Comprehensive Risk Assessment of Smart Energy Information Security: An Enhanced MCDM-Based Approach

被引:0
|
作者
Li, Zhenyu [1 ]
Du, Pan [1 ]
Li, Tiezhi [1 ]
机构
[1] Xian Univ Sci & Technol, Coll Management, Xian 710054, Peoples R China
关键词
smart energy systems; interval type-2 fuzzy numbers; comprehensive evaluation; risk assessment; energy security;
D O I
10.3390/su17083417
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
To address the challenges of assessing information security risks in smart energy systems, this study proposes a multi-attribute decision support method based on interval type-2 fuzzy numbers (IT2TrFN). First, expert questionnaires were designed to gather insights from eight specialists in the fields of smart energy and safety engineering. Linguistic terms associated with IT2TrFN were employed to evaluate indicators, converting expert judgments into fuzzy numerical values while ensuring data reliability through consistency measurements. Subsequently, a decision hierarchy structure and an expert weight allocation model were developed. By utilizing the score and accuracy functions of IT2TrFN, the study determined positive and negative ideal solutions to rank and prioritize the evaluation criteria. Key influencing factors identified include the rate of excessive initial investment, regulatory stringency, information security standards, environmental pollution pressure, and incident response timeliness. The overall risk index was calculated as 0.5839, indicating a moderate level of information security risk in the evaluated region. To validate the robustness of the model, sensitivity analyses were conducted by varying IT2FWA (Weighted aggregated operator) and IT2FGA (Weighted geometric operator) operator selections and adjusting weight coefficients. The results reveal that key indicators exhibit high risk under different scenarios. This method provides an innovative tool for the scientific evaluation of information security risks in smart energy systems, laying a solid theoretical foundation for broader regional applications and the expansion of assessment criteria.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Information Security Risk Assessment in Critical Infrastructure: A Hybrid MCDM Approach
    Turskis, Zenonas
    Goranin, Nikolaj
    Nurusheva, Assel
    Boranbayev, Seilkhan
    INFORMATICA, 2019, 30 (01) : 187 - 211
  • [2] The Information Security Risk Assessment Based on Fuzzy Comprehensive Evaluation
    Li Guohong
    Cai Yongkai
    PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS A-C, 2008, : 2027 - 2031
  • [3] Construction of Information Security Risk Assessment Model in Smart City
    Hui, Pan
    2020 IEEE CONFERENCE ON TELECOMMUNICATIONS, OPTICS AND COMPUTER SCIENCE (TOCS), 2020, : 393 - 396
  • [4] A new quantitative approach for information security risk assessment
    Asosheh, Abbas
    Dehmoubed, Bijan
    Khani, Amir
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 222 - +
  • [5] An Information Security Risk Assessment System Based on Knowledge
    Ma, Jianqiang
    2017 4TH ICMIBI INTERNATIONAL CONFERENCE ON TRAINING, EDUCATION, AND MANAGEMENT (ICMIBI-TEM 2017), 2017, 83 : 376 - 381
  • [6] Risk Assessment Method of Information Security Based on AHP
    Ning, Xu
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 430 - 433
  • [7] Risk Assessment of Smart Grid Cyber Security Based on Multi-Level Fuzzy Comprehensive Evaluation Method
    Zhang, Kewei
    ADVANCED DESIGNS AND RESEARCHES FOR MANUFACTURING, PTS 1-3, 2013, 605-607 : 2311 - 2317
  • [8] Risk Assessment of Information Security in Communication-Based Train Control Systems Based on AHP Fuzzy Comprehensive Evaluation
    Kuang, Xiangqi
    Sun, Shiwei
    Zeng, Qinghui
    2024 7TH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND BIG DATA, ICAIBD 2024, 2024, : 247 - 252
  • [9] Asset Identification in Information Security Risk Assessment: A Business Practice Approach
    Shedden, Piya
    Ahmad, Atif
    Smith, Wally
    Tscherning, Heidi
    Scheepers, Rens
    COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2016, 39 : 297 - 320
  • [10] A Fuzzy Logic based Information Security Risk Assessment Method
    Yang, Yaling
    Zhou, Yanhui
    MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3726 - 3730