CN110458463A - A kind of electric power Internet of Things safety evaluation method based on Interval Intuitionistic Fuzzy decision - Google Patents
A kind of electric power Internet of Things safety evaluation method based on Interval Intuitionistic Fuzzy decision Download PDFInfo
- Publication number
- CN110458463A CN110458463A CN201910753134.3A CN201910753134A CN110458463A CN 110458463 A CN110458463 A CN 110458463A CN 201910753134 A CN201910753134 A CN 201910753134A CN 110458463 A CN110458463 A CN 110458463A
- Authority
- CN
- China
- Prior art keywords
- electric power
- things
- power internet
- security
- index
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000011156 evaluation Methods 0.000 title claims abstract description 59
- 239000011159 matrix material Substances 0.000 claims abstract description 54
- 238000000034 method Methods 0.000 claims abstract description 20
- 230000008447 perception Effects 0.000 claims abstract description 7
- 238000013459 approach Methods 0.000 claims abstract description 5
- 239000013598 vector Substances 0.000 claims description 12
- 238000004891 communication Methods 0.000 claims description 6
- 230000006870 function Effects 0.000 claims description 5
- 238000003786 synthesis reaction Methods 0.000 claims description 4
- 238000002955 isolation Methods 0.000 claims description 3
- 230000007774 longterm Effects 0.000 claims description 3
- 238000012544 monitoring process Methods 0.000 claims description 3
- 238000011084 recovery Methods 0.000 claims description 3
- 230000004083 survival effect Effects 0.000 claims description 3
- 238000010276 construction Methods 0.000 abstract description 3
- 230000005611 electricity Effects 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 241001310793 Podium Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000012512 characterization method Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/06—Energy or water supply
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/12—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment
- Y04S40/128—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment involving the use of Internet protocol
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Health & Medical Sciences (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Educational Administration (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Primary Health Care (AREA)
- General Health & Medical Sciences (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Security & Cryptography (AREA)
- Public Health (AREA)
- Water Supply & Treatment (AREA)
- Game Theory and Decision Science (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Supply And Distribution Of Alternating Current (AREA)
Abstract
The invention discloses a kind of electric power Internet of Things safety evaluation method based on Interval Intuitionistic Fuzzy decision, method particularly includes: first, from perception safety, internet security, 4 application security, cloud side Cooperative Security angles, electric power Internet of Things index of security assessment collection is established, and acquires each achievement data and forms evaluation decision matrix;Then, electric power Internet of Things safety index Fu Quan expert group is formed, the comprehensive weight that multi-expert group provides is acquired using group eigenvalue method;In turn, electric power Internet of Things security evaluation expert group is formed, expert group carries out Interval Fuzzy evaluation to the index value in security evaluation decision matrix;Finally, providing the security assessment result of electric power Internet of Things using Interval Intuitionistic Fuzzy Decision-making Approach.Electric power Internet of Things index of security assessment system of the invention is comprehensive, and appraisal procedure has feasibility, facilitates the planning construction of electric power Internet of Things, improves electric power Internet of Things safety protection level.
Description
Technical field
The invention belongs to technical field of power systems, and in particular to a kind of electric power Internet of Things based on Interval Intuitionistic Fuzzy decision
Net safety evaluation method.
Background technique
Electric power Internet of Things includes each links such as source-net-lotus-storage of electric power energy network, defeated-with-use of hair-, and electric power is set
Standby, network element and electrical equipment etc. are tightly linked, realize it is ubiquitous (any time, any place, anyone, it is any
Object) efficient communication.In electric power Internet of Things is built and is run, the problem of core concern first is that how to carry out security evaluation,
To ensure the safety of information transmission and data application process, the accident for threatening electric power Internet of things system safety is avoided as far as possible.
For the safety for ensureing electric power Internet of Things, the safety for comprehensively considering sensing layer, network layer, application layer and podium level is needed, it is comprehensive
Close the safe condition of assessment electric power Internet of Things.
Summary of the invention
In consideration of it, in order to from perception safety, internet security, application security, multiple angles such as cloud side Cooperative Security
Degree building electric power Internet of Things security evaluation system.The present invention provides a kind of electric power Internet of Things based on Interval Intuitionistic Fuzzy decision
Safety evaluation method, the safe condition to comprehensive assessment electric power Internet of Things.Scheme is as follows:
A kind of electric power Internet of Things safety evaluation method based on Interval Intuitionistic Fuzzy decision, comprising the following steps:
Step 1: building electric power Internet of Things index of security assessment collection acquires each index of security assessment data, forms electric power object
Networking security evaluation decision matrix;
Step 2: forming electric power Internet of Things index of security assessment Fu Quan expert group, acquired entirely using group eigenvalue method
The comprehensive weight that expert group provides;
Step 3: forming electric power Internet of Things security evaluation expert group, expert group is to the index value in security evaluation decision matrix
Carry out Interval Fuzzy evaluation;
Step 4: the security assessment result of electric power Internet of Things is provided using Interval Intuitionistic Fuzzy Decision-making Approach.
Electric power Internet of Things index of security assessment includes 4 classes in above-mentioned steps 1, i.e. perception safety, internet security, application
Safety, cloud side Cooperative Security specifically include following evaluation index:
A, safety indexes: object personal secrets, intelligent node safety, nodal information certification and control ability, nothing are perceived
The anti-attack ability of line sensor network.
B, internet security index: physical environment safety, communications network security, software data safety, IPv6 application risk,
Heterogeneous network identification and integrated intensity.
C, application security index: when role's recognition efficiency, business security, support platform safety, software and hardware work normally
Between, disaster control and recovery capability.
D, cloud is in Cooperative Security index: cooperated computing platform safety, cloud side cooperated computing monitoring capacity, information are answered when cloud
With safety, data isolation and restore efficiency, user access control ability, supplier's long term survival time.
The value of above-mentioned electric power Internet of Things index of security assessment uses point system to determine (total score is 10 point), and index value is bigger,
Indicate that its security performance is more excellent.
The method of electric power Internet of Things security evaluation decision matrix is formed in above-mentioned steps 1 are as follows:
If the sum of electric power Internet of Things to be assessed is m, index of security assessment number is n, and i-th of electric power Internet of Things is Ii,
I=1,2 ..., m, then electric power Internet of Things IiIndex set be { yi1,yi2,…,yij,…,yin, j=1,2 ..., n, yijIt indicates
The value of j-th of index of security assessment of i-th of electric power Internet of Things;Then all yijConstitute security evaluation decision matrix Y:
Above-mentioned steps 2 specifically:
If forming electric power Internet of Things index of security assessment Fu Quan expert group by p experts, note desired Safety Index Weights are special
Family is E*, the safety index of each electric power Internet of Things is assigned and weighs, E=(E consistent with entire expert group E height1,E2,…,
Ek,…,Ep), k=1,2 ..., p, expert EkIt is w to the weight vectors that each evaluation index providesk, wkIt is a n rank vector, institute
It is w=(w that the weight for having expert to provide, which constitutes matrix,1,w2,…,wk,…,wp);
According to matrix theory and eigenvalue method, desired Safety Index Weights expert E*The weight provided, i.e., entire expert group
Comprehensive weight ω=(ω that body provides1,ω2,…,ωj,…,ωn), j=1,2 ..., n are determined with the following method:
1) eigenmatrix F=w is enabledTw;
2) setting accuracy ε;
3) the number of iterations k=0 is set, value matrix y among preliminary examinationization0=[1/n, 1/n ..., 1/n]T, order matrix y1=Fy0,
Then iterative initial value matrix z1=y1/||y1||2;
4) k=k+1 is enabled, then value matrix y among iterationk+1=Fzk, iteration value matrix zk+1=yk+1/||yk+1||2;
5) it enableszk,jFor the iterative initial value matrix of j-th of index of security assessment, if εz< ε, then
zk+1As desired Safety Index Weights expert E*Overall merit vector θ=(θ1,θ2,…,θj,…,θn);
6) overall merit vector θ is normalized, the comprehensive weight ω that entire expert group provides can be obtained
=(ω1,ω2,…,ωj,…,ωn), wherein
Above-mentioned steps 3 specifically:
Electric power Internet of Things security evaluation expert group is formed, to j-th of index of security assessment value of i-th of electric power Internet of Things
yij, i=1,2 ..., m;J=1,2 ..., n, expert group provide Interval Intuitionistic Fuzzy assessmentWhereinIt is Interval Intuitionistic Fuzzy number,WithRespectively degree of membership
With non-affiliated degree, and meet WhereinWithRespectivelyWith
Interval limit and the upper limit.
