z-logo
open-access-imgOpen Access
Trusted Security Immune Model of Power Monitoring System
Author(s) -
Wenwei Tao,
Jinyu Wu,
Zhihong Liang,
Zeming Jiang
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1744/2/022115
Subject(s) - computer security , credibility , computer science , power (physics) , trusted computing , electric power system , political science , physics , quantum mechanics , law
Power monitoring system is an important national infrastructure; its security has a vital position. In recent years, malicious attacks against power information systems emerge in an endless stream, which makes power systems worldwide suffer a major blow. Aiming at the hierarchical structure of the power monitoring system and the security threats it faces, this paper proposes a security immune model based on trusted computing technology. The security analysis shows that the model can guarantee the credibility of the power monitoring system.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here