2019
DOI: 10.1080/15325008.2019.1602686
|View full text |Cite
|
Sign up to set email alerts
|

Reliability and Component Importance Analysis of Substation Automation System in Multi-State Mode

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…The management service channel and business service channel between the secondary module of the main station and the real-time gateway machine (secondary) adopt the security mechanism based on the state secret SM2 authentication and certification to guarantee the security of the connection and data, and the certificate is used to interact in an offline way [10]. The MQTT load data of the management service channel is accompanied by a signature at the end of the data to guarantee the security of the data; the business service pipeline, after the establishment of the TCP (Transmission Control Protocol) connection, carries out the authentication of the channel first to guarantee the security of the connection and then carry out the business data interaction.…”
Section: Realization Pathmentioning
confidence: 99%
“…The management service channel and business service channel between the secondary module of the main station and the real-time gateway machine (secondary) adopt the security mechanism based on the state secret SM2 authentication and certification to guarantee the security of the connection and data, and the certificate is used to interact in an offline way [10]. The MQTT load data of the management service channel is accompanied by a signature at the end of the data to guarantee the security of the data; the business service pipeline, after the establishment of the TCP (Transmission Control Protocol) connection, carries out the authentication of the channel first to guarantee the security of the connection and then carry out the business data interaction.…”
Section: Realization Pathmentioning
confidence: 99%
“…While these new power terminals improve efficiency, they also bring new security risks. Some malicious or unauthorized terminals may access cloud resources beyond their authorized permissions in an illegal manner [2,3] . By adopting an attribute-based encryption (ABE) scheme, terminals can be filtered based on their attributes, and only terminals that meet the attribute requirements can decrypt the cloud resource (e.g., IP and port) and obtain the corresponding access permissions [4] .…”
Section: Introductionmentioning
confidence: 99%
“…Various measures of reliability index for such networks have been proposed by Forghani-elahabad and Kagan, 12 Zhou et al, 13 Lin and Chen, 14 Chen et al, 15 and Zhai et al 16 Paredes et al, 17 have presented a comprehensive review on classical methods of reliability evaluation. They introduced a counting based estimation method, K-RelNet, which gives probably approximately correct (PAC) guarantees for k-terminal reliability evaluation.…”
Section: Introductionmentioning
confidence: 99%