Above-mentioned steps 4 specifically:
If the Interval Intuitionistic Fuzzy decision matrix that electric power Internet of Things security evaluation expert group providesIt is area
Between Intuitionistic Fuzzy Numbers;I-th of electric power Internet of Things I to be assessed is provided based on the matrixiSynthesis section Intuitionistic Fuzzy NumbersI.e.
I=1,2 ..., m
WhereinWithRespectively comprehensive section Intuitionistic Fuzzy NumbersDegree of membership and non-affiliated degree interval limit
And the upper limit;
Comprehensive section Intuitionistic Fuzzy Numbers are quantified using scoring function and exact functionI=1,
2 ..., m are to get dividing functionWith exact functionIt is respectively as follows:
Scoring functionIt is worth bigger, comprehensive section Intuitionistic Fuzzy NumbersIt is bigger, if multiple comprehensive section Intuitionistic Fuzzy Numbers
Scoring functionIt is worth equal, then more accurate functionValue,It is worth more big corresponding comprehensive section Intuitionistic Fuzzy Numbers
It is bigger;Accordingly, according to comprehensive section Intuitionistic Fuzzy NumbersSize to electric power Internet of Things E to be assessediSafe ordering is carried out, it is comprehensive
Close Interval Intuitionistic Fuzzy numberThe bigger level of security for representing the electric power Internet of Things is higher.
The beneficial effects of the present invention are:
The present invention comprehensively considers the factors such as perception safety, internet security, application security, cloud side Cooperative Security,
The electric power Internet of Things index of security assessment collection comprising 20 evaluation indexes is constructed, energy system comprehensively reflects electric power Internet of Things
Level of security;A kind of electric power Internet of Things safety evaluation method based on Interval Intuitionistic Fuzzy decision is proposed, using group decision
Eigenvalue method has determined the comprehensive weight of evaluation index, can effectively integrate the weight opinion that several experts provide, and realizes tax power
Reasonability.
Detailed description of the invention
Fig. 1 is flow chart of the invention.
Specific embodiment
The present invention is described in further details in the following with reference to the drawings and specific embodiments.
The present invention proposes a kind of electric power Internet of Things safety evaluation method based on Interval Intuitionistic Fuzzy decision, as shown in Figure 1,
Specific step is as follows:
Step 1: building electric power Internet of Things index of security assessment collection acquires each index of security assessment data, forms electric power object
Networking security evaluation decision matrix;
(1) electric power Internet of Things index of security assessment collection
Electric power Internet of Things index of security assessment includes 4 classes, i.e. perception safety, internet security, application security, Yun Bian
Cooperative Security specifically includes following evaluation index:
A, safety indexes: object personal secrets, intelligent node safety, nodal information certification and control ability, nothing are perceived
The anti-attack ability of line sensor network.Wherein, object personal secrets index refers to, in electric power Internet of Things, whether object information
It can effectively be hidden;The security threat of intelligent node includes: that the gateway node of wireless sensor network is controlled by attacker, is public
Conode is by attacker's control, common node by attacker's capture, the ddos attack from electric system external network, to intelligence
The physical damage etc. of energy node;Nodal information certification refers to that electric power Internet of Things interior joint access information is authenticated with control ability index
Legitimacy, guarantee by legitimate user access and control respective nodes.
B, internet security index: physical environment safety, communications network security, software data safety, IPv6 application risk,
Heterogeneous network identification and integrated intensity.Wherein, physical environment safety index refer to electric power Internet of Things computer room and office building and
Safety in terms of its auxiliary facility, equipment, route and electricity consumption, comprising: building, equipment or route are destroyed or occurred
Failure, equipment is stolen, information leakage occurs, electricity consumption interruption etc. occurs;Communications network security index is according to electric power Internet of Things
The characteristics of, the hardware problem, software issue and each data information that occur in communication network are taken precautions against and protected;It is soft
The security threat of number of packages evidence includes: the number inside power grid enterprises with interdepartmental dangerous access, each application system itself
Lack unification without reliable and secure environment, the content hidden danger of offline unstructured data, terminal peripheral port with storage according to interaction
Safety management etc.;IPv6 application risk includes that loophole caused by the counterfeit access network of equipment, application layer attack, information are transmitted across
Attack etc. in journey.The ability of heterogeneous network attack is resisted in heterogeneous network identification with integrated intensity index characterization electric power Internet of Things.
C, application security index: when role's recognition efficiency, business security, support platform safety, software and hardware work normally
Between, disaster control and recovery capability.
