doi: 10.17586/2226-1494-2023-23-6-1233-1241


Methods of contactless registration of information signals for the audit of information security of power supply systems and networks

A. Y. Grishentsev, S. A. Arustamov, N. S. Karmanovskiy, V. A. Goroshkov, R. I. Chernov


Read the full article  ';
Article in Russian

For citation:
Grishentsev A.Yu., Arustamov S.A., Karmanovskiy N.S., Goroshkov V.A., Chernov R.I. Methods of contactless registration of information signals for the audit of information security of power supply systems and networks. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2023, vol. 23, no. 6, pp. 1233–1241 (in Russian). doi: 10.17586/2226-1494-2023-23-6-1233-1241


Abstract
It is known that there is an information signal in power supply systems and networks. The presence of information signals in the power elements of power supply systems and networks (electrical signal) in combination with other information allows extracting secondary information from power supply systems and networks. In some cases, this kind of information is confidential, has a high level of significance, and power supply facilities may belong to critical information infrastructure facilities. Thus, auditing and ensuring information security of power supply systems and networks seem relevant. In this regard, the issues of identifying previously unaccounted for channels of possible leakage of confidential information, developing methods for contactless monitoring of information security of generation, transportation, transformation and electricity consumption facilities are important. A contactless method for recording and calculating spurious emissions in established operating modes and during transients in long lines is proposed by solving the inverse problem of calculating the currents of multi-wire long lines based on measuring their magnetic field, taking into account the principle of superposition. To implement the method in application to a Q-wire line, simultaneous measurement of the magnetic field at Q different points with known coordinates is required. It also requires knowledge of the coordinates of the wires with the length of the line. Geometric measurements are proposed to be implemented using laser rangefinders or scanners. When measuring the magnetic field of a long line, the quasi-constant component of the Earth’s magnetic field is taken into account. A method is proposed for determining the direction and delay of reflection of traveling waves in a long line, based on information from two magnetic field sensors located at a sufficient distance from each other along the line. Methods are proposed to ensure the audit and monitoring of the state of power supply systems and networks that are under the influence of threats to information security violations. Mathematical modeling of the proposed method of contactless current measurement in a long line and field experiments of current measurement in a long line and registration of traveling waves are performed. The experimental results show the accuracy of the proposed methods sufficient to solve the tasks. The work develops an idea of methods and means of ensuring audit and monitoring of information security of electrical systems and networks. The results of the work make it possible to identify new, previously unaccounted for channels of information leakage and to develop new contactless methods for registering information signals in power transmission lines.

Keywords: information security, electrical systems and networks, information security audit

References
  1. Korovkin N.V., Gritsutenko S.S. Introduction of the low-entropy signal concept. Elektrichestvo, 2020, no. 10, pp. 33–43.(in Russian). https://doi.org/10.24160/0013-5380-2020-10-33-43
  2. KorovkinN.V., GritsutenkoS.S.About applicability of the fast fourier transform for a harmonic analisys of non sinusoidal currents and voltages. Izvestija Rossijskoj akademii nauk. Jenergetika, 2017, no. 2, pp. 73–86.(in Russian)
  3. Gaunt C.T. Reducing uncertainty – responses for electricity utilities to severe solar storms. Journal of Space Weather and Space Climate, 2014, vol. 4,pp. A01. https://doi.org/10.1051/swsc/2013058
  4. Idelchik V.I. Electrical Systems and Networks. Moscow, Jenergoatomizdat Publ., 1989, 594 p. (in Russian)
  5. Burlov V., Mankov V., Polyukhovich M. Theoretical aspects of synthesis of the electric power networks safety management model using GIS. Regional informatics (RI-2020). ХVII St. Petersburg Internatonal Conference. Proceedings of the Conference. Part2. 2020, pp. 229–230. (in Russian)
  6. Rushechnikov I.I., Ianovskii A.V., Tretiakov I.A. Software and hardware for studying electromagnetic radiation generated by computing equipment in household electric network. Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics, 2023, no. 2, pp. 75–84. (in Russian). https://doi.org/10.24143/2072-9502-2023-2-75-84
  7. Osak A.B., Buzina E.Y. Analysis of the cyber vulnerabilities impact of relay protection systems, emergency and regime automation on the reliability of consumers power supply in the context of the power industry digital transformation. Methodological issues in researching the reliability of the large energy systems. Materials from the 93th seminar meeting. Irkutsk, 2021, pp. 310–319. (in Russian)
  8. Makarenko S.I. Audit of information security - the main stages, conceptual framework, classification of types. Systems of Control, Communication and Security, 2018, no. 1, pp. 1–29. (in Russian). https://doi.org/10.24411/2410-9916-2018-10101
  9. Averchenkov V.I., Rytov M.Iu., Kuvyklin A.V., Rudanovskii M.V. Information Security Audit of the Executive Authorities. Moscow, FLINTA Publ., 2011, 100 p. (in Russian)
  10. Homyakov V.A. Audit is as a method of modernization in provision system of information security. Jekonomicheskij vestnik Jaroslavskogo universiteta, 2013, no. 29, pp. 48–52. (in Russian)
  11. Makarenko S.I. Security Audit of the Critical Infrastructure Using Special Information Influences. St. Petersburg, Naukoemkie tehnologii Publ., 2018, 122 p. (in Russian)
  12. Boyko A.A., Obushenko E.Y., Shcheglov A.V. About synthesis of a full set of test methods of remote information-technical impacts on spatially distributed systems of information-technical tools. Proceedings of Voronezh State University. Series: Systems Analysis and Information Technologies, 2017, no. 2, pp. 33–45. (in Russian)
  13. Begaev A.N., Begaev S.N., Fedotov V.A. Penetration Testing. St. Petersburg, ITMO University, 2018, 45 p. (in Russian)
  14. Nyrkov A.P., Rudakova S.A. The technique of audit of information objects for information security requirements. Zhurnal Universiteta vodnyh kommunikacij, 2012, no. 3, pp. 146–149. (in Russian)
  15. Aksenov I.I., Mbah E.Ch. Development of a 110 kV overhead transmission line monitoring system. Energy efficiency and energy saving in the modern production and society: materials of the International Scientific and Practical Conference. Part. 1,2022, pp. 51–64. (in Russian)
  16. Komarov S. The trouble has come from where it was not expected ... Broadcasting, 2005, no. 7, pp. 71–72. Available at: http://lib.broadcasting.ru/articles2/Oborandteh/grief_came. (accessed: 10.10.2023). (in Russian)
  17. Demirchian K.S., Neiman L.R., Korovkin N.V., Chechurin V.L. Theoretical Basics of Electrical Engineering. V. 3. St. Petersburg, Piter Publ., 2006, 337 p. (in Russian)
  18. Kalantarov P.L., Tceitlin L.A. Inductance Calculation. Reference Book. Leningrad, Jenergoatomizdat Publ., 1986, 488 p. (in Russian)


Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика