基于时空模型的电力市场交易信息安全策略

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

上海交通大学硕士学位论文基于时-空模型的电力市场交易信息安全策略姓名:孙涵彦申请学位级别:硕士专业:电气工程指导教师:刘东;陶卫国20060901-(Availability)(Integrity)(Confidentiality)(Non-repudiation)--InformationSecurityStrategyofTradeinElectricityMarketBasedonTime-SpaceCharacteristicsModelABSTRACTWiththedevelopmentofChina'spowercorporation,therearegreatadvanceofourpowermarket,therelationshipbetweenelectricitytradesystemandnationaleconomyandourlifearemorecloserthanbefore,theelectricitytrade'sproblemhavedirectlyinfluenceonoureconomyandourlife.Tomakeareliablepowersystemdependslargelyonthesecurityofdataandinformationnetworkofpowercorporation.Anysecureproblemofthedataandinformationnetworkwilldirectlyinfluencethepowersupplyandpeople'sliving,sotheresearchontheinformationsecurityoftradesysteminpowermarketisofmeaningful.Atfirst,studyinginformationflowsfrommacrotomicroaspectsinpowersystem&trademarket,powermarkettradesystems&informationinterfaces,aswellasinteriorelectricitytrade.Then,pointingoutthehiddentroublesinallsectionsofinformationflows.Afterthat,thesisanalyzedthedifferentinformationcharacteristicsintimefieldandspacefield.Fortheavailability,integrity,confidentialityandnon-repudiationintheprocessofelectricitytrade,theinformationsecuritymodelofelectricitytradebasedoninformationtime-spacecharacteristicsisproposed.Combinedwiththismodelanalyzedthesecurityrequestsofmulti-levelsandsuccessioninelectricitytrade.Basedonitandcombinedwiththedivisionofsafetydistrictsinsecondarysystemssecurityprotection,discussedindetailtheinformationsecurityprotectionstrategiesofpowertradeinelectricitymarketcircumstance.Inthefinalpartofthisthesis,bythehelpofinformationtime-spacesecuritymodelandsecuritystrategiesinelectricitytrade,combinedwithauthor’sengineeringexperienceinthisfield,discussedtheengineeringapplicationofinformationsecuritystrategiesinErtanHydropowerDevelopmentCompanyLtd.Informationsecurityissuesdiscussedinthisthesisaswellastightlyconcerningtorealengineeringapplications,arealsoavailableineveryaspectofdatanetwork.Thesolutioncanbeusedinmanysimilarsystems.KeyWords:InformationSecurityModel,InformationFlow,ElectricityTrade,SecurityStrategies,ErtanCompany200612122006121220061212-1-11F.C.Schweppe197980199812[1][3]SPDnetSPDnet-2-ABCD/MIS200010137900MW2001101140-3-13131[2][5](HashPKI)()1976:RSA;ElGamalRSA768RSA1024512IEEEP1363,RSAHashHashSHA-1Hash:ShamirFiatSchnorrOkamotGuillou-QuisquaterFeige-Fiat-Shamir-4-PKIPKIPKI.PKIVerySignPKIPKIPKI().::Bell;132133(VPN)[4]VPN:.(VPN)IPSec-5-VPNVPNVPNVPNVPNVPN134IDS()(IDS)IDSIDSIDS14abcd-6-15-7-21SPDnetSPInet,,,()(),,():()()(),(ATM),,22[9][10][16]-8-ABC2-1[11]2-1Fig2-1Powermarketandpowersystem23[13][17][24]EMSEnergyManagementSystemTMSTradeManagementSystemFTS:ForwardTradeSystemDay-aheadTradeSystemReal-timeTradeSystem-9-TMRTeleMeterReadingSystemSBSSettlement&BillingSystemBPSBiddingProcessSystemMAFMarketAnalysis&ForecastSystemSISSame-timeInformationSystem[12]EMSSCADAAGCTMSTMRSBSEMSBPSMAFSISSCADAI1I2I6I9I10I11I12I8I11I2I3I5I6I7I9I10/-10-(322)2-2[31]2-2Fig2-2Electricitytradesystemandexteriorinterfaces24[26][27[28]24-11-2-32-3Fig2-3Interiorinformationflowsofelectricitytrade25-12--31[7][8]196710(DOD):::;:;:70.1972(ReferenceMonitor,RM)(Subject)(:)(:)()(ReferenceValidationMechanism,RVM):1)RVM;2)RVM;3)RVMRVMTCBTCBRVM-13-RVMTCBAndersonBellLaPadulaBellLapadula()Bell-Lapadula():1)Simple-Security-Property:(no-read-up)2)*-Property:(no-write-down)3)Discretionary-Property:(subject)(object)()()BLP(trusteduser)BLPBLPBiba1977BLPno-read-downno-write-up.BibaBLP:Lampson(71)Clark-Wilson(87)(McLean)PPDR-14-(P)(P),(D)(R)PPDR:PtDtRtEt=Dt,+Rt,(Pt=0)DtRtR,;Pt=0DtRtDtRt32-321-15-322:InternetIntranetInternet::ISO/OSIISO::(LAN)(WAN)(INTERNETWORK)(Ethernet)(TokenRing),FDDI(OS)-16-3221::()()2.1D()D1D2D3D1D11,D12,D17(:)3-1DNET-17-3-1Fig3-1SafedomainDXDXD()DXDNET32223-23-2Fig3-2Systemverticalstructure-18-NN+1NN+1N+1N+1N3223322.4[21][22]TCP/IPISO/OSI3-33-3Fig3-3Spaceinformationsecuritymodel-19-1)2)3)323BCDEFAG3-43-4Fig3-4Timeinformationsecuritymodel:12)3)4)-20-567[23]-21-324(Availability)(Integrity)(Confidentiality)(Non-repudiation)3-53-5Fig3-5Securitydemandsmodel325-3-6(Availability)(Integrity)(Confidentiality)(Non-repudiation)3-6-22-3-6Fig3-6Informationsecuritymodelinelectricitytrade33--23-44-1[20][25]4-1Fig4-1Informationsecurityarchitectureinelectricitytradesystem4.1-24-4.1.11998:,,,,,,,,,,,,,,,,-25-(),,,,,,,,,4.1.2[14][29],,:A,Web,(LotusNotes,Exchange),TCP/IPTCP/IP,,TCP/IP,,(155Mbit/s),-26-,,,,,B,SDH/PDH,TCP/IP6000RTU,DECnet,IP/X.25(),,,TCP/IP,(N2Mbit/s),,,,,C3:,,,2Mbit/sN2Mbit/s,,,,,64kbit/s,,2:,H.320,MCUMCU2Mbit/sN64kbit/s;,64kbit/s384kbit/sPDH/SDH,ATM,ATMQoSCBRIP,,IP,,-27-D,,;,,;,:,,,,,4-1[30]SCADANx2Mbit/s(SensitivebutUnclassified)L1Nx2Mbit/s(SensitivebutUnclassified)L2Nx64kbit/s(Secret)L1AGCNx64kbit/s(SensitivebutUnclassified)L1Nx64kbit/s(Confidential)L2Nx64kbit/s(SensitivebutL2-28-Unclassified)Nx64kbit/s(SensitivebutUnclassified)L3Nx64kbit/s(Confidential)L3N/A(Public)L464kbit/s-154Mbit/s(Confidential)L4Nx64kbit/s(Confidential)L1Nx64kbit/s(Confidential)L32Mbit/s-Nx2Mbit/s(SensitivebutUnclass

1 / 74
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功