Cargando…

Security Risk Intelligent Assessment of Power Distribution Internet of Things via Entropy-Weight Method and Cloud Model

The current power distribution Internet of Things (PDIoT) lacks security protection terminals and techniques. Network security has a large exposure surface that can be attacked from multiple paths. In addition, there are many network security vulnerabilities and weak security protection capabilities...

Descripción completa

Detalles Bibliográficos
Autores principales: Cai, Siyuan, Wei, Wei, Chen, Deng, Ju, Jianping, Zhang, Yanduo, Liu, Wei, Zheng, Zhaohui
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9268771/
https://www.ncbi.nlm.nih.gov/pubmed/35808160
http://dx.doi.org/10.3390/s22134663
_version_ 1784744067107651584
author Cai, Siyuan
Wei, Wei
Chen, Deng
Ju, Jianping
Zhang, Yanduo
Liu, Wei
Zheng, Zhaohui
author_facet Cai, Siyuan
Wei, Wei
Chen, Deng
Ju, Jianping
Zhang, Yanduo
Liu, Wei
Zheng, Zhaohui
author_sort Cai, Siyuan
collection PubMed
description The current power distribution Internet of Things (PDIoT) lacks security protection terminals and techniques. Network security has a large exposure surface that can be attacked from multiple paths. In addition, there are many network security vulnerabilities and weak security protection capabilities of power distribution Internet of Things terminals. Therefore, it is crucial to conduct a scientific assessment of the security of PDIoT. However, traditional security assessment methods are relatively subjective and ambiguous. To address the problems, we propose to use the entropy-weight method and cloud model theory to assess the security risk of the PDIoT. We first analyze the factors of security risks in PDIoT systems and establish a three-layer PDIoT security evaluation index system, including a perception layer, network layer, and application layer. The index system has three first-level indicators and sixteen second-level indicators. Then, the entropy-weight method is used to optimize the weight of each index. Additionally, the cloud model theory is employed to calculate the affiliation degree and eigenvalue of each evaluation index. Based on a comprehensive analysis of all evaluation indexes, we can achieve the security level of PDIoT. Taking the PDIoT of Meizhou Power Supply Bureau of Guangdong Power Grid as an example for empirical testing, the experimental results show that the evaluation results are consistent with the actual situation, which proves that the proposed method is effective and feasible.
format Online
Article
Text
id pubmed-9268771
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-92687712022-07-09 Security Risk Intelligent Assessment of Power Distribution Internet of Things via Entropy-Weight Method and Cloud Model Cai, Siyuan Wei, Wei Chen, Deng Ju, Jianping Zhang, Yanduo Liu, Wei Zheng, Zhaohui Sensors (Basel) Article The current power distribution Internet of Things (PDIoT) lacks security protection terminals and techniques. Network security has a large exposure surface that can be attacked from multiple paths. In addition, there are many network security vulnerabilities and weak security protection capabilities of power distribution Internet of Things terminals. Therefore, it is crucial to conduct a scientific assessment of the security of PDIoT. However, traditional security assessment methods are relatively subjective and ambiguous. To address the problems, we propose to use the entropy-weight method and cloud model theory to assess the security risk of the PDIoT. We first analyze the factors of security risks in PDIoT systems and establish a three-layer PDIoT security evaluation index system, including a perception layer, network layer, and application layer. The index system has three first-level indicators and sixteen second-level indicators. Then, the entropy-weight method is used to optimize the weight of each index. Additionally, the cloud model theory is employed to calculate the affiliation degree and eigenvalue of each evaluation index. Based on a comprehensive analysis of all evaluation indexes, we can achieve the security level of PDIoT. Taking the PDIoT of Meizhou Power Supply Bureau of Guangdong Power Grid as an example for empirical testing, the experimental results show that the evaluation results are consistent with the actual situation, which proves that the proposed method is effective and feasible. MDPI 2022-06-21 /pmc/articles/PMC9268771/ /pubmed/35808160 http://dx.doi.org/10.3390/s22134663 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Cai, Siyuan
Wei, Wei
Chen, Deng
Ju, Jianping
Zhang, Yanduo
Liu, Wei
Zheng, Zhaohui
Security Risk Intelligent Assessment of Power Distribution Internet of Things via Entropy-Weight Method and Cloud Model
title Security Risk Intelligent Assessment of Power Distribution Internet of Things via Entropy-Weight Method and Cloud Model
title_full Security Risk Intelligent Assessment of Power Distribution Internet of Things via Entropy-Weight Method and Cloud Model
title_fullStr Security Risk Intelligent Assessment of Power Distribution Internet of Things via Entropy-Weight Method and Cloud Model
title_full_unstemmed Security Risk Intelligent Assessment of Power Distribution Internet of Things via Entropy-Weight Method and Cloud Model
title_short Security Risk Intelligent Assessment of Power Distribution Internet of Things via Entropy-Weight Method and Cloud Model
title_sort security risk intelligent assessment of power distribution internet of things via entropy-weight method and cloud model
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9268771/
https://www.ncbi.nlm.nih.gov/pubmed/35808160
http://dx.doi.org/10.3390/s22134663
work_keys_str_mv AT caisiyuan securityriskintelligentassessmentofpowerdistributioninternetofthingsviaentropyweightmethodandcloudmodel
AT weiwei securityriskintelligentassessmentofpowerdistributioninternetofthingsviaentropyweightmethodandcloudmodel
AT chendeng securityriskintelligentassessmentofpowerdistributioninternetofthingsviaentropyweightmethodandcloudmodel
AT jujianping securityriskintelligentassessmentofpowerdistributioninternetofthingsviaentropyweightmethodandcloudmodel
AT zhangyanduo securityriskintelligentassessmentofpowerdistributioninternetofthingsviaentropyweightmethodandcloudmodel
AT liuwei securityriskintelligentassessmentofpowerdistributioninternetofthingsviaentropyweightmethodandcloudmodel
AT zhengzhaohui securityriskintelligentassessmentofpowerdistributioninternetofthingsviaentropyweightmethodandcloudmodel