Security Risk Intelligent Assessment of Power Distribution Internet of Things via Entropy-Weight Method and Cloud Model

被引:10
|
作者
Cai, Siyuan [1 ]
Wei, Wei [1 ]
Chen, Deng [1 ]
Ju, Jianping [2 ]
Zhang, Yanduo [1 ]
Liu, Wei [1 ]
Zheng, Zhaohui [3 ]
机构
[1] Wuhan Inst Technol, Hubei Prov Key Lab Intelligent Robot, Wuhan 430079, Peoples R China
[2] Hubei Business Coll, Sch Artificial Intelligence, Wuhan 430079, Peoples R China
[3] Wuhan Inst Technol, Sch Math & Phys, Wuhan 430079, Peoples R China
基金
中国国家自然科学基金;
关键词
power distribution Internet of Things; security risk assessment; evaluation index system; entropy-weight method; cloud model;
D O I
10.3390/s22134663
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The current power distribution Internet of Things (PDIoT) lacks security protection terminals and techniques. Network security has a large exposure surface that can be attacked from multiple paths. In addition, there are many network security vulnerabilities and weak security protection capabilities of power distribution Internet of Things terminals. Therefore, it is crucial to conduct a scientific assessment of the security of PDIoT. However, traditional security assessment methods are relatively subjective and ambiguous. To address the problems, we propose to use the entropy-weight method and cloud model theory to assess the security risk of the PDIoT. We first analyze the factors of security risks in PDIoT systems and establish a three-layer PDIoT security evaluation index system, including a perception layer, network layer, and application layer. The index system has three first-level indicators and sixteen second-level indicators. Then, the entropy-weight method is used to optimize the weight of each index. Additionally, the cloud model theory is employed to calculate the affiliation degree and eigenvalue of each evaluation index. Based on a comprehensive analysis of all evaluation indexes, we can achieve the security level of PDIoT. Taking the PDIoT of Meizhou Power Supply Bureau of Guangdong Power Grid as an example for empirical testing, the experimental results show that the evaluation results are consistent with the actual situation, which proves that the proposed method is effective and feasible.
引用
收藏
页数:12
相关论文
共 45 条
  • [1] Fuzzy security assessment of entropy-weight coefficient method applied in electric power information systems
    Cheng, Xiao-rong
    Li, Mei
    Zhao, Hui-lan
    2007 CONFERENCE PROCEEDINGS IPEC, VOLS 1-3, 2007, : 784 - +
  • [2] An approach for information systems security risk assessment on fuzzy set and entropy-weight
    Fu, Yu
    Wu, Xiao-Ping
    Ye, Qing
    Peng, Xi
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (07): : 1489 - 1494
  • [3] Electric Internet of Things Security Risk Assessment Based on Combined Weighting-cloud Model
    He Y.
    Liu J.
    Liu, Jiang (jiangliu@ncepu.edu.cn), 1600, Power System Technology Press (44): : 4302 - 4309
  • [4] A Novel Risk Assessment Model for Privacy Security in Internet of Things
    WU Tianshui
    ZHAO Gang
    Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 398 - 404
  • [5] A Novel Risk Assessment Model on Software System Combining Modified Fuzzy Entropy-Weight and AHP
    Zhi, Hua
    Zhang, Guidong
    Liu, Yiqun
    Shen, Yongjun
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 451 - 454
  • [6] Internet of Things Big Data Security in Cloud via Stream Cipher and Clustering Model
    K. S. Saraswathy
    S. S. Sujatha
    Wireless Personal Communications, 2022, 123 : 3483 - 3496
  • [7] Internet of Things Big Data Security in Cloud via Stream Cipher and Clustering Model
    Saraswathy, K. S.
    Sujatha, S. S.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 123 (04) : 3483 - 3496
  • [8] Virtual Power Plant Operation Based on Entropy-Weight-Improved Cloud Risk Assessment Model
    Guo, Weishang
    Wang, Qiang
    Liu, Haiying
    Liang, Fengwei
    Zhang, Xinyang
    Liu, Hang
    POLISH JOURNAL OF ENVIRONMENTAL STUDIES, 2023, 32 (04): : 3125 - 3144
  • [9] A risk assessment method for power internet of things information security based on multi-objective hierarchical optimisation
    Sun, Yunxiao
    Zhuang, Ling
    Jia, Ting
    Cheng, Dabei
    Zhao, Xindong
    Guo, Jing
    IET SMART GRID, 2025, 8 (01)
  • [10] Risk Assessment Model of Power Network Based on Equipment Condition and Entropy Combined Weight Method
    Du, Yue
    Shi, Cheng
    Ma, Guo-ming
    Chang, Fang-yuan
    Xu, Bao-ping
    Fan, Yong-hua
    Sun, Zhi-tao
    2017 IEEE ELECTRICAL INSULATION CONFERENCE (EIC), 2017, : 78 - 82