华电技术 ›› 2020, Vol. 42 ›› Issue (8): 61-67.

• 电力数据安全 • 上一篇    下一篇

基于可信计算和区块链的配电物联网内生安全研究

  

  1. 1. 国网冀北电力有限公司电力科学研究院,北京 100045;2. 北京市能源电力信息安全工程技术研究中心
    (华北电力大学),北京 102206
  • 出版日期:2020-08-25 发布日期:2020-09-01

Research on endogenous security of distribution Internet of Things based on trusted computing and blockchain technology

  1. 1.State Grid Jibei Electric Power Research Institute,Beijing 100045,China;2.Beijing Engineering Research Center
    of Energy Electric Power Information Security(North China Electric Power University),Beijing 102206,China
  • Online:2020-08-25 Published:2020-09-01

摘要: 随着配电网规模不断扩大、网架结构日益复杂、远程视频监控和双向实时交互等新型业务的大幅增加,亟
须结合配电物联网的实际运行场景、不同的业务类型、不同的安全需求和不同的动态接入特性来研究配电网物联
网动态安全防护体系。可信计算与区块链作为信息安全防护方面的新兴技术,能够保障配电物联网中安全可信的
运行环境与管理机制。在设计“云-边-端”架构的配电物联网主站端和边缘端的分级可信免疫管控策略的基础上,
搭建了基于区块链的配电物联网分布决策和协同自治模型,并建立了配电物联网的“可管可控、精准防护、可视可
信、智能防御”安全防护模型,全面提升了配电网的信息安全防御水平。

关键词: 区块链, 可信计算, 配电物联网, 内生安全, 分布决策, 协同自治, “云-边-端”架构, 安全防护模型

Abstract: With the continuous expansion of the distribution network,complex grid structure,perceptible mounting of new
services such as remote video monitoring and two-way real-time interaction ,it is urgent to combine the actual operation
scenarios of the distribution Internet of Things(IoT),different services,different security needs with different dynamic
access characteristics in studying the dynamic security protection system of the distribution IoT. As an emerging technology
in information security protection,trusted computing and blockchain can provide a secured and credible operating
environment and management mechanism for power distribution IoT. Therefore,based on a hierarchical credibility immune
management and control strategy for the master station and the terminals of the distribution IoT with a "cloud-edge-user"
architecture,a distributed decision-making and collaborative autonomy model for the distribution IoT taking blockchain
technology is established,and a "manageable,controllable,precisely protected,visual,trusted and intelligent " security
protection model for the distribution IoT is made. The model can comprehensively improve the information security defense
level of distribution network.

Key words: blockchain, trusted computing, distribution Internet of Things, endogenous security, distributed decision
making,
collaborative autonomy, "cloud-edge-user" architecture, security protection model