D, cloud is in Cooperative Security index: cooperated computing platform safety, cloud side cooperated computing monitoring capacity, information are answered when cloud
With safety, data isolation and restore efficiency, user access control ability, supplier's long term survival time.
The value of above-mentioned electric power Internet of Things index of security assessment uses point system to determine (total score is 10 point), and index value is bigger,
Indicate that its security performance is more excellent.
(2) electric power Internet of Things security evaluation decision matrix is formed
If the sum of electric power Internet of Things to be assessed is m, index of security assessment number is n, and i-th of electric power Internet of Things is Ii,
I=1,2 ..., m, then electric power Internet of Things IiIndex set be { yi1,yi2,…,yij,…,yin, j=1,2 ..., n, yijIt indicates
The value of j-th of index of security assessment of i-th of electric power Internet of Things;Then all yijConstitute security evaluation decision matrix Y:
Step 2: forming electric power Internet of Things index of security assessment Fu Quan expert group, acquired entirely using group eigenvalue method
The comprehensive weight that expert group provides;
If forming electric power Internet of Things index of security assessment Fu Quan expert group by p experts, note desired Safety Index Weights are special
Family is E*, the safety index of each electric power Internet of Things is assigned and weighs, E=(E consistent with entire expert group E height1,E2,…,
Ek,…,Ep), k=1,2 ..., p, expert EkIt is w to the weight vectors that each evaluation index providesk, wkIt is a n rank vector, institute
It is w=(w that the weight for having expert to provide, which constitutes matrix,1,w2,…,wk,…,wp);
According to matrix theory and eigenvalue method, desired Safety Index Weights expert E*The weight provided, i.e., entire expert group
Comprehensive weight ω=(ω that body provides1,ω2,…,ωj,…,ωn), j=1,2 ..., n are determined with the following method:
1) eigenmatrix F=w is enabledTw;
2) setting accuracy ε;
3) the number of iterations k=0 is set, value matrix y among preliminary examinationization0=[1/n, 1/n ..., 1/n]T, order matrix y1=Fy0,
Then iterative initial value matrix z1=y1/||y1||2;
4) k=k+1 is enabled, then value matrix y among iterationk+1=Fzk, iteration value matrix zk+1=yk+1/||yk+1||2;
5) it enableszk,jFor the iterative initial value matrix of j-th of index of security assessment, if εz< ε, then
zk+1As desired Safety Index Weights expert E*Overall merit vector θ=(θ1,θ2,…,θj,…,θn);
6) overall merit vector θ is normalized, the comprehensive weight ω that entire expert group provides can be obtained
=(ω1,ω2,…,ωj,…,ωn), wherein
Step 3: forming electric power Internet of Things security evaluation expert group, expert group is to the index value in security evaluation decision matrix
Carry out Interval Fuzzy evaluation;
Electric power Internet of Things security evaluation expert group is formed, to j-th of index of security assessment value of i-th of electric power Internet of Things
yij, i=1,2 ..., m;J=1,2 ..., n, expert group provide Interval Intuitionistic Fuzzy assessmentWhereinIt is Interval Intuitionistic Fuzzy number,WithRespectively degree of membership
With non-affiliated degree, and meet WhereinWithRespectivelyWith
Interval limit and the upper limit.
Step 4: the security assessment result of electric power Internet of Things is provided using Interval Intuitionistic Fuzzy Decision-making Approach.
If the Interval Intuitionistic Fuzzy decision matrix that electric power Internet of Things security evaluation expert group providesIt is area
Between Intuitionistic Fuzzy Numbers;I-th of electric power Internet of Things I to be assessed is provided based on the matrixiSynthesis section Intuitionistic Fuzzy NumbersI.e.
I=1,2 ..., m
WhereinWithRespectively comprehensive section Intuitionistic Fuzzy NumbersDegree of membership and non-affiliated degree interval limit
And the upper limit;
Comprehensive section Intuitionistic Fuzzy Numbers are quantified using scoring function and exact functionI=1,
2 ..., m are to get dividing functionWith exact functionIt is respectively as follows:
Scoring functionIt is worth bigger, comprehensive section Intuitionistic Fuzzy NumbersIt is bigger, if multiple comprehensive section Intuitionistic Fuzzy Numbers
Scoring functionIt is worth equal, then more accurate functionValue,It is worth more big corresponding comprehensive section Intuitionistic Fuzzy Numbers
It is bigger;Accordingly, according to comprehensive section Intuitionistic Fuzzy NumbersSize to electric power Internet of Things E to be assessediSafe ordering is carried out, it is comprehensive
Close Interval Intuitionistic Fuzzy numberThe bigger level of security for representing the electric power Internet of Things is higher.
