[1]陈亚东,张涛,曾荣,等.输电线路在线监测可信接入系统设计[J].计算机技术与发展,2013,(05):113-115.
 CHEN Ya-dong,ZHANG Tao,ZENG Rong,et al.Design of Trusted Access System for Transmission Line Monitoring[J].,2013,(05):113-115.
点击复制

输电线路在线监测可信接入系统设计()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2013年05期
页码:
113-115
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Design of Trusted Access System for Transmission Line Monitoring
文章编号:
1673-629X(2013)05-0113-03
作者:
陈亚东张涛曾荣费稼轩
中国电力科学研究院
Author(s):
CHEN Ya-dongZHANG TaoZENG RongFEI Jia-xuan
关键词:
可信计算可信接入可信终端
Keywords:
trusted computingtrusted accesstrusted terminal
文献标志码:
A
摘要:
输电线路状态在线监测系统是智能电网环境中对重要输电线路的状态进行实时监测、预警、分析形成标准化状态监测数据的业务系统.系统通过传感器收集输电线路及杆塔周围的温度、湿度等环境特征数据,由线路上部署的嵌入式输电线路状态监测代理(CMA)经移动专网将数据传送到业务系统,因此在数据传输过程中确保CMA自身安全,以及CMA在公用数据网络中安全接入业务系统,防止数据被窃取或篡改十分重要.文中以输电线路状态在线监测系统业务场景为基础,设计了基于国产可信芯片的输电监测可信接入系统,保证了输电线路状态监测代理安全可信地接入业务系统,经过实验验证,可信接入系统达到了电力系统安全技术要求,可以确保输电线路状态监测系统安全稳定运行
Abstract:
Transmission Line Monitoring (TLM) is a system for transmission line state conducting real-time monitoring,early warning, analysis to form standardization of condition monitoring data service in the environment of smart grid. The system collects temperature, humidity and other environmental characteristic data of power transmission lines and towers surrounding with sensors fixed on transmis-sion lines,the data is transmitted by line deployed embedded transmission line condition monitoring agent (CMA) via mobile network to power system. So in this data transfer process,it is of great importance to ensure CMA security,to make sure CMA to securely access service system with public data network,and to prevent data tampering. Based on the transmission line on-line condition monitoring sys-tem environment,design trusted access system with domestic trusted chip,trusted access system ensures the transmission line condition monitoring agent security credible access service system,after experimental verification,trusted access system can ensure the safety of data transmission in line state monitoring system stable operation

相似文献/References:

[1]李超 王红胜 陈军广 孙蕊.加强计算机终端信息安全的两种解决方案[J].计算机技术与发展,2009,(01):165.
 LI Chao,WANG Hong-sheng,CHEN Jun-guang,et al.Two Solutions to Strengthen Computer's Terminal Information Security[J].,2009,(05):165.
[2]陈建勋 侯方勇 李磊.可信计算研究[J].计算机技术与发展,2010,(09):1.
 CHEN Jian-xun,HOU Fang-yong,LI Lei.A Review of Trusted Computing[J].,2010,(05):1.
[3]张珂.新型可信计算平台体系结构研究[J].计算机技术与发展,2011,(07):153.
 ZHANG Ke.New Trusted Computing Platform Architecture[J].,2011,(05):153.
[4]禹蒲阳 康国胜.可信计算的研究与发展[J].计算机技术与发展,2011,(08):233.
 YU Pu-yang,KANG Guo-sheng.Research and Development of Trusted Computing[J].,2011,(05):233.
[5]费稼轩 张涛 林为民 陈亚东 曾荣.基于动态可信度量的敏感信息安全控制模型[J].计算机技术与发展,2012,(05):237.
 FEI Jia-xuan,ZHANG Tao,LIN Wei-min,et al.Secure Control Model of Sensitive Information Based on Dynamic Trust Measurement[J].,2012,(05):237.
[6]张丽娟,吴振强.一种可控可信匿名的物联网查询机制[J].计算机技术与发展,2013,(06):122.
 ZHANG Li-juan,WU Zhen-qiang.A Controllable Trusted and Anonymous Query Mechanism of Internet of Things[J].,2013,(05):122.
[7]张弢,任帅,张德刚[].基于可信计算的Ad Hoc网络直接匿名证明[J].计算机技术与发展,2014,24(04):147.
 ZHANG Tao[],REN Shuai[],ZHANG De-gang[].Direct Anonymous Attestation to Ad Hoc Networks Based on Trusted Computing[J].,2014,24(05):147.
[8]周毅[],贾佳[],廖军[],等. 基于进化理论的可信计算环境实现[J].计算机技术与发展,2014,24(07):99.
 ZHOU Yi[],JIA Jia[],LIAO Jun[],et al. Implementation of Trusted Computing Environment Based on Evolutionary Theory[J].,2014,24(05):99.
[9]赵斌[],杨明华[],柳伟[],等. 基于龙芯处理器的自主可信计算机研究[J].计算机技术与发展,2015,25(03):126.
 ZHAO Bin[],YANG Ming-hua[],LIU Wei[],et al. Research on Security & Trust Computer Based on Loongson CPU[J].,2015,25(05):126.
[10]易平,庄毅.基于龙芯处理器的嵌入式可信解决方案[J].计算机技术与发展,2018,28(05):112.[doi:10.3969/ j. issn.1673-629X.2018.05.026]
 YI Ping,ZHUANG Yi.Design and Implementation of Embedded Trusted Platform Based on LOONGSON Processor[J].,2018,28(05):112.[doi:10.3969/ j. issn.1673-629X.2018.05.026]

更新日期/Last Update: 1900-01-01