ABSTRACT
The power system network is gradually developing to the Internet open mode. The informatization of industry and infrastructure has expanded the occurrence scope and transmission path of the traditional internal power system network risks. Its openness has brought more network security problems, and the convenience and security risks of the power system coexist. As an important part of key infrastructure, the electric power industry not only involves people's daily life, but also has a profound impact on the field of industrial control, and even on national security. We present the current investigation and analysis of the power system network security situation, including the current power grid attack means, classify and summarize the power grid network security risks, and elaborate on the traditional power system network security architecture. At present, the common network security protection technology of the power system includes encryption and digital signature technology, XML security technology, VPN technology applied in the power system, intrusion detection system, etc. We introduce a series of power grid network security solutions and measures in detail, including the research progress of power grid security at home and abroad. It is particularly important to strengthen the safe construction of power grid facilities and the safety protection of electric power enterprises. Opportunities and challenges coexist, the power industry should improve the awareness of network security, establish a security management platform, strengthen the security technical support, and take measures to prevent security risks.
- F. Shu, X. Ma, Z. Tian, Y. Yang and W. Liu, "Research on construction technology of network security shooting range for power monitoring system,"2021 IEEE 2nd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA), 2021, pp. 754-757.Google Scholar
- A. Mohammed and G. George, "Vulnerabilities and Strategies of Cybersecurity in Smart Grid - Evaluation and Review," 2022 3rd International Conference on Smart Grid and Renewable Energy (SGRE), 2022, pp. 1-6.Google Scholar
- Q. Guo, P. Xie, F. Li, X. Guo, Y. Li and L. Ma, "Research on Linkage Model of Network Resource Survey and Vulnerability Detection in Power Information System," 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2019, pp. 1068-1071.Google Scholar
- Z. Liu, W. Wei, L. Wang, C. -W. Ten and Y. Rho, "An Actuarial Framework for Power System Reliability Considering Cybersecurity Threats," in IEEE Transactions on Power Systems, vol. 36, no. 2, pp. 851-864, March 2021.Google ScholarCross Ref
- S De Porcellinis, G Oliva, S Panzieri , "Critical Infrastructure Protection IV[J]",Ifip Advances in Information & Communication Technology, vol. 79, no. 4, pp. 11-15, 2017.Google Scholar
- H M. Mousa, "DNA-Genetic Encryption Technique[J]",International Journal of Computer Network & Information Security, vol. 8, no. 7, pp. 1-9, 2016.Google ScholarCross Ref
- F. Tang, H. Jia, L. Shi and M. Zheng, "Information Security Protection of Power System Computer Network," 2021 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC), 2021, pp. 1226-1229.Google Scholar
- F. Tang, H. Jia, L. Shi and M. Zheng, "Information Security Protection of Power System Computer Network,"2021 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC), 2021, pp. 1226-1229.Google Scholar
- Z. Ying, W. Yirong and W. Ning, "Study of Network Architecture and IP Address Allocation of Wireless VPN for Power Grid," 2014 Enterprise Systems Conference, 2014, pp. 305-309.Google Scholar
- E. Zhu, G. Wu and G. Yang, "Network Security Protection Solutions of Electric Power Enterprise Based on VPN Technology,"2009 International Conference on Computational Intelligence and Security, 2009, pp. 402-405.Google Scholar
- G. ZHU, H. YUAN, Y. ZHUANG, Y. GUO, X. ZHANG and S. QIU, "Research on network intrusion detection method of power system based on random forest algorithm," 2021 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), 2021, pp. 374-379.Google Scholar
- L Zhang, J Zhang, Y Sang, B Wang and Z Hou, "Intrusion Detection Method based Random Forest and Artificial Immune",Computer engineering, vol. 46, no. 8, pp. 1000-3428, 2020.Google Scholar
- Z Xin and L Wan, "Integrated intrusion detection model based on artificial immunity",Computer Engineering and Design, vol. 40, no. 10, pp. 2799-2804, 2019.Google Scholar
- X Feng, M Ma, T Zhao and H Yu, "Intrusion Detection System Based on Hybrid Immune Algorithm",Computer Science, vol. 41, no. 12, pp. 43-47, 2014..Google Scholar
- X Chen and J Pang, "A Novelty Network Attack Detection Model based on Immunology",Proceedings of the 2019 2nd International Conference on Data Science and Information Technology, pp. 187-196, July, 2019.Google Scholar
- K Wang, L Ren, L Chen and S Ding, "Intrusion detection and security calculation in industrial cloud storage based on an improved dynamic immune algorithm",Information Sciences, pp. 543-557, 2019.Google ScholarDigital Library
- Serror, M.; Henze, M.; Hack, S.; Schuba, M.; Wehrle, K. Towards In-Network Security for Smart Homes. In Proceedings of the 2nd International Workshop on Security and Forensics of IoT (IoT-SECFOR), Hamburg, Germany, 27–30 August 2018.Google Scholar
- Rademacher, M.; Jonas, K.; Siebertz, F.; Rzyska, A.; Schlebusch, M.; Kessel, M. Software-Defined Wireless Mesh Networking: Current Status and Challenges.Comput. J.2017,60, 1520–1535.Google Scholar
- Dong, X.; Lin, H.; Tan, R.; Iyer, R.K.; Kalbarczyk, Z. Software-Defined Networking for Smart Grid Resilience: Opportunities and Challenges. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security (CPSS), Singapore, 14 April 2015.Google Scholar
- White, K.J.; Pezaros, D.P.; Johnson, C.W. Using Programmable Data Networks to Detect Critical Infrastructure Challenges. In Proceedings of the 9th International Conference on Critical Information Infrastructures Security (CRITIS), Limassol, Cyprus, 13–15 October 20.Google Scholar
Recommendations
The Security Threats and Corresponding Measures to Distributed Storage Systems
Advanced Parallel Processing TechnologiesAbstractThere are various threats in distributed storage systems, but there is no comprehensive category. There are some research works on threat modeling and the challenges of protecting storage systems, but there is no corresponding security measure to ...
An SDN perspective IoT-Fog security: A survey
AbstractThe utilization of the Internet of Things (IoT) has burst in recent years. Fog computing is a notion that solves cloud computing’s limitations by offering low latency to IoT network user applications. However, the significant number of ...
Power Attack: An Emerging Threat in Health-care Applications Using Medical Body Area Networks
ACM DEV '16: Proceedings of the 7th Annual Symposium on Computing for DevelopmentRecent rise in aged population and chronic diseases, is placing increasing pressure on health care expenditure. Ubiquitous health care is regarded as a potential driver in reducing such health expenditure. Advancement in wireless communication and ...
Comments