Embodiment
If there are three electric power Internet of Things construction schemes to be assessed, it is denoted as electric power Internet of Things 1,2 and of electric power Internet of Things respectively
Electric power Internet of Things 3.
(1) electric power Internet of Things index of security assessment collection is constructed, each achievement data is acquired and forms evaluation decision matrix;
It is scored by electric power Internet of Things security evaluation expert group according to the standard of setting, takes gained to comment respectively each index
The average value divided.It is as shown in table 1 to obtain data.
1 electric power Internet of Things index of security assessment of table and evaluation decision matrix element value
(2) electric power Internet of Things safety index Fu Quan expert group is formed, multi-expert group is acquired using group eigenvalue method
The comprehensive weight provided;
If forming electric power Internet of Things safety index Fu Quan expert group by 3 experts, index weights that each expert provides and comprehensive
It is as shown in table 2 to close weight (acquiring using eigenvalue method).
The index weights and overall target weight that each expert of 2 Fu Quan expert group of table provides
Eigenvalue method seeks the iterative initial value matrix z during comprehensive weight1With iteration value matrix zk+1(k=1,2,3,4)
In element it is as shown in table 3.As shown in Table 3, it when seeking comprehensive weight, can be converged on quickly in iteration several times higher
Precision.
Element in 3 iterative initial value matrix of table and iteration value matrix
(3) formed electric power Internet of Things security evaluation expert group, expert group to the index value in security evaluation decision matrix into
The evaluation of row Interval Fuzzy;
Electric power Internet of Things security evaluation expert group provides section intuition mould to all indexs of 3 electric power Internet of Things to be assessed
Paste is assessed, and the element in Interval Intuitionistic Fuzzy decision matrix is as shown in table 4.
The Interval Intuitionistic Fuzzy decision matrix element that 4 security evaluation expert group of table provides
(4) security assessment result of electric power Internet of Things is provided using Interval Intuitionistic Fuzzy Decision-making Approach.
3 electric power Internet of Things I to be assessed are provided based on Interval Intuitionistic Fuzzy decision matrixi(i=1,2,3) synthesis section
Intuitionistic fuzzy value, i.e.,
Using scoring function and exact function quantized interval Intuitionistic Fuzzy Numbers(i=1,2,3) is to get dividing functionWith
Exact functionRespectively
By scoring functionThe size of (i=1,2,3) value is it is found that 3 electric power Internet of Things safe water flat rafts to be assessed
Sequence is E1> E3> E2, may make the safety in operation of electric power Internet of Things higher using the 1st construction scheme.
Claims (6)
1. a kind of electric power Internet of Things safety evaluation method based on Interval Intuitionistic Fuzzy decision, which is characterized in that including following step
It is rapid:
Step 1: building electric power Internet of Things index of security assessment collection acquires each index of security assessment data, forms electric power Internet of Things
Security evaluation decision matrix;
Step 2: forming electric power Internet of Things index of security assessment Fu Quan expert group, entire expert is acquired using group eigenvalue method
The comprehensive weight that group provides;
Step 3: forming electric power Internet of Things security evaluation expert group, expert group carries out the index value in security evaluation decision matrix
Interval Fuzzy evaluation;
Step 4: the security assessment result of electric power Internet of Things is provided using Interval Intuitionistic Fuzzy Decision-making Approach.
2. a kind of electric power Internet of Things safety evaluation method based on Interval Intuitionistic Fuzzy decision according to claim 1,
It is characterized in that, the electric power Internet of Things index of security assessment collection includes perception safety, internet security, application security and cloud
Side Cooperative Security;
The perception safety indexes include: object personal secrets, intelligent node safety, nodal information certification with control ability,
The anti-attack ability of wireless sensor network;
The internet security index includes: physical environment safety, communications network security, software data safety, IPv6 application wind
Danger, heterogeneous network identification and integrated intensity;
The application security index includes: role's recognition efficiency, business security, platform safety, software and hardware is supported to work normally
Time, disaster control and recovery capability;
The cloud cooperated computing platform safety, cloud side cooperated computing monitoring capacity, information when Cooperative Security index includes: cloud
Application is safe, data isolation and restores efficiency, user access control ability, supplier's long term survival time;
The value of the electric power Internet of Things index of security assessment determines that total score is 10 points, and index value is bigger, indicates it using point system
Security performance is more excellent.
3. a kind of electric power Internet of Things safety evaluation method based on Interval Intuitionistic Fuzzy decision according to claim 1,
It is characterized in that, the method for forming electric power Internet of Things security evaluation decision matrix are as follows:
If the sum of electric power Internet of Things to be assessed is m, index of security assessment number is n, and i-th of electric power Internet of Things is Ii, i=1,
2 ..., m, then electric power Internet of Things IiIndex set be { yi1,yi2,…,yij,…,yin, j=1,2 ..., n, yijIt indicates i-th
The value of j-th of index of security assessment of electric power Internet of Things;Then all yijConstitute security evaluation decision matrix Y:
4. a kind of electric power Internet of Things safety evaluation method based on Interval Intuitionistic Fuzzy decision according to claim 1,
It is characterized in that, the step 2 specifically:
If forming electric power Internet of Things index of security assessment Fu Quan expert group by p experts, note desired Safety Index Weights expert is
E* assigns the safety index of each electric power Internet of Things and weighs, E=(E consistent with entire expert group E height1,E2,…,Ek,…,
Ep), k=1,2 ..., p, expert EkIt is w to the weight vectors that each evaluation index providesk, wkIt is a n rank vector, all experts
It is w=(w that the weight provided, which constitutes matrix,1,w2,…,wk,…,wp);
According to matrix theory and eigenvalue method, the weight that desired Safety Index Weights expert E* is provided, i.e., entire expert group is given
Comprehensive weight ω=(ω out1,ω2,…,ωj,…,ωn), j=1,2 ..., n are determined with the following method:
1) eigenmatrix F=w is enabledTw;
2) setting accuracy ε;
3) the number of iterations k=0 is set, value matrix y among preliminary examinationization0=[1/n, 1/n ..., 1/n]T, order matrix y1=Fy0, then iteration
Matrix of initial value z1=y1/||y1||2;
4) k=k+1 is enabled, then value matrix y among iterationk+1=Fzk, iteration value matrix zk+1=yk+1/||yk+1||2;
5) it enableszk,jFor the iterative initial value matrix of j-th of index of security assessment, if εz< ε, then zk+1I.e.
For overall merit vector θ=(θ of desired Safety Index Weights expert E*1,θ2,…,θj,…,θn);
6) overall merit vector θ is normalized, can be obtained comprehensive weight ω that entire expert group provides=
(ω1,ω2,…,ωj,…,ωn), wherein
5. a kind of electric power Internet of Things safety evaluation method based on Interval Intuitionistic Fuzzy decision according to claim 1,
It is characterized in that, the step 3 specifically:
Electric power Internet of Things security evaluation expert group is formed, to j-th of index of security assessment value y of i-th of electric power Internet of Thingsij, i
=1,2 ..., m;J=1,2 ..., n, expert group provide Interval Intuitionistic Fuzzy assessment
WhereinIt is Interval Intuitionistic Fuzzy number,WithRespectively degree of membership and non-affiliated degree, and meet WhereinWithRespectivelyWithInterval limit and the upper limit.
6. a kind of electric power Internet of Things safety evaluation method based on Interval Intuitionistic Fuzzy decision according to claim 1,
It is characterized in that, the step 4 specifically:
If the Interval Intuitionistic Fuzzy decision matrix that electric power Internet of Things security evaluation expert group provides It is section intuition
Fuzzy number;I-th of electric power Internet of Things I to be assessed is provided based on the matrixiSynthesis section Intuitionistic Fuzzy NumbersI.e.
