吉林大学学报(工学版) ›› 2017, Vol. 47 ›› Issue (6): 1933-1938.doi: 10.13229/j.cnki.jdxbgxb201706035

• Orginal Article • Previous Articles     Next Articles

Novel universal security mechanism for energy internet based on trusted platform module

LUAN Wen-peng1, LIU Yong-lei2, WANG Peng3, JIN Zhi-gang2, WANG Jian2   

  1. 1.Institute of Power Distribution,China Electric Power Research Institute,Beijing 100192,China;
    2. School of Electronic Information Engineering,Tianjin University,Tianjin 300072,China;
    3. School of Electrical & Electronic Engineering,North China Electric Power University,Beijing 102206,China
  • Received:2016-07-01 Online:2017-11-20 Published:2017-11-20

Abstract: As the core infrastructure for the efficient and secure utilization of renewable energy sources, the energy internet is the important strategic resource and embodiment of the comprehensive national strength. The security of energy internet has attracted more serious attentions. In this work, first, the structure of internet was analyzed from logical and network topological structure aspects. Second, the existing research methods are classified into three classes, the security demand-driven method, security model-driven method and the system-theoretical method; and the existing researches are analyzed and compared using the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). Finally, to solve the problem of vulnerability of isolation and lack of integrated solution in existing security mechanism, a new security mechanism based on Trusted Platform Module (TPM) is proposed. The security model and consuming layer protocol are put forward and security analysis is carried out. The results show that the proposed security mechanism can satisfy the security requirements of the energy internet.

Key words: communication, energy internet, trust platform module(TPM), security mechanism, technique for order preference by similarity to ideal solution(TOPSIS), trustworthy computing

CLC Number: 

