The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which ...The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which protected data and facilities from being attacked by outside users by means of firewall, security monitor and control system. Firewall was basically the first line of defense for the intranet; the security monitoring system was a kind of IDS (Intrusion Detection System), while security control system provided authentication, authorization,data-encrypted transmission and security management. This architecture provides various security services, such as identification, authentication, authorization, data integrity and confidentiality.展开更多
The smart grid is the next generation of power and distribution systems. The integration of advanced network, communications, and computing techniques allows for the enhancement of efficiency and reliability. The smar...The smart grid is the next generation of power and distribution systems. The integration of advanced network, communications, and computing techniques allows for the enhancement of efficiency and reliability. The smart grid interconnects the flow of information via the power line, intelligent metering, renewable and distributed energy systems, and a monitoring and controlling infrastructure. For all the advantages that these components come with, they remain at risk to a spectrum of physical and digital attacks. This paper will focus on digital vulnerabilities within the smart grid and how they may be exploited to form full fledged attacks on the system. A number of countermeasures and solutions from the literature will also be reported, to give an overview of the options for dealing with such problems. This paper serves as a triggering point for future research into smart grid cyber security.展开更多
Energy issue is of strategic importance influencing China’s overall economic and social development that needs systematic planning and far-sighted deliberation.At the present time the revolution of energy technology ...Energy issue is of strategic importance influencing China’s overall economic and social development that needs systematic planning and far-sighted deliberation.At the present time the revolution of energy technology is advancing rapidly.The global innovation of energy technology has entered a highly dynamic period featured by multi-point breakthroughs,展开更多
Dramatic climate change, caused by over consumption of coal, oil and other traditional energy sources, as well as exhaustion of their reserves, imposed technological need to look for their substitution with new, renew...Dramatic climate change, caused by over consumption of coal, oil and other traditional energy sources, as well as exhaustion of their reserves, imposed technological need to look for their substitution with new, renewable energy sources. The exploitation of these new forms of energy, solar, wind, earth and bio-fuels, initiated the development and application of new technologies, so far unused in practice. Rapid development and wide application of installations for use of renewable energy in many households and companies opened a whole new risk and danger in the fire protection field. With the purpose of introducing this problem to engineers in the area of fire protection, health and safety at work, this paper systematically presents various types of facilities for exploitation of renewable energy sources as well as potential dangers, risks and issues related to their safe operation.展开更多
The security properties of quantum key distribution(QKD) system are analyzed with the practical light source using decoy state method. The secure key rate with the change of transmission distance is computed under the...The security properties of quantum key distribution(QKD) system are analyzed with the practical light source using decoy state method. The secure key rate with the change of transmission distance is computed under the condition of ideal system, infinite light source system, untrusted light source and passive system. The influence of the fluctuation of transmission rate on the security characteristics of the system is discussed. Our numerical simulation results offer a useful reference for the practical QKD experiment.展开更多
文摘The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which protected data and facilities from being attacked by outside users by means of firewall, security monitor and control system. Firewall was basically the first line of defense for the intranet; the security monitoring system was a kind of IDS (Intrusion Detection System), while security control system provided authentication, authorization,data-encrypted transmission and security management. This architecture provides various security services, such as identification, authentication, authorization, data integrity and confidentiality.
文摘The smart grid is the next generation of power and distribution systems. The integration of advanced network, communications, and computing techniques allows for the enhancement of efficiency and reliability. The smart grid interconnects the flow of information via the power line, intelligent metering, renewable and distributed energy systems, and a monitoring and controlling infrastructure. For all the advantages that these components come with, they remain at risk to a spectrum of physical and digital attacks. This paper will focus on digital vulnerabilities within the smart grid and how they may be exploited to form full fledged attacks on the system. A number of countermeasures and solutions from the literature will also be reported, to give an overview of the options for dealing with such problems. This paper serves as a triggering point for future research into smart grid cyber security.
文摘Energy issue is of strategic importance influencing China’s overall economic and social development that needs systematic planning and far-sighted deliberation.At the present time the revolution of energy technology is advancing rapidly.The global innovation of energy technology has entered a highly dynamic period featured by multi-point breakthroughs,
文摘Dramatic climate change, caused by over consumption of coal, oil and other traditional energy sources, as well as exhaustion of their reserves, imposed technological need to look for their substitution with new, renewable energy sources. The exploitation of these new forms of energy, solar, wind, earth and bio-fuels, initiated the development and application of new technologies, so far unused in practice. Rapid development and wide application of installations for use of renewable energy in many households and companies opened a whole new risk and danger in the fire protection field. With the purpose of introducing this problem to engineers in the area of fire protection, health and safety at work, this paper systematically presents various types of facilities for exploitation of renewable energy sources as well as potential dangers, risks and issues related to their safe operation.
基金Supported by the National Natural Science Foundation of China under Grant No.61571060Ministry of Science and Technology of China under Grant No.2016YFA0301300
文摘The security properties of quantum key distribution(QKD) system are analyzed with the practical light source using decoy state method. The secure key rate with the change of transmission distance is computed under the condition of ideal system, infinite light source system, untrusted light source and passive system. The influence of the fluctuation of transmission rate on the security characteristics of the system is discussed. Our numerical simulation results offer a useful reference for the practical QKD experiment.