
Research Article
Challenges and Prospects of Power Network Security Protection in the Context of a New Power System: A Case Study of Jiangxi
@INPROCEEDINGS{10.1007/978-3-031-80713-8_15, author={Yongcai Xiao and Jian Xu and Kuangye Liu and Jingjing Ge and Lei Hu and Chenxi Wang}, title={Challenges and Prospects of Power Network Security Protection in the Context of a New Power System: A Case Study of Jiangxi}, proceedings={Data Information in Online Environments. 4th EAI International Conference, DIONE 2023, Nanchang, China, November 25--27, 2023, Proceedings}, proceedings_a={DIONE}, year={2025}, month={2}, keywords={new power system network security trusted access intelligent perception}, doi={10.1007/978-3-031-80713-8_15} }
- Yongcai Xiao
Jian Xu
Kuangye Liu
Jingjing Ge
Lei Hu
Chenxi Wang
Year: 2025
Challenges and Prospects of Power Network Security Protection in the Context of a New Power System: A Case Study of Jiangxi
DIONE
Springer
DOI: 10.1007/978-3-031-80713-8_15
Abstract
In recent years, the power grid in Jiangxi Province has entered a new phase of construction in the context of a new power system. However, the traditional network security protection system of the company is facing increasing security risks [1]. This paper first elucidates the network structure characteristics of the new power system and identifies the security risks it faces. Subsequently, combining the characteristics of boundary protection and static protection in the existing network security protection system, this paper analyzes the challenges faced by the protection system from aspects such as power source structure, grid configuration, business models, and technical foundations. Based on the content of security challenges, the paper proposes the requirements for network security protection in terms of trusted access, intelligent perception, and precise protection. Lastly, in conjunction with the development trends of security systems and new technologies, the paper summarizes the technological development directions in areas such as perception technology, blocking technology, security detection and evaluation technology, and validation technology.