  • TM711
[1] Rifkin J. The Third Industrial Revolution: How Lateral Power is Transforming Energy, the Economy, and the Word[M]. New York:Palgrave Macmillan,2011.
[2] 董朝阳,赵俊华,文福拴,等. 从智能电网到能源互联网:基本概念与研究框架[J]. 电力系统自动化,2014,38(15):1-11.
Dong Zhao-yang,Zhao Jun-hua,Wen Fu-shuan,et al. From smart grid to energy internet: basic concept and research framework[J]. Automation of Electric Power Systems,2014,38(15):1-11.
[3] 王继业,孟坤,曹军威,等. 能源互联网信息技术研究综述[J]. 计算机研究与发展,2015,52(5):1109-1126.
Wang Ji-ye,Meng Kun,Cao Jun-wei,et al. Information technology for energy internet: a survey[J]. Journal of Computer Research and Development,2015,52(5):1109-1126.
[4] Bui N,Castellani A P,Casari P,et al. The internet of energy:a web-enabled smart grid system[J]. IEEE Network,2012,52(5):1109-1126.
[5] 杜君,李伟华. 面向多跳无线自组织网络的安全信任模型[J]. 吉林大学学报:工学版,2011, 41(5):1421-1425.
Du Jun,Li Wei-hua. Security trust model for multi-hop wireless ad hoc networks[J]. Journal of Jilin University(Engineering and Technology Edition),2011,41(5):1421-1425.
[6] 黄仁乐,蒲天骄,刘克文,等. 城市能源互联网功能体系及应用方案设计[J]. 电力系统自动化,2015,39(9):26-40.
Huang Ren-le,Pu Tian-jiao,Liu Ke-wen,et al.Design of hierarchy and functions of regional energy internet and its demonstration applications[J].Automation of Electric Power Systems,2015,39(9):26-40.
[7] 田世明,栾文鹏,张东霞,等. 能源互联网技术形态与关键技术[J]. 中国电机工程学报,2015,35(14):3482-3494.
Tian Shi-ming,Luan Wen-peng,Zhang Dong-xia,et al. Technical forms and key technologies on energy internet[J]. Proceedings of the CSEE,2015,35(14):3482-3494.
[8] 曹军威,孟坤,王继业,等. 能源互联网与能源路由器[J]. 中国科学:信息科学,2014,44(6):714-727.
Cao Jun-wei,Meng Kun,Wang Ji-ye,et al. An energy internet and energy routers[J]. Scientia Sinica Information,2014,44(6):714-727.
[9] 蔡巍,赵海,王进法,等. 能源互联网宏观结构的统一网络拓扑模型[J]. 中国电机工程学报,2015,35(14):3503-3510.
Cai Wei,Zhao Hai,Wang Jin-fa,et al. A unifying network topological model of the energy internet macro-scope structure[J]. Proceedings of the CSEE,2015,35(14):3503-3510.
[10] Komninos N,Philippou E,Pitsillides A,et al. Survey in smart grid and smart home security: issues, challenges and countermeasures[J]. IEEE Communica-tions Surveys & Tutorials,2014,16(4):1933-1954.
[11] Yan Y,Qian Y,Sharif H,et al. A survey on cyber security for smart grid communications[J]. IEEE Communications Surveys & Tutorials,2012,14(4):998-1010.
[12] Mo Y L,Kim T H J,Brancik K,et al. Cyber-physical security of a smart grid infrastructure[J]. Proceedings of the IEEE,2012,100(1):195-209.
[13] Wang Wen-ye,Lu Zhuo. Cyber security in the smart grid: survey and challenges[J]. Computer Networks,2013,57(5):1344-1371.
[14] Sridhar S,Hahn A,Govindarasu M,et al. Cyber-physical system security for the electric power grid[J]. Proceedings of the IEEE,2012,100(1):210-224.
[15] Suleiman H,Alqassem I,Diabat A,et al. Integrated smart grid systems security threat model[J]. Information Systems,2015,53:147-160.
[16] Pasqualetti F,Dorfler F,Bullo F. Attack detection and identification in cyber-physical systems[J]. IEEE Transactions on Automatic Control,2013,58(11):2715-2729.
[17] Pasqualetti F,Zhu Q. Design and operation of secure cyber-physical systems[J]. IEEE Embedded Systems Letters,2015,7(1):3-6.
[18] Horowitz B M,Pierce K M. The integration of diversely redundant designs, dynamic system models, and state estimation technology to the cyber security of physical systems[J]. Systems Engineering,2013,16(4):401-412.
[19] Vollmer T,Manic M. Cyber-physical system security with deceptive virtual hosts for industrial control networks[J]. IEEE Transactions on Industrial Informatics,2014,10(2):1337-1347.
[20] Hu Cheng-feng,Fang Shu-cherng. Set covering-based topsis method for solving sup- T equation constrained multi-objective optimization problems[J]. Journal of Systems Science and Systems Engineering,2015,24(3):258-275.
[21] 张焕国,赵波. 可信计算[M]. 武汉:武汉大学出版社,2011.
[22] TCG. TPM main specification[EB/OL].http://www.trustedcomputinggroup.org/resources/tpm_main_specification,2015-10-31.
[1] CHEN Yong-heng,LIU Fang-hong,CAO Ning-bo. Analysis of conflict factors between pedestrians and channelized right turn vehicles at signalized intersections [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1669-1676.
[2] CHANG Shan,SONG Rui,HE Shi-wei,LI Hao-dong,YIN Wei-chuan. Recycling model of faulty bike sharing [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1677-1684.
[3] QU Da-yi,YANG Jing-ru,BING Qi-chun,WANG Wu-lin,ZHOU Jing-chun. Arterial traffic offset optimization based on queue characteristics at adjacent intersections [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1685-1693.
[4] ZHOU Yan-guo,ZHANG Hai-lin,CHEN Rui-rui,ZHOU Tao. Two-level game approach based resource allocation scheme in cooperative networks [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1879-1886.
[5] LIU Xiang-yu, YANG Qing-fang, KUI Hai-lin. Traffic guidance cell division based on random walk algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1380-1386.
[6] LIU Zhao-hui, WANG Chao, LYU Wen-hong, GUAN Xin. Identification of data characteristics of vehicle running status parameters by nonlinear dynamic analysis [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1405-1410.
[7] LUAN Xin, DENG Wei, CHENG Lin, CHEN Xin-yuan. Mixed Logit model for understanding travel mode choice behavior of megalopolitan residents [J]. 吉林大学学报(工学版), 2018, 48(4): 1029-1036.
[8] SUN Xiao-ying, HU Ze-zheng, YANG Jin-peng. Assessment method of electromagnetic pulse sensitivity of vehicle engine system based on hierarchical Bayesian networks [J]. 吉林大学学报(工学版), 2018, 48(4): 1254-1264.
[9] DONG Ying, CUI Meng-yao, WU Hao, WANG Yu-hou. Clustering wireless rechargeable sensor networks charging schedule based on energy prediction [J]. 吉林大学学报(工学版), 2018, 48(4): 1265-1273.
[10] MOU Zong-lei, SONG Ping, ZHAI Ya-yu, CHEN Xiao-xiao. High accuracy measurement method for synchronous triggering pulse transmission delay in distributed test system [J]. 吉林大学学报(工学版), 2018, 48(4): 1274-1281.
[11] DING Ning, CHANG Yu-chun, ZHAO Jian-bo, WANG Chao, YANG Xiao-tian. High-speed CMOS image sensor data acquisition system based on USB 3.0 [J]. 吉林大学学报(工学版), 2018, 48(4): 1298-1304.
[12] CHEN Yong-heng, LIU Xin-shan, XIONG Shuai, WANG Kun-wei, SHEN Yao, YANG Shao-hui. Variable speed limit control under snow and ice conditions for urban expressway in junction bottleneck area [J]. 吉林大学学报(工学版), 2018, 48(3): 677-687.
[13] WANG Zhan-zhong, LU Yue, LIU Xiao-feng, ZHAO Li-ying. Improved harmony search algorithm on truck scheduling for cross docking system [J]. 吉林大学学报(工学版), 2018, 48(3): 688-693.
[14] LI Zhi-hui, HU Yong-li, ZHAO Yong-hua, MA Jia-lei, LI Hai-tao, ZHONG Tao, YANG Shao-hui. Locating moving pedestrian from running vehicle [J]. 吉林大学学报(工学版), 2018, 48(3): 694-703.
[15] CHEN Song, LI Xian-sheng, REN Yuan-yuan. Adaptive signal control method for intersection with hook-turn buses [J]. 吉林大学学报(工学版), 2018, 48(2): 423-429.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!