Wei Cen
Electric Power Research Institute
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Wei Cen.
international conference on information science and control engineering | 2017
Wei Cen; Feng Zhai; Yilun Fu; Tao-Yong Li; Xiao-Bing Liang
In order to enhance the security protection level of power information system, this paper has analyzed the logic structure of power information system, further studied the DL/T 1527-2016 technology specification of electric power utilization information security protection. On the basis of interpretation standards, it has researched the overall security strategy for the power information system, developed such security encryption devices as cipher machine, security encryption module, special encryption isolation gateway, etc, designed the double-deck security communication protocol which can applied for the power information system. The security performance of the security strategy, security encryption devices and the double-deck security communication protocol can meet the requirements of DL/T 1527-2016, and also can meet the security protection requirements for the current power information system.
2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA) | 2016
Feng Zhai; Wei Cen; Jia Zhao; Peng Xu; Yi Sun
In the process of assigning peak-peak tasks to users, there are some problems such as uncertainty of assignment standard, mismatch of task and actual response. In order to provide more accurate distribution, so as to provide suggestion of implementing staggering power consumption to power grid enterprises, this paper uses the AHP method to evaluate the user peak load staggering potential. It selects the indicators related to the peak load staggering potential, constructs the potential evaluation system, allocates the peak load staggering resources according to the evaluation results, and judges the accuracy of the evaluation according to the task completion and so on. The validity of the potential evaluation method proposed in this paper is evaluated by experiment simulation.
2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing | 2014
Xiaobing Liang; Yingjie Lv; Bing Zhao; Ying Liu; Zhiqiang Sun; Wei Cen
For RFID mutual authentication security protocols which need back-end server have poor mobile performance, it cannot be applied to environments which have poor wireless network. The RFID mutual authentication security protocol based on key dispersion algorithm is designed in this paper, which proposes a new method for managing and distributing keys for a large number of tags. This protocol which does not need the back-end database can be achieved security mutual authentication between the reader and the tag, the reader only need to store a pair of root keys, the key dispersal algorithms can disperse the corresponding mutual authentication keys with the tag identification number. Compared with the other of the same type RFID mutual authentication security protocols, results indicate that the proposed protocol in this paper has higher efficiency and security.
Applied Mechanics and Materials | 2013
Feng Zhai; Ying Liu; Yi Lun Fu; Wei Cen; Zhi Qiang Sun
This paper has designed a secure electric vehicle charging pile control device according to such security problems as the traditional electric vehicle charging pile control devices transmission data can be illegally intercepted easily in electrical communication process. The electric vehicle charging pile control device has used advanced data encryption technology, increased secure storage unit, which can prevent transmission data being intercepted or falsified illegally in electrical communication process effectively, so as to ensure datas integrity and confidentiality. Therefore, it has great practical value.
Applied Mechanics and Materials | 2013
Bing Zhao; Feng Zhai; Wei Cen; Ying Lv; Xiao Bing Liang
According to chip key’s security problem, this paper has designed a secure chip key issuing system and its application method. The chip key issuing system mainly include chip key issuing machine, key issuing host computer, key management server and cryptographic machine. Every key is protected to transmit and write into chip by conversational key which is agreed between chip key issuing machine and the cryptographic machine beside key management server when chip key is issuing. This chip key issuing system and method can provide effective guarantee to chip key’s security.
Advanced Materials Research | 2012
Bao Feng Li; Hui Juan Hou; Wei Cen; Ying Lv
In this paper, a handheld terminal is designed which has encryption and decryption function to solve the problems of relatively lower security level of the traditional terminal equipment’s transmission data in electrical communication. This handheld terminal not only can implement the screct key update and recovery, load switch controlling, charge adding, parameter setting, data reading function and so on , but also through introducing advanced encryption and decryption techniques and using security unit,, , can ensure that the transmission data was not altered in the communication and transmission data’s integrity and confidentiality was not destroyed. This handheld terminal has great practical value.
Low Voltage Apparatus | 2012
Feng Zhai; Bing Zhao; Ying Liu; Yingjie Lv; Yilun Fu; Baofeng Li; Wei Cen; Hua Li
Archive | 2012
Bing Zhao; Ying Liu; Baofeng Li; Feng Zhai; Yingjie Lv; Yilun Fu; Zhancheng Feng; Chunliang Wu; Wei Cen; Quan Yuan
international conference on software engineering | 2017
Yongfeng Cao; Yingjie Lv; Bing Zhao; Wei Cen; Haoyang Li; Yi Sun; Bin Li
international conference on software engineering | 2016
Feng Zhai; Yongfeng Cao; Wei Cen; Z. Q. Sun; X. B. Liang