2021
DOI: 10.1088/1742-6596/1744/2/022115
|View full text |Cite
|
Sign up to set email alerts
|

Trusted Security Immune Model of Power Monitoring System

Abstract: Power monitoring system is an important national infrastructure; its security has a vital position. In recent years, malicious attacks against power information systems emerge in an endless stream, which makes power systems worldwide suffer a major blow. Aiming at the hierarchical structure of the power monitoring system and the security threats it faces, this paper proposes a security immune model based on trusted computing technology. The security analysis shows that the model can guarantee the credibility o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…An active defense security structure for ICSs based on TC 3.0 technology is proposed as shown in Figure 6. It broadens and universalizes the security immune model for the power monitoring system [42]. The structure consists of four parts: TC environment, trusted area boundary, trusted communication network, and trusted management center.…”
Section: Secure Framework For Industrial Control Systems Based On Tc 30mentioning
confidence: 99%
See 1 more Smart Citation
“…An active defense security structure for ICSs based on TC 3.0 technology is proposed as shown in Figure 6. It broadens and universalizes the security immune model for the power monitoring system [42]. The structure consists of four parts: TC environment, trusted area boundary, trusted communication network, and trusted management center.…”
Section: Secure Framework For Industrial Control Systems Based On Tc 30mentioning
confidence: 99%
“…They also evaluated the performance of the protection system through attack tests, system startup time tests, and operation cost tests. Wang et al designed the security immune model of a power monitoring system based on TC 3.0, which consists of a TC environment, trusted communication network, trusted area boundary, and trusted management center [42]. However, only the field control layer and process monitoring layer were considered, and no simulation experiment was carried out [61].…”
Section: Trusted Management Centermentioning
confidence: 99%
“…However, the massive number of users and insane volume of interactive data bring safety problems to user behaviors. To solve the problems, it is necessary to overcome the complex safety hazards faced by health monitoring platforms [16][17][18][19][20].…”
Section: Introductionmentioning
confidence: 99%