Research of a new security mechanism on energy internet

Jump To References Section

Authors

DOI:

https://doi.org/10.18311/ijprvd/2021/29371

Keywords:

Energy internet, trusted platform module, security mechanism, technique for order preference by similarity to ideal solution, trusted computing.

Abstract

The sustainable exploitation and utilization of new energy is the basis of future development of mankind. As the core infrastructure for the efficient and secure utilization of renewable energy sources, the energy internet is an important strategic resource and an embodiment of the comprehensive national strength. This paper presents a new security mechanism based on Trusted Platform Module (TPM). Fistly, the analysis of the structure of the energy internet is discribed from two aspects of logic structure and network topological structure. Sencondly the existing research methods of energy internet security are divided into three classes: security demand-driven method, security model-driven method and system-theoretic method. The vulnerability of isolated research and lack of integrated solution is found out. Then the new security mechanism is propossed and the security model along with the consuming layer protocol are put forward. Finally the security analysis is processed. The results show that the new security mechanism can satisfy the security requirements of energy internet.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Downloads

Published

2022-01-21

How to Cite

Yongmei, L., Ying, W., & Gen, L. (2022). Research of a new security mechanism on energy internet. Indian Journal of Power and River Valley Development, 71(7&8), 123–128. https://doi.org/10.18311/ijprvd/2021/29371
Received 2022-01-21
Accepted 2022-01-21
Published 2022-01-21

 

References

References

Rifkin J. (2011): The Third Industrial Revolution: How Lateral Power is Transforming Energy, the Economy, and the Word [M]. New York, Palgrave Macmillan.

Dong Zhaoyang, Zhao Junhua, Wen Fushuan, et al. Dong Zhaoyang, Zhao Junhua, Wen Fushuan, et al.(2014): From Smart Grid to Energy Internet: Basic Concept and Research Framework [J]. Automation of Electric Power Systems, 38(15), 1-11 (in Chinese) .

Wang Jiye, Meng Kun, Cao Junwei, et al.(2012): Information

Technology for Energy Internet: A Survey[J]. Journal of Computer Research and Development, 26(4), 39-45.

Cheng F, Xu M, Xu Z, et al. (2015) : Development of Energy Internet and Key Technology Analysis[J].

Shen Changxiang, Zhang Huanguo, Feng Dengguoÿet al. (2007): Overview of Cyber Security [J]. Science in China (Se-ries E: Information Sciences), 37(2), 129-150.

Huang Renle, Pu Tianjiao, Liu Kenwen, et al. (2015) : Design of Hierarchy and Functions of Regional Energy Internet and Its Demonstration Applications[J]. Automation of Electric Power Systems, 39(9), 26-40 (in

Chi-nese).

Tian ShimingÿLuan Wenpeng, Zhang Dongxia, et al.

(2015): Technical Forms and Key Technologies on Energy

Inter-net [J]. Proceedings of the CSEE 35(14), 3482-3494

(in Chinese).

Cai Wei, Zhao Hai, Wang Jinfaÿet al. (2015): A Unifying

Network Topological Model of the Energy Internet Macroscope

Structure[J]. Proceedings of the CSEE, 35(14), 3503- 3510 (in Chinese) .

Komninos N., Philippou E., Pitsillides A., et al. (2014) : Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures[J]. IEEE Communications Surveys & Tutorials, 16(4), 1933-1954.

Mo Yilin, Kim T.H.-J., Brancik K., et al. (2012): Cyber-Physical Security of A Smart Grid Infrastructure[J]. Proceedings of the IEEE, 100(1), 195-209.

Wang Wenye, Lu Zhuo. (2013): Cyber Security in The Smart Grid: Survey and Challenges[J]. Computer Networks, 57(5), 1344-1371.

Sridhar S., Hahn A., Govindarasu M., et al. (2012): Cyber-Physical System Security for The Electric Power Grid [J]. Proceedings of the IEEE, 100(1), 210-224.

Carlos M C, Martina J E, Price G, et al.(2013): An updated

threat model for security ceremonies[C]//Proceedings of the 28th Annual ACM Symposium on Applied Computing. ACM, 1836-1843.

Jie X, Hongjun B, Yun L. (2013): Research on Security Threat Assessment Method Based on The Attack Tree Model of The Internet of Things[J]. Journal of Convergence Information Technology, 8(3).

Cao Y, Li Y, Coleman S, et al. (2015) : Adaptive hidden

Markov model with anomaly states for price manipulation detection[J]. Neural Networks and Learning Systems, IEEE Transactions on, 26(2): 318-330.

Liang X, Xiao Y. (2013): Game theory for network security[J]. Communications Surveys & Tutorials, IEEE, 15(1): 472-486.

Pasqualetti F., Dorfler F., Bullo F. (2013): Attack Detection and Identification in Cyber-Physical Systems [J]. IEEE Transactions on Automatic Control, 58(11), 2715-2729.

Pasqualetti F., Zhu Qi. (2015) : Design and Operation of Secure Cyber-Physical Systems[J]. IEEE Embedded Systems Letters, 7(1), 3-6.

Horowitz B.M., Pierce K.M.. The Integration of Diversely Redundant Designs, Dynamic System Models, and State Estimation Technology to The Cyber Security of Physical Systems[J]. Systems Engineering, 2013, 16(4), 401-412.

Kamil S N S, Thomas N. Performance analysis of the Trusted Cloud Computing Platform[C]//31st UK Performance Engineering Workshop 17 September 2015. 2015: 33.

TCG. TPM Main Specification [EB/OL], http://www.trustedcomputinggroup.org/resources/tpm_main_specificationÿ2015-10-31.

Zhang Huanguo, Zhao Bo. Trusted Computing [M]. Wuhan, Wuhan University Press, 2011(in Chi-nese).

Vollmer T., Manic M. Cyber-Physical System Security with Deceptive Virtual Hosts for Industrial Control Net-works [J]. IEEE Transactions on Industrial Informatics, 2014, 10(2), 1337-1347.

Hu Chengfeng, Fang Shucherng. Set Covering-based Topsis Method for Solving Sup-T Equation Constrained Multi-objective Optimization Problems[J]. Journal of Systems Science and Systems Engineering, 2015, 24(3), 258-275.