CN110458463B - Electric power Internet of things security assessment method based on interval intuitive fuzzy decision - Google Patents

Electric power Internet of things security assessment method based on interval intuitive fuzzy decision Download PDF

Info

Publication number
CN110458463B
CN110458463B CN201910753134.3A CN201910753134A CN110458463B CN 110458463 B CN110458463 B CN 110458463B CN 201910753134 A CN201910753134 A CN 201910753134A CN 110458463 B CN110458463 B CN 110458463B
Authority
CN
China
Prior art keywords
safety
things
power internet
interval
index
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910753134.3A
Other languages
Chinese (zh)
Other versions
CN110458463A (en
Inventor
臧天磊
何正友
向悦萍
杨健维
罗杰
王艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southwest Jiaotong University
Original Assignee
Southwest Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southwest Jiaotong University filed Critical Southwest Jiaotong University
Priority to CN201910753134.3A priority Critical patent/CN110458463B/en
Publication of CN110458463A publication Critical patent/CN110458463A/en
Application granted granted Critical
Publication of CN110458463B publication Critical patent/CN110458463B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/12Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment
    • Y04S40/128Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment involving the use of Internet protocol

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Educational Administration (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Primary Health Care (AREA)
  • General Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Security & Cryptography (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Supply And Distribution Of Alternating Current (AREA)

Abstract

The invention discloses a safety assessment method for an electric power internet of things based on interval intuitive fuzzy decision, which comprises the following specific steps: firstly, establishing a power internet of things safety evaluation index set from 4 angles of perception safety, network safety, application safety and cloud edge cooperative safety, and collecting each index data to form an evaluation decision matrix; then, forming a power Internet of things safety index weighting expert group, and solving the comprehensive weight given by a plurality of expert groups by adopting a group decision characteristic root method; further, a power Internet of things safety assessment expert group is formed, and the expert group performs interval fuzzy evaluation on index values in the safety assessment decision matrix; and finally, giving a safety evaluation result of the power internet of things by adopting an interval intuitive fuzzy decision method. The safety evaluation index system of the power internet of things is comprehensive, the evaluation method is feasible, planning and construction of the power internet of things are facilitated, and the safety protection level of the power internet of things is improved.

