Paper
31 October 2022 Research on information security testing technology of relay protection equipment
Long Jin, Yue Yu, RongRong Zhan, JiangWen Men, LongHao Liu
Author Affiliations +
Proceedings Volume 12457, Second International Conference on Testing Technology and Automation Engineering (TTAE 2022); 1245703 (2022) https://doi.org/10.1117/12.2660304
Event: Second International Conference on Testing Technology and Automation Engineering (TTAE 2022), 2022, Changchun, China
Abstract
The information security of relay protection equipment is related to the safe and reliable operation of power grid. With the diversification of network security attacks, the existing security protection means of relay protection equipment cannot meet the security protection requirements of the new generation of substations. By analyzing the information security risk points of relay protection equipment in substation, the security protection requirements of relay protection equipment such as identity authentication, security audit, access control, data security, communication security, security reinforcement are studied, and targeted test methods are proposed to guide the development and testing of the new generation of relay protection equipment in the substation. It has effectively improved the information security protection level of relay protection equipment.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Long Jin, Yue Yu, RongRong Zhan, JiangWen Men, and LongHao Liu "Research on information security testing technology of relay protection equipment", Proc. SPIE 12457, Second International Conference on Testing Technology and Automation Engineering (TTAE 2022), 1245703 (31 October 2022); https://doi.org/10.1117/12.2660304
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Relays

Information security

Testing and analysis

Data communications

Network security

Information technology

Security technologies

Back to Top