Abstract
For the clear storage of database file in distribution automation system ,information transmitted in plaintext and weak identity authentication and other information security issues, we propose the project of combining the firewall based on active defense and the intrusion detection based on passive defense.Finally, we analysis the safety property of this scheme, the analysis shows that this scheme meets the security requirement of distribution automation system, forever ensure the security of the power distribution automation system mutual communication better.
This work is supported by Hebei higher education science research plan funding subject of research of information integration based on IEC61970 and the security techniques of smart grid. (Z2010290).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Yu, Y.-X., Luan, W.-P.: Smart grid and its implementations. Proceedings of the CSEE 29(34), 1–8 (2009)
Chen, S.-Y., Song, S.-F., Li, L.-X., et al.: Survey on smart grid technology. Power System Technology 33(8), 1–7 (2009)
Wei, M., Wang, Q., Wang, X.: Application of Intrusion Detection System to Electric Power System Information Network. The Journal of Wuhan University 39(2), 102–105 (2006)
Guo, Q.: Information Security Research of Distribution Automation System based on Elliptic Curve Cryptosystem. North China Electric Power University, Beijing (2009)
State Electricity Regulatory Commission.The Security Overall Scheme of Secondary Power System (2006)
Feng, Q.: Interaction Technology with Firewalls and Intrusion Detection System. Computer Application 25(12), 2763–2764 (2005)
Pan, G., Song, W.: Research on the Application of Message Oriented Middleware in Electric Dispatching Automatization System. Electrical Application 27(10), 61–64 (2008)
Wang, B.: Research on Key Techniques of Information Security in Electric Power Information System. North China Electric Power University, Hebei (2009)
Hu, J.-J., Wang, W., Pei, D.-L.: Double-way Authentication Scheme Based on ELGamal Digital Signature. Computer Engineering 36(6), 173–174 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, B., Yang, H., Zhang, S. (2012). Research on Application of Interaction Firewall with IDS in Distribution Automation System. In: Jin, D., Lin, S. (eds) Advances in Electronic Engineering, Communication and Management Vol.1. Lecture Notes in Electrical Engineering, vol 139. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27287-5_84
Download citation
DOI: https://doi.org/10.1007/978-3-642-27287-5_84
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27286-8
Online ISBN: 978-3-642-27287-5
eBook Packages: EngineeringEngineering (R0)