WhereinWithRespectively comprehensive section Intuitionistic Fuzzy NumbersDegree of membership and non-affiliated degree interval limit and upper
Limit;WhereinWithRespectively Interval Intuitionistic Fuzzy numberDegree of membership and non-affiliated degree interval limit and the upper limit;
Comprehensive section Intuitionistic Fuzzy Numbers are quantified using scoring function and exact functionThat is scoring functionWith exact functionIt is respectively as follows:
Scoring functionIt is worth bigger, comprehensive section Intuitionistic Fuzzy NumbersIt is bigger, if the score of multiple comprehensive section Intuitionistic Fuzzy Numbers
FunctionIt is worth equal, then more accurate functionValue,It is bigger to be worth more big corresponding comprehensive section Intuitionistic Fuzzy Numbers;
Accordingly, according to comprehensive section Intuitionistic Fuzzy NumbersSize to electric power Internet of Things E to be assessediCarry out safe ordering, comprehensive section
Intuitionistic Fuzzy NumbersThe bigger level of security for representing the electric power Internet of Things is higher.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910753134.3A CN110458463B (en) | 2019-08-15 | 2019-08-15 | Electric power Internet of things security assessment method based on interval intuitive fuzzy decision |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910753134.3A CN110458463B (en) | 2019-08-15 | 2019-08-15 | Electric power Internet of things security assessment method based on interval intuitive fuzzy decision |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110458463A true CN110458463A (en) | 2019-11-15 |
CN110458463B CN110458463B (en) | 2022-06-03 |
Family
ID=68486667
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910753134.3A Active CN110458463B (en) | 2019-08-15 | 2019-08-15 | Electric power Internet of things security assessment method based on interval intuitive fuzzy decision |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110458463B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111182076A (en) * | 2020-01-02 | 2020-05-19 | 合肥工业大学 | Cloud-edge cooperative smart power grid monitoring system and resource allocation and scheduling method thereof |
CN111339491A (en) * | 2020-02-28 | 2020-06-26 | 上海电力大学 | Evaluation method for urban power distribution network transformation scheme |
CN111445068A (en) * | 2020-03-25 | 2020-07-24 | 中国农业大学 | Technical combination scheme selection method and device based on group decision |
CN111784166A (en) * | 2020-07-03 | 2020-10-16 | 东莞理工学院 | Comprehensive energy efficiency assessment method and system for medium and low voltage distribution network |
CN112184075A (en) * | 2020-10-29 | 2021-01-05 | 西南交通大学 | Sustainable supply chain risk analysis method |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104933505A (en) * | 2015-04-22 | 2015-09-23 | 国家电网公司 | Decision and evaluation method for intelligent power distribution network group based on fuzzy assessment |
CN106789946A (en) * | 2016-11-30 | 2017-05-31 | 平顶山学院 | A kind of Internet of Things security evaluation method |
CN107565688A (en) * | 2017-08-21 | 2018-01-09 | 四川电之盾安全技术有限公司 | A kind of Electrical Safety prevention and control system based on Internet of Things |
CN108319776A (en) * | 2018-01-30 | 2018-07-24 | 江西理工大学 | Simulation Parameters decision-making technique based on the soft collection of group's generalized interval intuitionistic fuzzy |
CN109146184A (en) * | 2018-08-28 | 2019-01-04 | 成都信息工程大学 | Based on the Interval Intuitionistic Fuzzy multiple attributive decision making method for improving entropy and scoring function |
CN109784732A (en) * | 2019-01-18 | 2019-05-21 | 西南交通大学 | A kind of multiple attributive decision making method of energy internet security assessment |
CN109872044A (en) * | 2019-01-18 | 2019-06-11 | 西南交通大学 | A kind of energy internet security appraisal procedure based on expert fuzzy preference |
-
2019
- 2019-08-15 CN CN201910753134.3A patent/CN110458463B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104933505A (en) * | 2015-04-22 | 2015-09-23 | 国家电网公司 | Decision and evaluation method for intelligent power distribution network group based on fuzzy assessment |
CN106789946A (en) * | 2016-11-30 | 2017-05-31 | 平顶山学院 | A kind of Internet of Things security evaluation method |
CN107565688A (en) * | 2017-08-21 | 2018-01-09 | 四川电之盾安全技术有限公司 | A kind of Electrical Safety prevention and control system based on Internet of Things |
CN108319776A (en) * | 2018-01-30 | 2018-07-24 | 江西理工大学 | Simulation Parameters decision-making technique based on the soft collection of group's generalized interval intuitionistic fuzzy |
CN109146184A (en) * | 2018-08-28 | 2019-01-04 | 成都信息工程大学 | Based on the Interval Intuitionistic Fuzzy multiple attributive decision making method for improving entropy and scoring function |
CN109784732A (en) * | 2019-01-18 | 2019-05-21 | 西南交通大学 | A kind of multiple attributive decision making method of energy internet security assessment |
