LU504593B1 - Method for deploying longitudinal encryption and authentication device in electrical power system - Google Patents

Method for deploying longitudinal encryption and authentication device in electrical power system Download PDF

Info

Publication number
LU504593B1
LU504593B1 LU504593A LU504593A LU504593B1 LU 504593 B1 LU504593 B1 LU 504593B1 LU 504593 A LU504593 A LU 504593A LU 504593 A LU504593 A LU 504593A LU 504593 B1 LU504593 B1 LU 504593B1
Authority
LU
Luxembourg
Prior art keywords
authentication device
longitudinal encryption
encryption
longitudinal
deploying
Prior art date
Application number
LU504593A
Other languages
French (fr)
Inventor
Mingchun Liu
Jianlin Xi
Jianguo Xu
Zhengpu Shi
Xinyong Zhang
Xingyu Chen
Guizhong Wang
Liang Yan
Liang Ma
Xuehai Ji
Yan Tong
Zhenyong Yang
Lixing Wang
Xin Gao
Naihong Cao
Junhong Zhao
Hua Wu
Original Assignee
Huaneng Ningxia Energy Co Ltd
Yanchi Zhongying Chuangneng New Energy Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaneng Ningxia Energy Co Ltd, Yanchi Zhongying Chuangneng New Energy Co Ltd filed Critical Huaneng Ningxia Energy Co Ltd
Application granted granted Critical
Publication of LU504593B1 publication Critical patent/LU504593B1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The invention relates to a method for deploying longitudinal encryption and authentication device in electrical power system, and the method includes the following steps: removing a firewall and adjusting an original network; configuring a first longitudinal encryption and authentication device; accessing the first longitudinal encryption and authentication device between a remote terminal unit and a router; modifying and improving the strategy of the first longitudinal encryption and authentication device; accessing a second longitudinal encryption and authentication device between a power management unit and the router; and installing a third longitudinal encryption and authentication device in the plant. According to the invention, the longitudinal encryption and authentication device creates a virtual private network tunnel to transmit service data and encrypt, so as to ensure the relative security of the power grid.