Description

Electric power Internet of things safety assessment method based on interval intuitive fuzzy decision
Technical Field
The invention belongs to the technical field of power systems, and particularly relates to a power internet of things safety assessment method based on interval intuitive fuzzy decision.
Background
The power internet of things comprises various links of source-network-load-storage, generation-output-distribution-use and the like of a power energy network, and power equipment, network elements, power utilization equipment and the like are closely connected, so that ubiquitous (any time, any place, any person and any object) efficient communication is realized. In the construction and operation of the power internet of things, one of the key concerns is how to perform security assessment so as to guarantee the security of the information transmission and data application process and avoid the accident threatening the security of the power internet of things system as far as possible. In order to guarantee the safety of the power internet of things, the safety of a sensing layer, a network layer, an application layer and a platform layer needs to be comprehensively considered, and the safety condition of the power internet of things needs to be comprehensively evaluated.
Disclosure of Invention
In view of this, an electric power internet of things security evaluation system is constructed from multiple perspectives such as perception security, network security, application security, cloud-edge collaborative security and the like. The invention provides a safety assessment method for an electric power internet of things based on interval intuition fuzzy decision, which is used for comprehensively assessing the safety condition of the electric power internet of things. The scheme is as follows:
a safety assessment method for an electric power Internet of things based on interval intuitive fuzzy decision includes the following steps:
step 1: constructing a power internet of things safety assessment index set, and collecting each safety assessment index data to form a power internet of things safety assessment decision matrix;
step 2: forming a power Internet of things safety evaluation index empowerment expert group, and solving the comprehensive weight given by the whole expert group by adopting a group decision characteristic root method;
and step 3: forming a power Internet of things safety evaluation expert group, and performing interval fuzzy evaluation on index values in a safety evaluation decision matrix by the expert group;
and 4, step 4: and giving a safety evaluation result of the power Internet of things by adopting an interval intuitive fuzzy decision method.
The safety evaluation indexes of the power internet of things in the step 1 include 4 types, namely perception safety, network safety, application safety and cloud edge cooperative safety, and specifically include the following evaluation indexes:
a. perception of security indicators: the system comprises object privacy safety, intelligent node safety, node information authentication and control capability and anti-attack capability of a wireless sensor network.
b. Network security index: physical environment security, communication network security, software data security, IPv6 application risk, and heterogeneous network identification and integration strength.
c. Application safety indexes are as follows: role recognition efficiency, business safety, platform supporting safety, normal working time of software and hardware, disaster control and recovery capability.
d. Cloud-edge collaborative security indexes: the system comprises cloud-side collaborative computing platform safety, cloud-side collaborative computing monitoring capability, information application safety, data isolation and recovery efficiency, user access control capability and long-term survival time of a supplier.
The value of the safety evaluation index of the power internet of things is determined by a scoring method (the total score is 10), and the higher the index value is, the better the safety performance is.
The method for forming the electric power internet of things security assessment decision matrix in the step 1 comprises the following steps:
assuming that the total number of the to-be-evaluated electric power internet of things is m, the number of safety evaluation indexes is n, and the ith electric power internet of things is IiI is 1,2, …, m, then the power internet of things IiIs set as { yi1,yi2,…,yij,…,yin},j=1,2,…,n,yijRepresenting the value of the jth safety assessment index of the ith power internet of things; then all yijAnd (3) forming a security assessment decision matrix Y:
Figure BDA0002167884390000021
the step 2 is specifically:
an electric power Internet of things safety evaluation index empowerment expert group consisting of p experts is set, and ideal safety indexes are recordedThe right-assigning expert is E*The security index of each power internet of things is endowed with the same weight as the whole expert group E, and E is (E ═ E-1,E2,…,Ek,…,Ep) K 1,2, …, p, expert EkThe weight vector given to each evaluation index is wk,wkIs an n-order vector, and all experts give a weight forming matrix of w ═ w1,w2,…,wk,…,wp);
According to matrix theory and characteristic root method, ideal safety index empowerment expert E*The given weight, i.e. the overall weight given by the entire expert population, ω ═ ω (ω ═ ω [ ]12,…,ωj,…,ωn) J ═ 1,2, …, n, determined as follows:
1) let the feature matrix F be wTw;
2) Setting the precision epsilon;
3) assuming that the iteration number k is equal to 0, the intermediate value matrix y is initialized0=[1/n,1/n,…,1/n]TLet the matrix y1=Fy0Then iterate the initial value matrix z1=y1/||y1||2
4) Let k be k +1, the intermediate value matrix y is iteratedk+1=FzkMatrix of iterative values zk+1=yk+1/||yk+1||2
5) Order to
Figure BDA0002167884390000031
zk,jAn iterative initial value matrix of the jth safety evaluation index if epsilonz< ε, then zk+1Is the ideal safety index empowerment expert E*Is (theta) is the overall evaluation vector of (theta)12,…,θj,…,θn);
6) The comprehensive evaluation vector theta is normalized, and the comprehensive weight omega given by the whole expert group is obtained (omega)12,…,ωj,…,ωn) Wherein, in the process,
Figure BDA0002167884390000032
the step 3 is specifically:
forming a power Internet of things safety evaluation expert group, and taking the value y of the jth safety evaluation index of the ith power Internet of thingsijI is 1,2, …, m; j 1,2, …, n, the expert group gives an interval intuitive fuzzy evaluation
Figure BDA0002167884390000033
Wherein
Figure BDA0002167884390000034
Is an interval intuitive fuzzy number,
Figure BDA0002167884390000035
and
Figure BDA0002167884390000036
respectively are membership degree and non-membership degree, and satisfy
Figure BDA0002167884390000037
Figure BDA0002167884390000038
Wherein
Figure BDA0002167884390000039
And
Figure BDA00021678843900000310
