首页 | 本学科首页   官方微博 | 高级检索  
     

基于信息熵的多源电力物联终端设备信任度评价方法
引用本文:翟峰,冯云,程凯,蔡绍堂,于丽莹,杨挺. 基于信息熵的多源电力物联终端设备信任度评价方法[J]. 中国电力, 2022, 55(5): 158-165. DOI: 10.11930/j.issn.1004-9649.202006211
作者姓名:翟峰  冯云  程凯  蔡绍堂  于丽莹  杨挺
作者单位:1. 中国电力科学研究院有限公司,北京 100192;2. 国网河北省电力有限公司,河北 石家庄 050021;3. 天津大学 电气自动化与信息工程学院,天津 300072
基金项目:国家电网有限公司科技项目(泛在电力物联网端到端安全威胁分析及精准防护技术研究,5700-201958466A-0-0-00)
摘    要:电力物联网终端设备容易受到身份伪装、信息窃取、数据篡改等多种安全威胁,传统的安全方法无法抵御来自受损终端的网络内部攻击,信任评价体系是保护电力物联网终端免受内部攻击的有效机制.针对电力无线专网通信终端信任问题,提出一种基于信息熵的信任评价方法.首先通过基于指数分布的信誉度的模型估算直接信任值,然后采用滑窗与遗忘因子对直...

关 键 词:电力物联网  指数分布  信息熵  网络攻击  信任评价
收稿时间:2020-06-23
修稿时间:2021-09-20

Information Entropy Based Multi-Source Power IoT Terminal Equipment Trust Degree Evaluation Method
ZHAI Feng,FENG Yun,CHENG Kai,CAI Shaotang,YU Liying,YANG Ting. Information Entropy Based Multi-Source Power IoT Terminal Equipment Trust Degree Evaluation Method[J]. Electric Power, 2022, 55(5): 158-165. DOI: 10.11930/j.issn.1004-9649.202006211
Authors:ZHAI Feng  FENG Yun  CHENG Kai  CAI Shaotang  YU Liying  YANG Ting
Affiliation:1. China Electric Power Research Institute, Beijing 100192, China;2. State Grid Hebei Electric Power Co., Ltd., Shijiazhuang 050021, China;3. School of Electrical and Information Engineering, Tianjin University, Tianjin 300072, China
Abstract:Power Internet of things terminal (IoT) equipment is vulnerable to identity camouflage, information theft, data tampering and other security threats. Traditional security methods can not resist the network internal attacks from damaged terminals. Trust evaluation system is an effective mechanism to protect power IoT terminals from internal attacks. A trust evaluation method is proposed based on information entropy for power wireless private network communication terminals. Firstly, the direct trust value is estimated by the credibility model based on exponential distribution, and then the sliding window and forgetting factor are used to update the direct trust value. According to the entropy theory, the uncertainty of direct trust value is measured, and the indirect trust value is introduced to make up for the inaccuracy of direct trust judgment, and the judgment accuracy is improved through comprehensive evaluation of both. Simulation results show that the proposed method can effectively resist switch attacks and collusion attacks, and compared to the binomial trust management method and beta distribution based trust evaluation method, it can better evaluate malicious terminals and normal terminals.
Keywords:
点击此处可从《中国电力》浏览原始摘要信息
点击此处可从《中国电力》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号