CN109872044A (en) * | 2019-01-18 | 2019-06-11 | 西南交通大学 | A kind of energy internet security appraisal procedure based on expert fuzzy preference |
Non-Patent Citations (4)
Title |
---|
HOANG NGUYEN: "Atanassov"s intuitionistic fuzzy risk estimation of the ship system failures based on the expert judgments", 《 2017 IEEE INTERNATIONAL CONFERENCE ON INNOVATIONS IN INTELLIGENT SYSTEMS AND APPLICATIONS (INISTA)》 * |
ZANG TL ETC: "Fault Section Estimation for Power Systems Based on Adaptive Fuzzy Petri Nets", 《INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS》 * |
滕希龙: "基于区间值直觉模糊集的信息系统风险评估研究", 《中国优秀硕士论文全文数据库》 * |
罗志刚 等: "基于区间直觉模糊理论的直流配网规划方案综合决策", 《电工技术学报》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111182076A (en) * | 2020-01-02 | 2020-05-19 | 合肥工业大学 | Cloud-edge cooperative smart power grid monitoring system and resource allocation and scheduling method thereof |
CN111182076B (en) * | 2020-01-02 | 2022-08-02 | 合肥工业大学 | Cloud-edge cooperative smart power grid monitoring system and resource allocation and scheduling method thereof |
CN111339491A (en) * | 2020-02-28 | 2020-06-26 | 上海电力大学 | Evaluation method for urban power distribution network transformation scheme |
CN111445068A (en) * | 2020-03-25 | 2020-07-24 | 中国农业大学 | Technical combination scheme selection method and device based on group decision |
CN111784166A (en) * | 2020-07-03 | 2020-10-16 | 东莞理工学院 | Comprehensive energy efficiency assessment method and system for medium and low voltage distribution network |
CN111784166B (en) * | 2020-07-03 | 2024-01-16 | 东莞理工学院 | Comprehensive energy efficiency evaluation method and system for medium-low voltage distribution network |
CN112184075A (en) * | 2020-10-29 | 2021-01-05 | 西南交通大学 | Sustainable supply chain risk analysis method |
CN112184075B (en) * | 2020-10-29 | 2022-04-22 | 西南交通大学 | Sustainable supply chain risk analysis method |
Also Published As
Publication number | Publication date |
---|---|
CN110458463B (en) | 2022-06-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110458463A (en) | A kind of electric power Internet of Things safety evaluation method based on Interval Intuitionistic Fuzzy decision | |
Alimi et al. | A review of machine learning approaches to power system security and stability | |
Xu et al. | Trust-aware service offloading for video surveillance in edge computing enabled internet of vehicles | |
Karthik et al. | Multi‐objective economic emission dispatch using interior search algorithm | |
Shaikh et al. | Application of grey wolf optimisation algorithm in parameter calculation of overhead transmission line system | |
CN108182536B (en) | CPS security defense method for power distribution network based on finiteness | |
Belgaum et al. | A framework for evaluation of cyber security challenges in smart cities | |
CN106203164B (en) | Information security big data resource management system based on trust computing and cloud computing | |
Nguyen et al. | An advanced internet-of-drones system with blockchain for improving quality of service of search and rescue: A feasibility study | |
Ferdowsi et al. | Interdependence-aware game-theoretic framework for secure intelligent transportation systems | |
Caleb et al. | Secured Node Identification Approach Based on Artificial Neural Network Infrastructure for Wireless Sensor Networks | |
Sarker et al. | Resiliency metrics for monitoring and analysis of cyber-power distribution system with IoTs | |
Yang et al. | Predicting the probability of ice storm damages to electricity transmission facilities based on ELM and Copula function | |
Chen et al. | [Retracted] Fire Safety Evaluation for Scenic Spots: An Evidential Best‐Worst Method | |
Zhang et al. | Partition fault diagnosis of power grids based on improved PNN and GRA | |
CN115801460B (en) | Power distribution information physical system security risk assessment method considering network attack vulnerability | |
CN108521345B (en) | Information physical cooperation method considering communication interruption for island micro-grid | |
Xie et al. | Unmanned system safety decision-making support: Analysis and assessment of road traffic accidents | |
Ali et al. | Improved intrusion detection accuracy based on optimization fast learning network model | |
CN105069336B (en) | A kind of distributed security management method based on the analysis of big data weight dynamic and intelligent | |
Abaas et al. | Blockchain applications in smart grid systems | |
Lianbing | Study on Applying the Neural Network in Computer Network Security Assessment | |
Rahim et al. | Cybersecurity vulnerabilities in smart grids with solar photovoltaic: a threat modelling and risk assessment approach | |
Shen et al. | A fuzzy group decision-making framework for computer network security evaluation with probabilistic linguistic information | |
Zhao et al. | A social computing method for energy safety |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |