Research on Communication Technology Security Strategies for Power Systems and Automation in the Information Age
DOI: 10.23977/cpcs.2024.080106 | Downloads: 7 | Views: 276
Author(s)
Yi Yao 1, Yi Liu 1
Affiliation(s)
1 Department of Information Science and Engineering, Hunan University of Humanities, Science and Technology, Loudi, 417000, China
Corresponding Author
Yi YaoABSTRACT
In today's rapid development of information technology, the scope of power system and its automatic communication technology is expanding day by day, and it is more and more closely related to human's daily life. With the development and improvement of power automation technology, the demand for power equipment is increasing. As one of the important infrastructures of the country, the power system can realize the automatic transmission of data through the use of computer network technology. This not only greatly improves the transmission speed of information, but also relieves the original heavy workload of maintenance personnel, which plays a pivotal role in the development of the power industry. However, due to the fact that the power automation system has encountered many new problems in practical applications, such as network loopholes and network attacks in the process of information transmission, the power grid is prone to errors and control instability in actual operation. How to ensure the security of communication technology in the power industry has become a concern for people in the power industry. Based on the above reasons, from the perspective of electric power automation technology, this paper discusses the information security problems in electric power automation technology, in order to provide useful reference for the information security work in electric power automation technology. The research results show that the security of the communication technology of the automated power system was only about 87% originally, but it can reach about 96% after the reform. This has also directly increased user satisfaction to 97% or more, and at the same time, the operational stability of the power system has also undergone a qualitative leap, an increase of nearly 15% compared to the original.
KEYWORDS
Power Systems, Automated System, Information Age, Power Communication TechnologyCITE THIS PAPER
Yi Yao, Yi Liu, Research on Communication Technology Security Strategies for Power Systems and Automation in the Information Age. Computing, Performance and Communication Systems (2024) Vol. 8: 39-49. DOI: http://dx.doi.org/10.23977/cpcs.2024.080106.
REFERENCES
[1] Liu H, Jingquan L I, Xiaoyan H U. Construction and Application Research on Power Communication Wireless Private Network Technology[J]. Hebei Electric Power, 2018, 79(11):29-33.
[2] Amini M, Orkun K. Optimal Operation of Interdependent Power Systems and Electrified Transportation Networks [J]. Energies, 2018, 11(1):196-201.
[3] Tian L, Xiang M. Abnormal power consumption analysis based on density-based spatial clustering of applications with noise in power systems [J]. Automation of Electric Power Systems, 2017, 41(5):64-70.
[4] Palensky P, Meer A, Lopez C D. Cosimulation of Intelligent Power Systems: Fundamentals, Software Architecture, Numerics, and Coupling[J]. IEEE Industrial Electronics Magazine, 2017, 11(1):34-50.
[5] Pl A, Zx A, Zc A. The Research on Communication Technology Matching of Power Terminal Communication Access Network[J]. Procedia Computer Science, 2019, 155(9):785-790.
[6] Ellaithy D M. Low-Power Low-Cost Direct Digital Frequency Synthesizer Using 90 nm CMOS Technology[J]. Journal of Circuits, Systems and Computers, 2022, 31(11)99-105.
[7] Jimada-Ojuolape B, Teh J. Impact of the Integration of Information and Communication Technology on Power System Reliability: A Review[J]. IEEE Access, 2020, 8(5):24600-24615.
[8] Aalamifar F, Lampe L. Optimized Data Acquisition Point Placement for an Advanced Metering Infrastructure Based on Power Line Communication Technology[J]. IEEE Access, 2018, 6(4):1-11.
[9] Arani A, Karami H, Gharehpetian G B. Review of Flywheel Energy Storage Systems structures and applications in power systems and microgrids[J]. Renewable and Sustainable Energy Reviews, 2017, 69(8):9-18.
[10] Wang Z, Chen B, Wang J. Networked Microgrids for Self-Healing Power Systems [J]. IEEE Transactions on Smart Grid, 2017, 7(1):310-319.
[11] Sulligoi G, Bosich D, Giadrossi G. Multiconverter Medium Voltage DC Power Systems on Ships: Constant-Power Loads Instability Solution Using Linearization via State Feedback Control[J]. IEEE Transactions on Smart Grid, 2017, 5(5):2543-2552.
[12] Li X, Zhang X, Wu L. Transmission Line Overload Risk Assessment for Power Systems With Wind and Load-Power Generation Correlation[J]. IEEE Transactions on Smart Grid, 2017, 6(3):1233-1242.
[13] Kargarian A, Mohammadi J, Guo J. Toward Distributed/Decentralized DC Optimal Power Flow Implementation in Future Electric Power Systems[J]. IEEE Transactions on Smart Grid, 2018, 9(4):2574-2594.
[14] Dickes R, Dumont O, Daccord R. Modelling of organic Rankine cycle power systems in off-design conditions: An experimentally-validated comparative study[J]. Energy, 2017, 123(15):710-727.
[15] Schiffer J, Hans C, Kral T. Modelling, analysis and experimental validation of clock drift effects in low-inertia power systems [J]. IEEE Transactions on Industrial Electronics, 2017, 64(7):5942-5951.
[16] Fang Z, Wang X, Liang C. Research and Analysis on the Integration of Power Communication Technology and Information System [J]. IOP Conference Series Materials Science and Engineering, 2019, 677(3):42-54.
[17] Doyle J M, Merovitch N, Wyeth R C. A simple automated system for appetitive conditioning of zebrafish in their home tanks [J]. Behavioural Brain Research Sreetestcontent1, 2017, 317(15):444-452.
[18]Strandberg P E, Afzal W, Ostrand T J. Automated System-Level Regression Test Prioritization in a Nutshell[J]. IEEE Software, 2017, 34(4):30-37.
[19] Jang I H, Ko K E, Cho K H. Automated System for Shoe-upper Pattern Recognition using Deep Neural Network[J]. Journal of Institute of Control Robotics & Systems, 2017, 23(9):705-710.
[20] Rangeley M. The future of money in the information age [J]. ORDO, 2018, 68(1):293-302.
[21] Martin H. The More You Know, the More You Can Grow: An Information Theoretic Approach to Growth in the Information Age [J]. Entropy, 2017, 19(2):82-90.
[22] Guan Z. Digital Rescue Protection of Representative Inheritors of Intangible Cultural Heritage in the Information Age [J]. Journal of Physics Conference Series, 2021, 1744(4):421-424.
Downloads: | 2433 |
---|---|
Visits: | 119904 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Journal of Artificial Intelligence Practice
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks