安春燕, 陆阳, 翟迪, 朱雪琼. 电力智能传感器及传感网安全防护技术[J]. 中国电力, 2023, 56(11): 67-76. DOI: 10.11930/j.issn.1004-9649.202305083
引用本文: 安春燕, 陆阳, 翟迪, 朱雪琼. 电力智能传感器及传感网安全防护技术[J]. 中国电力, 2023, 56(11): 67-76. DOI: 10.11930/j.issn.1004-9649.202305083
AN Chunyan, LU Yang, ZHAI Di, ZHU Xueqiong. Security Protection of Electrical Intelligent Sensors and Sensor Networks[J]. Electric Power, 2023, 56(11): 67-76. DOI: 10.11930/j.issn.1004-9649.202305083
Citation: AN Chunyan, LU Yang, ZHAI Di, ZHU Xueqiong. Security Protection of Electrical Intelligent Sensors and Sensor Networks[J]. Electric Power, 2023, 56(11): 67-76. DOI: 10.11930/j.issn.1004-9649.202305083

电力智能传感器及传感网安全防护技术

Security Protection of Electrical Intelligent Sensors and Sensor Networks

  • 摘要: 电力智能传感器及传感网安全研究处于起步阶段,资源受限及应用现场缺乏低压供电导致对安全开销极其敏感,用户侧广泛部署更易遭受侧信道等物理攻击,利用感知机理或数据处理算法发起的新型攻击日渐增多。针对上述问题,结合现场特点、业务特征、设备能力及行业现状,分析电力智能传感器及传感网安全需求,构建安全技术体系,归纳总结电力智能传感器具备特殊需求的感知安全、存储安全、轻量级加密、身份认证、代码安全和固件安全等技术研究现状,提出发展建议,为构建安全、可靠的能源电力数据基座提供支撑。

     

    Abstract: Security of electrical intelligent sensors and sensor networks is still in the initial research stage, and resource constraints and lack of low-voltage power supply in most application sites make electrical intelligent sensors extremely sensitive to security costs. The widespread user-side deployment makes them more susceptible to physical attacks such as side channel attacks. Besides, new types of security attacks which utilize sensing mechanisms or data processing algorithms are also increasing. Firstly, we analyzed the security requirements of electrical intelligent sensors and networks based on site conditions, service characteristics, equipment capabilities, and industry status quo. And then we established a security technology framework, and reviewed the state-of-the-art research on the security technologies which the electrical intelligent sensors have special needs on, such as sensing security, storage security, lightweight encryption, identity authentication, code and firmware security. Finally, we proposed some development suggestions on the security technologies, which can be used to support the construction of the safe and reliable power database.

     

/

返回文章
返回