Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Weimin Lin is active.

Publication


Featured researches published by Weimin Lin.


ieee international conference on power system technology | 2010

Study on security of Wireless Sensor Networks in smart grid

Yufei Wang; Weimin Lin; Tao Zhang

WSNs (Wireless Sensor Networks) have been considered one of the very promising technologies for the implementation of smart grid. And security of WSNs becomes a central concern. The security solutions for generic wireless sensor networks cannot be directly used in smart grid WSNs. In this paper, the applications of sensor networks in electric power systems are discussed and analyzed first. Then, the characteristics of smart grid WSNs are summarized. Threats and security requirements special for wireless sensor networks used in smart grid systems are presented. Based on these works, reference security architecture was proposed to guide the development and the design of the security solutions of wireless sensor networks in smart grid systems, considering the information security requirements of electric power systems. Moreover, open security issues needed solve to protect WSNs applied in smart grid, and research challenges are introduced.


ieee international conference on power system technology | 2010

The design of information security protection framework to support Smart Grid

Tao Zhang; Weimin Lin; Yufei Wang; Song Deng; Congcong Shi; Lu Chen

With the unified and strong smart grid construction by State Grid Corporation of China, information security protection architecture is facing new challenges. The characteristics of smart grid such as informationization, automation, and interaction, have enhanced the two-way interaction between grid and consumers. The design method of information security protection architecture in U.S. Smart Grid and new information security protection requirements of China Smart Gird and new information security risks were proposed and analyzed. An information security protection model and overall information security protection strategy were proposed considering the characteristics of China Smart Grid and the new information security protection requirements. Based on this model, the information security protection framework was designed to support the information security protection in smart grid. The proposed framework consists of four parts: security governance, security management, security maintenance, security technology. Finally, a methodology for the implementation of information security protection framework was given, which guides the business systems in every aspect of smart grid to implement information security protection works from the points of technology, management, and operation.


international conference on advanced power system automation and protection | 2011

Smart grid information security - a research on standards

Yufei Wang; Bo Zhang; Weimin Lin; Tao Zhang

Smart Grid has received tremendous development momentum over the last years. Information and cyber security of smart grid faces severe challenges and has gained considerable importance. First, the characters of smart grid are analyzed and discussed. Then a hierarchical information and communication model is abstracted. Based on the proposed model, the information security risks and information security protection demands of smart grid are studied and summarized. According to the model and security risks, this paper surveys, collects,and studys different smart grid and common information and cyber security standards and guidelines from three dimensions. The dimensions are different domains of smart grid, different hierarchies of the proposed information and communication model, different stages of the information system life cycle. Also, a comparison of these standards is made. After discussed, studied and analyzed, a information security standard architecture is designed and described to guide the electric power utilities in their smart grid information security efforts.


ieee international conference on power system technology | 2010

Research of electric power information security protection on cloud security

Yanliang Wang; Song Deng; Weimin Lin; Tao Zhang; Yong Yu

Informatization is an important feature of smart grid. With the construction of smart grid and the constant depth development of electric power information, the information networks of electric power have been continued to invade by all kinds of network threats. Traditional information security protection system for electric power had been unable to meet the security threats demand of ever changing and growing. Moreover, the cost of electrical safe operation was increased. Meanwhile, with the further application of electric power information engineering, operation capacity of electric power is required to be fully improved so that safe and stable operation is essential to electric power information system. Cloud security is service form that cloud computing provides for users. In view of the advantages of cloud computing and cloud security, architecture of electric power information security protection based on cloud security (AEPISP-CS) is put forward which combines with the current power information security status. Meanwhile, anti-virus system, spam mail filtering, threat detection based on cloud security are described in detail.


international conference on intelligent computing | 2010

Distributed proactive defense based on cloud computing

Song Deng; Weimin Lin; Tao Zhang; Yong Yu

Traditional centralized proactive defense architecture is easy to be attacked, and high traffic, poor scalability, especially when the network scale is large, its efficiency has been greatly decreased. Distributed proactive defense architecture based on cloud computing is proposed, which combines the advantages of cloud computing and the concept of collaboration. The architecture was described in detail. Meanwhile, distributed intrusion detection on GEP-BP in cloud computing is implemented.


Applied Mechanics and Materials | 2011

Intrusion Detection on Hybrid Gene Expression Programming

Song Deng; Weimin Lin; Tao Zhang

This paper present intrusion detection on hybrid gene expression programming (ID-HGEP), which combined theory of attribution reduction in rough set to improve precision and efficiency on intrusion detection. Through extensive experiments on high dimension data sets, it is shown that ID-HGEP is apparently more advantageous in terms of convergence speed, intrusion detection efficiency and average consumptive time in contrast with traditional intrusion detection algorithm on GEP.


Archive | 2012

A New Approach for SQL-Injection Detection

Congcong Shi; Tao Zhang; Yong Yu; Weimin Lin

With the deepening of information construction, Web architecture is widely used in various business systems. While presenting convenience, these new technologies also introduce great security risks. Web security has been a serious issue of information security, and SQL-injection is one of the most common means of attack against Web services. SQL Injection often changes the structure of SQL statements. This paper proposed a self-learning approach to counter SQL Injection which can learn automatically the structure feature of all legal SQL statements to construct knowledge library based on SQL syntax tree in safe environments, and then match every SQL statement with knowledge library to find whether the structural feature has been changed in real environments. If successful, this SQL statement is legal. SQL statements which fail pattern marching are not determined as illegal immediately. Then, we take depth-feature check based on Value-at-Risk, and identity the true illegal SQL statements. This method which combines mode-matching and characterfiltering can reach good results. Experimental results prove that this proposed approach holds good performance and perfect protection for SQL Injection.


international conference on information science and engineering | 2009

Distributed Data Recovery Based on Grid Service

Song Deng; Yong Yu; Weimin Lin

Data recovery on Erasure code could effectively improve the reliability of data storage; however, the algorithm also increased time of data recovery. On the basis of that, this paper presents distributed data recovery based on grid service (DDR-GS), which combines with grid services to improve the efficiency of data recovery. Through extensive experiments on random datasets, it is shown that with the increasing of the number of nodes, DDR-GS improves the speed of matrix calculation. And the time of data recovery is greatly reduced about 77.74%.


Archive | 2010

Data backup method based on Erasure coding and copying technology

Yong Yu; Song Deng; Weimin Lin; Hanqing Tang


Archive | 2012

Intelligent grid electricity information privacy protection method based on multi-party interaction

Ye Hua; Weimin Lin; Tao Zhang; Yuanyuan Ma; Yufei Wang; Song Deng; Xiuli Huang; Lu Chen

Collaboration


Dive into the Weimin Lin's collaboration.

Top Co-Authors

Avatar

Tao Zhang

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Song Deng

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Yong Yu

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Yufei Wang

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Congcong Shi

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Lu Chen

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Ye Hua

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Xiaojian Zhang

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Xingchuan Bao

Electric Power Research Institute

View shared research outputs
Top Co-Authors

Avatar

Yanliang Wang

Electric Power Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge