In the independent and controllable intelligent substation, the reliable operation of the automation equipment is the premise and guarantee of the stable operation of the substation. Independent and controllable automation equipment uses a large number of domestic chip products to replace imported chips. Compared with imported chips, application time of domestic chip products is short, the operation experience is very insufficient. This paper first analyzes the data that can be monitored by the independent and controllable chip and the characteristics of the corresponding data. Then, the algorithm characteristics of gray-scale prediction model GM (1,1) and its applicability and superiority in chip monitoring are analyzed, so as to construct the chip-level state monitoring system of the independent and controllable automation equipment combining gray-scale model and expert system. Finally, combined with the actual operation data of the equipment, the accuracy of the gray model prediction data and the practicability of the equipment monitoring system are verified. The results show that this method is effective in equipment state monitoring.
The cyber security event log method stipulated in the IEC 62351-14 standard defines and describes the cyber security events that might be encountered in the cyber security of the power system substation and gives an approach on how to map these cyber security events to the Syslog protocol for transmission and recording. Based on this theory, the cyber security process based on application-layer authentication has been deeply researched, cyber security events for application-layer authentication have been expanded and defined, the content of the standard has been improved, its application scope has been expanded, and its application scenarios have been enriched. Cyber security event log technology has been applied in actual substations, which has effectively improved the monitoring capability of cyber security conditions in power system substations, enhanced the level of analysis and diagnosis of cyber security failures, and made it more convenient to further promote the engineering of cyber security in substations.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.