Paper
5 May 2022 Research on service security isolation method of intelligent distribution terminal
Hongmian Wang, Xiaolong Xiao, Keqi Zhu, Zhibin Yin
Author Affiliations +
Proceedings Volume 12245, International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2022); 1224506 (2022) https://doi.org/10.1117/12.2635846
Event: International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2022), 2022, Sanya, China
Abstract
With the wide application of information and internet technology in power system, distribution secondary system is facing more complex security threats while being more flexible, open and efficient. As a key information infrastructure, intelligent distribution terminal has become an object requiring key security protection; In addition, with the development of distribution Internet of things, the number of acquisition terminals is huge, the terminal access data presents the characteristics of high concurrency, and the pressure of terminal security access is increasing. This paper proposes a service security isolation method based on subcarrier isolation, which divides all subcarriers of broadband power line channel into several subcarrier sets and assigns them to different services. The services monopolize their own subcarrier sets, so as to achieve the purpose of safe isolation of communication channels.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Hongmian Wang, Xiaolong Xiao, Keqi Zhu, and Zhibin Yin "Research on service security isolation method of intelligent distribution terminal", Proc. SPIE 12245, International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2022), 1224506 (5 May 2022); https://doi.org/10.1117/12.2635846
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Information security

Image processing

Network security

Control systems

Signal to noise ratio

Safety

Back to Top