首页 | 本学科首页   官方微博 | 高级检索  
     

电力物联网安全防护技术研究
引用本文:崔阿军,张华峰,范迪龙,赵明忠.电力物联网安全防护技术研究[J].电力信息化,2013,11(3):98-101.
作者姓名:崔阿军  张华峰  范迪龙  赵明忠
作者单位:1. 甘肃省电力公司电力科学研究院,甘肃兰州,730050
2. 甘肃省电力公司,甘肃兰州,730050
摘    要:信息通信技术的高速发展使得国家电网公司已经迈进了智能化、信息化、自动化发展时代,物联网作为在各个行业被广泛推广和使用的前沿技术,也成为推动电力企业前进的主力军,如何对电力物联网进行正确的安全防护成为当前急需解决的问题,文章阐述了电力物联网安全防护技术,针对电力物联网的独特之处,重点描述了电力物联网的概念,并对其面临的安全威胁进行了分析,然后从加密、认证技术和入侵检测与保护几个方面描述了适合电力物联网的防护手段。

关 键 词:电力  物联网  加密认证  入侵检测  安全防护

Research on Security Protection Technologies for Internet of Things for Power Corporation
CUI A-jun , ZHANG Hua-feng , FAN Di-long , ZHAO Ming-zhong.Research on Security Protection Technologies for Internet of Things for Power Corporation[J].Electric Power Information Technology,2013,11(3):98-101.
Authors:CUI A-jun  ZHANG Hua-feng  FAN Di-long  ZHAO Ming-zhong
Affiliation:1. Gansu Electric Power Research Institute, Lanzhou 730050, China; 2. Gansu Electric Power Corporation, Lanzhou 730050, China)
Abstract:With the rapid development of information and communication technologies, State Grid is stepping to an era of intelligence, informatization and automation. As a widely used advanced technology by various industries, Internet of Things has been a major force to propel the development of power enterprises. Thus, how to correctly protect power loTs has also been an urgent issue. This paper describes security protection technologies of internet of things, focuses on the concept of power loTs according to its characteristics, analyzes the security threats we faced and then discusses protection measures applicable to power loTs from aspects of encryption, authenticate and intrusion detection.
Keywords:power  internet of things  encryption and authenticate  intrusion detection  security
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号