Description

Method for deploying longitudinal encryption and authentication device in electrical power system
Technical field
The invention relates to the technical field of electrical power dispatching automation, in particular to a method for deploying longitudinal encryption and authentication device in electrical power system.
Background technology
Smart grid dispatching control system has a large number of data transmission service scenarios. With the technical progress and service development of power grid, the functions of smart grid dispatching control system are becoming increasingly powerful, and all kinds of applications show the characteristics of complexity and diversification in data communication, specifically, a large amount of data transmission, diverse data acquisition methods, high real-time data interaction, and high safety and reliability requirements for data communication.
In order to meet the needs of power grid development, it is urgent to study the data transmission technology of smart grid dispatching control system.
At present, the EMS system of power grid dispatching is protected by firewall; the longitudinal encryption gateway has the security filtering function of firewall, thus it can be used to replace the firewall.
In the electrical power system network, the local network of each level of power dispatching company is usually divided into four different areas based on the different types of data services, namely, control area, production area, production management area and management information area; the four areas are named from work area to V area in turn. The control area, production area and production management area have service exchange and transmission with each other, while the management information area basically has no service exchange with the other three areas. Based on this feature, the deployment of safety protection equipment and facilities in power secondary system is usually based on the principle of "layering and zoning, boundary strengthening" and the strategy of "horizontal isolation and longitudinal protection"; the deployment stipulates that the data communication between longitudinal I/II areas (i.e., control area and production area) should be protected by longitudinal encryption equipment, LU504593
Summary of the invention
In order to solve the problem of power grid dispatching safety protection, the invention provides a method for deploying longitudinal encryption and authentication device in electrical power system.
The invention provides a method for deploying longitudinal encryption and authentication device in electrical power system, and the longitudinal encryption and authentication device creates a virtual private network tunnel to transmit service data, so as to connect the upper-level and lower-level power dispatching centers; the method comprises the following steps:
S101, configuring a first longitudinal encryption and authentication device in the main station, so as to be used in a real-time exchange, and powering-on;
S102, accessing the first longitudinal encryption and authentication device between the real-time exchange and a real-time router, so that data pass through the first longitudinal encryption and authentication device;
S103, modifying and improving the strategy of the first longitudinal encryption and authentication device after the real-time data transmission service is recovered,
S104, accessing a second longitudinal encryption and authentication device between a non-real-time exchange and a non-real-time router;
S105, installing a third longitudinal encryption and authentication device in the plant.
Wherein, before the first longitudinal encryption and authentication device is powered on, the strategy is configured as full release; the network cable is disconnected during power-on.
Wherein, in S104, if the service operation is not recovered for a long time (30s), the network is disconnected, the real-time exchange is reconnected to the router, and then diagnosis is made.
Wherein, the full release rule in the strategy of the first longitudinal encryption and authentication device is deleted, and then the affected situation of the services is obtained and checked until all services are normal.
Wherein, the link strategy of the second longitudinal encryption and authentication device is configured with reference to the first longitudinal encryption and authentication device; in S105, before the second longitudinal encryption and authentication device is accessed, a heartbeat line is connected first, and then network cables corresponding to other network ports are connected 994595
After the second longitudinal encryption and authentication device is accessed, exchange between master device and standby device is conducted, the network cable of the first longitudinal encryption and authentication device is unplugged, and the second longitudinal encryption and authentication device operates as a master equipment to recover service operation.
Wherein, the real-time exchange is a remote terminal unit (RTU exchange); the non-real-time exchange is a phasor measurement unit (PMU exchange).
Wherein, in step 6, the third longitudinal encryption and authentication device is installed at the front end of the router in the plant.
Wherein, in step 6, the third longitudinal encryption and authentication device is installed at the back end of the router in the plant.
The invention has the beneficial effects that the longitudinal encryption and authentication device creates a virtual private network tunnel to transmit service data, so as to connect the upper-level and lower-level power dispatching centers. The power private network includes two major network systems: power dispatching data network and power data communication network.
Wherein, the power dispatching data network consists of routers, exchanges, longitudinal encryption and authentication devices and other equipment. The longitudinal encryption and authentication device is deployed in a single-link port of the exchange to encrypt all service data collected by the exchange, the encrypted data are forwarded to the interconnection port of the router, and then the router forwards the data to the power private network through the designated route, thus realizing the confidentiality and integrity protection of data transmission; besides, the longitudinal encryption device also realizes the conversion function of the application layer communication protocols (IEC-104, DL476-92, etc.) of power private network, so as to realize point-to-point selective protection. According to the requirements of private network management of power system, longitudinal encryption equipment must be deployed in the central station and all substations under its jurisdiction, and corresponding encryption tunnels should be established according to the dispatching relationship in this jurisdiction, so as to realize the encryption transmission of the whole communication link data; usually, each longitudinal encryption device is deployed as a mesh network. By deploying the longitudinal encryption and authentication devices, the application program in the smart grid dispatching. 504593 control system can realize horizontal cross-regional transmission, and support the data interaction between dispatching centers at all levels, thus meeting the requirements of the smart grid dispatching control system to share data in a wide area in multi-level dispatching control centers, and preventing hackers from invading and improving the security performance.
