly,their access also brings more security threats to access points and channels of the energy Internet.In addition,it is increasing to the interactiviity and synergy between energy system equipment,with the timeliness of new communication technologies and energy Internet services.Therefore,it is necessary to ensure the safe operation of the energy Internet and the security protection of energy-critical infrastructure.However,traditional network isolation and protection cannot meet the development needs of energy Internet sharing and interconnection.It is necessary to enhance the endogenous robustness of energy Internet and the security and reliability of energy Internet facilities.It has become the key to build the security immunity mechanism and active defense system of the energy Internet facility itself.In view of the above problems,a physical security model of the energy Internet based on trusted computing is proposed,based on the security requirements of key infrastructures in the new scenario of the energy Internet,combined with the typical applications of trusted security protection of existing energy power systems.Based on the logical functions of trusted nodes,this paper establish a three-level and three-layer trusted security protection model for the energy Internet,and discuss the node-based security protection strategy and network trusted connection strategy based on trusted computing in the model.After that,a secure transmission protocol for trusted nodes to communicate in the energy Internet was proposed to ensure the active immunity of energy Internet nodes.In addition,it is difficult to monitor the compliance of different types of access devices in different systems of the energy Internet.Taking advantage of the tamper-resistant characteristics of the Blockchain.this paper builds a security model of the energy internet based on Blockchain.The model uses three chains of private chain,public chain and alliance chain,which constitutes the supervision mechanism of the security behavior of the energy Internet,and realizes the reliability of the conscious behavior of energy nodes.Then,based on the research on the complementarity of trusted computing and Blockchain,it is established to a model of endogenous security of energy internet based on trusted computing and Blockchain,and the endogenous security of trusted computing and Blockchain collaboration was proposed protection mechanism.Deep learning is applied to the model to realize the identification and defense of the attacker by selecting two scenarios of external attack and internal attack and then verify the availability of the model.Finally,combined with the new requirements of network security level protection 2.0,this paper explored the application of trusted computing and Blockchain in secure communication networks,secure area borders,and secure computing environments,and that provides a reference for constructing an energy Internet security scenario that is more in line with the requirements of level protection 2.0.
Keywords/Search Tags:Energy Internet, Endogenous Security, Trusted Computing, Blockchain, Active immunity
PDF Full Text Request
Related items