Description of attached drawings
Fig. 1 is a flowchart of a method for deploying longitudinal encryption and authentication device in electrical power system according to Example 1 of the invention;
Fig. 2 is a schematic diagram of a specific example of the deployment of longitudinal encryption and authentication device in electrical power system of the invention;
Fig. 3 is a schematic diagram of the deployment of the longitudinal encryption and authentication device in electrical power system according to Example 1 of the invention;
Fig. 4 is a schematic diagram of the deployment of the longitudinal encryption and authentication device in electrical power system according to Example 2 of the invention.
Specific embodiments
In the following description, numerous details are set forth to facilitate a thorough understanding of this specification. However, this specification can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotion without violating the connotation of this specification, so this specification is not limited by the specific examples disclosed below.
Terms used in one or more example (s) of this specification are for the purpose of describing specific examples only and is not intended to limit one or more example (s) of this specification. The singular forms "a" and "the" used in one or more example (s) of this specification and the appended claims are also intended to include the plural forms, unless the context clearly indicates other meaning. It should also be understood that the terms "and/or" used in one or more example (s) of this specification refer to and include any or all possible combinations of one or more associated listed item (s).
It should be understood that although the terms first, second, etc. may be used to describe various information in one or more example (s) of this specification, these information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other. For example, without departing from the scope of one or more 204593 example (s) of this specification, first can also be called second, and similarly, second can also be called first. Depending on the context, the word "if" as used herein can be interpreted as "in case that" or "when" or "in response to a determination". 5 In the electrical power system network, the local network of each level of power dispatching company is usually divided into four different areas based on the different types of data services, namely, control area, production area, production management area and management information area; the four areas are named from work area to V area in turn. The control area, production area and production management area have service exchange and transmission with each other, while the management information area basically has no service exchange with the other three areas. Based on this feature, the deployment of safety protection equipment and facilities in power secondary system is usually based on the principle of "layering and zoning, boundary strengthening" and the strategy of "horizontal isolation and longitudinal protection"; the deployment stipulates that the data communication between longitudinal I/II areas (i.e., control area and production area) should be protected by longitudinal encryption equipment.
Longitudinal encryption, as the name implies, generally means that the superior power dispatching center is connected with the subordinate power dispatching center, and then the longitudinal encryption and authentication device creates a vpn tunnel to transmit real-time and non-real-time service data; once the service data are encrypted (there are two commonly used algorithms at present, rsa and sm2), hackers cannot crack the message even if they get it, because the encryption and decryption public keys and the private keys at both ends of the tunnel are in one-to-one correspondence, thus ensuring the relative security of the power grid. Therefore, the actual physical object corresponding to longitudinal encryption is the longitudinal encryption and authentication device, and the longitudinal encryption and authentication device is generally used in power plants, photovoltaic power plants and wind farms.
In the description of the invention, a method for deploying longitudinal encryption and authentication device in electrical power system is provided. The power grid dispatching system is protected by firewall; the longitudinal encryption gateway has the security filtering function of firewall, thus the firewall shall be closed first before deployment and then replaced by the longitudinal encryption and authentication device. 0506593
Fig. 1 shows a flow chart of a method for deploying longitudinal encryption and authentication device in electrical power system according to examples of this specification, and the method includes: 101, configuring a first longitudinal encryption and authentication device in the main station, so as to be used in a real-time exchange, and powering-on; 102, accessing the first longitudinal encryption and authentication device between the real-time exchange and a real-time router, so that data pass through the first longitudinal encryption and authentication device; 103, modifying and improving the strategy of the first longitudinal encryption and authentication device after the real-time data transmission service is recovered; 104, accessing a second longitudinal encryption and authentication device between a non-real-time exchange and a non-real-time router; 105, installing a third longitudinal encryption and authentication device in the plant.
Specifically:
The first longitudinal encryption and authentication device needs to be configured offline, and the strategy should be set as full release first; the first longitudinal encryption and authentication device configured offline is powered on, with the network cable not connected at this time; the first longitudinal encryption and authentication device is accessed between the
RTU exchange and the real-time router, and the connection between the PMU exchange and the non-real-time router is disconnected, so as to ensure that the data pass through the first longitudinal encryption and authentication device.
The recovery situation of the network service (generally, the recovery time is 30s) is observed. If the network service is not recovered for a long time, the first longitudinal encryption and authentication device is disconnected from the network, the RTU exchange is reconnected to the router, and then diagnosis is made. If the network service is recovered, the operation of the service is observed for a period of time, and then the following steps are conducted after it is stable.
All the passed links are checked in the first longitudinal encryption and authentication device, and the strategy of the first longitudinal encryption and authentication device is modified and improved according to the link conditions; the full release rule in the strategy of the first 504593 longitudinal encryption and authentication device is deleted, the services are observed and then subjected to checking and debugging until all services are normal.
The configuration of the first longitudinal encryption and authentication device is imported into the second longitudinal encryption and authentication device; the second longitudinal encryption and authentication device is installed and powered on, then the heartbeat line is connected first, and then the network cables corresponding to other network ports are connected; the ethO port network cable of the first longitudinal encryption and authentication device is unplugged (connected back after 5s), at this time, the master equipment and standby equipment are exchanged, and Gigabit B will operate as the master equipment.
Exchange between master equipment and standby equipment may cause interruption of some services, so the recovery and operation of the services need to be observed after the exchange master equipment and standby equipment. If the services are not recovered for a long time after exchange (generally 30s), the second longitudinal encryption and authentication device is disconnected from the network, and then the reasons are checked; if the the services are recovered, more exchange operations are made to ensure absolute normality.
The invention will be described in detail with reference to the attached drawings:
Referring to Fig. 2, it is a schematic diagram of deployment of longitudinal encryption and authentication device in electrical power system in the main station (i.e., the superior power plant) of the invention.
In some specific examples of the invention, two communication gateways are first provided in the main station, and then an exchange is respectively accessed (one is a real-time exchange, and the other is a non-real-time exchange), and a longitudinal encryption and authentication device is deployed between the exchange and the router to replace the security protection function of the original firewall. The data signal is sent to the exchange through the communication gateway, and the signal of the exchange is encrypted by the longitudinal encryption and authentication device and transmitted to the power plant dispatching data network through the router.
Example 1:
Referring to Fig. 3, it is a schematic diagram of deployment of longitudinal encryption and authentication device in electrical power system in the plant (i.e., the subordinate power plant) 5 504593 the invention.
In some specific examples of the invention, data are sent from the power plant dispatching network, sent by the router to the longitudinal encryption and authentication device for decryption, and then output to the communication gateway in the plant through the exchange to finish receiving the information of superior power plant.
When there is no device in the network, the forwarding paths of receiving and sending messages are inconsistent because the exchange is enabled. In this case, if the standard packet filtering firewall is placed between the router and the exchange, all messages will be discarded, specifically, the request message and the response message sent by the communication gateway cannot reach the same firewall, so they will be discarded as illegal communication. Based on the principle of address borrowing, the longitudinal encryption and authentication device establishes a main tunnel with the remote node device to solve the above problems; the longitudinal encryption and authentication device can support multiple VLANs. Multi-service communication 1s ensured, with less devices used to be convenient for centralized management.
Example 2:
Referring to Fig. 4, it is a schematic diagram of another deployment of longitudinal encryption and authentication device in electrical power system in the plant (i.e., the subordinate power plant) of the invention.
In some specific examples of the invention, the network environment of the dispatching data network in the main station remains unchanged, as shown in Figure 2. However, in the dispatching data network in the plant, there is no router but only one exchange and two communication gateways, and the longitudinal encryption and authentication device in the plant is deployed between the exchange and the communication gateway. The layout method is flexible and can be applied to various complex environments.
It should be noted that for the sake of simple description, all the aforementioned method examples are expressed as a series of action combinations, but those skilled in the art should know that examples of this specification are not limited by the sequence of described actions, because some steps may be performed in other sequences or simultaneously according to examples of this specification. Besides, those skilled in the art should also know that the examples described in the specification are all preferred examples, and the actions and modules 204593 involved are not necessarily necessary for the examples in this specification.
In the above examples, the description of each example has its own emphasis. For the parts not detailed in one example, please refer to the relevant descriptions of other examples.
The preferred examples of this specification disclosed above are only used to help explain this specification. Alternative examples do not describe all the details in detail, and also do not limit the invention to the specific examples described. Obviously, many modifications and changes can be made according to the contents of the examples in this specification. These examples are selected and described in detail in this specification in order to better explain the principles and practical applications of the examples in this specification, so that those skilled in the art can better understand and make use of this specification. This specification 1s limited only by the claims and their full scope and equivalents.

Claims (10)

1. A method for deploying longitudinal encryption and authentication device in electrical power system comprises the following steps: controlling the robot to configure a first longitudinal encryption and authentication device in the main station, so as to be used in a real-time exchange; controlling the robot to access the first longitudinal encryption and authentication device between the real-time exchange and a real-time router, so that data pass through the first longitudinal encryption and authentication device; controlling the robot to modify and improve the strategy of the first longitudinal encryption and authentication device after the real-time data transmission service is recovered; controlling the robot to access a second longitudinal encryption and authentication device between a non-real-time exchange and a non-real-time router; controlling the robot to install a third longitudinal encryption and authentication device in the plant; wherein, the longitudinal encryption and authentication device creates a virtual private network tunnel to transmit service data, so as to connect the upper-level and lower-level power dispatching centers.
2. The method for deploying longitudinal encryption and authentication device in electrical power system according to claim 1, wherein the strategy of the first longitudinal encryption and authentication device is configured as release before powering-up.
3. The method for deploying longitudinal encryption and authentication devices in power system according to claim 1, wherein the link strategy of the second longitudinal encryption and authentication device is configured with reference to the first longitudinal encryption and authentication device.
4. The method for deploying longitudinal encryption and authentication device in electrical power system according to claim 1, wherein if the service operation is not recovered after a set time, the network is disconnected, the real-time exchange is reconnected to the router, and then diagnosis is made.
5. The method for deploying longitudinal encryption and authentication device in electrical power system according to claim 4, wherein the full release rule in the strategy of the first longitudinal encryption and authentication device is deleted, and then the affected situation of the 504593 services is obtained and checked until all services are normal.
6. The method for deploying longitudinal encryption and authentication device in electrical power system according to claim 1, wherein before the second longitudinal encryption and authentication device is accessed, a heartbeat line is connected, and network cables corresponding to other network ports are connected.
7. The method for deploying longitudinal encryption and authentication device in electrical power system according to claim 6, wherein after the second longitudinal encryption and authentication device is accessed, the network cable of the first longitudinal encryption and authentication device is unplugged, and the second longitudinal encryption and authentication device operates as a master equipment to recover service operation.
8. The method for deploying longitudinal encryption and authentication device in electrical power system according to claim 1, wherein the real-time exchange is a remote terminal unit; the non-real-time exchange is a phasor measurement unit.
9. The method for deploying longitudinal encryption and authentication device in electrical power system according to claim 1, wherein the third longitudinal encryption and authentication device is installed at the front end of the router in the plant.
10. The method for deploying longitudinal encryption and authentication device in electrical power system according to claim 1, wherein the third longitudinal encryption and authentication device is installed at the back end of the router in the plant.
LU504593A 2023-04-11 2023-06-27 Method for deploying longitudinal encryption and authentication device in electrical power system LU504593B1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310382600.8A CN116545654A (en) 2023-04-11 2023-04-11 Deployment method of longitudinal encryption authentication device in power system

Publications (1)

Publication Number Publication Date
LU504593B1 true LU504593B1 (en) 2024-01-09

Family

ID=87449705

Family Applications (1)

Application Number Title Priority Date Filing Date
LU504593A LU504593B1 (en) 2023-04-11 2023-06-27 Method for deploying longitudinal encryption and authentication device in electrical power system

Country Status (2)

Country Link
CN (1) CN116545654A (en)
LU (1) LU504593B1 (en)

Also Published As

Publication number Publication date
CN116545654A (en) 2023-08-04

Similar Documents

Publication Publication Date Title
Rehmani et al. Software defined networks-based smart grid communication: A comprehensive survey
Sauter et al. End-to-end communication architecture for smart grids
Sidhu et al. Modelling and simulation for performance evaluation of IEC61850-based substation communication systems
EP2557646B1 (en) Configuration of an IEC 61850 teleprotection IED for inter-substation communication
US11057269B2 (en) System and method for configuring IED process bus network switches from substation topology specification
Sidhu et al. Implementation issues with IEC 61850 based substation automation systems
CN103026664A (en) Determining vlan-ids for a switched-based communication network of a process control system
US9929993B2 (en) Method for transmitting messages in an energy automation network, energy automation component and substation
Zhou et al. Efficient application of GPRS and CDMA networks in SCADA system
CN102904759B (en) Reinforced EOC (Ethernet over Coax) terminal management system and method for broadcast television network
CN103812752A (en) Resource sharing method among virtual local area networks (vlans) in power communication network
CN102523171A (en) Network system based on double call centers
LU504593B1 (en) Method for deploying longitudinal encryption and authentication device in electrical power system
CN108566325A (en) Ciphering type ring exchanger system
Apostolov To GOOSE or not to GOOSE?-that is the question
CN104601371A (en) Substation communication method
Zhang et al. A security mechanism for software-defined networking based communications in vehicle-to-grid
Tan et al. Testing IEC 61850 based multi-vendor substation automation systems for interoperability
CN116455564A (en) Quantum encryption-based power distribution automation protection method and system
CN103888335A (en) Transformer station information network interconnection method
Cabral et al. SDN Advantages for Ethernet-Based Control
CN2884710Y (en) Exchanging distance net bridge appliance with virtual net function for providing multiple interfaces
CN217957094U (en) Remote centralized control network networking structure of cascade hydropower station
CN101436986A (en) Method for implementing communication route based on ELCP protocol
CN115361152A (en) Encryption system and encryption method for seamless access to existing network