are respectively as
Figure BDA00021678843900000311
And
Figure BDA00021678843900000312
lower and upper interval limits.
The step 4 is specifically:
interval intuition fuzzy decision matrix given by power Internet of things security assessment expert group
Figure BDA00021678843900000313
Is an interval intuitive fuzzy number; giving the ith to-be-evaluated power Internet of things I based on the matrixiIntegrated interval intuitive fuzzy number
Figure BDA00021678843900000314
Namely, it is
Figure BDA00021678843900000315
i=1,2,…,m
Wherein
Figure BDA00021678843900000316
And
Figure BDA00021678843900000317
respectively an intuitive fuzzy number of the integrated interval
Figure BDA00021678843900000318
Lower limit and upper limit of the interval of the membership degree and the non-membership degree;
method for quantizing intuitive fuzzy number of comprehensive interval by using score function and precision function
Figure BDA00021678843900000319
i is 1,2, …, m, the score function
Figure BDA00021678843900000320
And exact function
Figure BDA00021678843900000321
Respectively as follows:
Figure BDA00021678843900000322
Figure BDA00021678843900000323
score function
Figure BDA00021678843900000324
The larger the value is, the more the integrated interval intuitionistic fuzzy number is
Figure BDA00021678843900000325
The larger the score function of the intuitive fuzzy number of a plurality of integrated sections
Figure BDA00021678843900000326
If the values are equal, the exact functions are compared
Figure BDA00021678843900000327
The value of the one or more of the one,
Figure BDA00021678843900000328
the larger the value is, the larger the corresponding comprehensive interval intuitionistic fuzzy number is; accordingly, the fuzzy number is intuitively recognized according to the comprehensive interval
Figure BDA00021678843900000329
The size of the network E of the electric power Internet to be evaluatediPerforming safe sorting and synthesizing interval intuitive fuzzy numbers
Figure BDA00021678843900000330
The larger the power internet of things is, the higher the safety level of the power internet of things is.
The invention has the beneficial effects that:
the method comprehensively considers factors such as sensing safety, network safety, application safety, cloud-edge cooperative safety and the like, constructs a safety evaluation index set of the power internet of things comprising 20 evaluation indexes, and can systematically and comprehensively reflect the safety level of the power internet of things; the comprehensive weight of the evaluation index is determined by adopting a group decision characteristic root method, the weight opinions given by multiple experts can be effectively integrated, and the reasonability of weighting is realized.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
The invention is described in further detail below with reference to the figures and specific embodiments.
The invention provides a safety assessment method for an electric power internet of things based on interval intuitive fuzzy decision, which comprises the following specific steps as shown in figure 1:
step 1: constructing a safety assessment index set of the power Internet of things, and collecting data of each safety assessment index to form a safety assessment decision matrix of the power Internet of things;
(1) electric power thing networking safety assessment index set
The safety evaluation indexes of the power internet of things comprise 4 types, namely perception safety, network safety, application safety and cloud edge cooperation safety, and specifically comprise the following evaluation indexes:
a. perception of security indicators: the system comprises object privacy safety, intelligent node safety, node information authentication and control capability and anti-attack capability of a wireless sensor network. The object privacy safety index indicates whether object information can be effectively hidden in the power internet of things; the security threats of the intelligent node comprise: the method comprises the following steps that gateway nodes of a wireless sensing network are mastered by an attacker, public nodes are mastered by the attacker, the public nodes are captured by the attacker, DDoS attack from an external network of a power system, physical damage to intelligent nodes and the like are realized; the node information authentication and control capability index indicates that the validity of the node access information authentication in the power internet of things ensures that a legal user accesses and controls a corresponding node.
b. Network security index: physical environment security, communication network security, software data security, IPv6 application risk, and heterogeneous network identification and integration strength. Wherein, the safety index of physical environment refers to the safety in the aspect of electric power thing networking computer lab and office building and supporting facility, equipment, circuit and power consumption, includes: the buildings, equipment or lines are damaged or have faults, the equipment is stolen, information leakage occurs, power utilization interruption occurs and the like; the communication network safety index is used for preventing and protecting hardware problems, software problems and data information in the communication network according to the characteristics of the power internet of things; security threats for software data include: unsafe access between the interior of a power grid enterprise and each department, unreliable safety environment for data interaction and storage of each application system, hidden content danger of offline unstructured data, lack of uniform safety management of terminal peripheral ports and the like; the risk of IPv6 application includes the equipment counterfeiting access network, vulnerability caused by application layer attack, attack in the information transmission process and the like. The heterogeneous network identification and integration strength index represents the capability of the power internet of things in resisting heterogeneous network attack.
c. Application safety indexes are as follows: role recognition efficiency, business safety, platform supporting safety, normal working time of software and hardware, disaster control and recovery capability.
d. Cloud-edge collaborative security indexes: the system comprises cloud-side collaborative computing platform safety, cloud-side collaborative computing monitoring capability, information application safety, data isolation and recovery efficiency, user access control capability and long-term survival time of a supplier.
The value of the safety evaluation index of the power internet of things is determined by a scoring method (the total score is 10), and the higher the index value is, the better the safety performance is.
(2) Form a security assessment decision matrix of the power internet of things
Assuming that the total number of the to-be-evaluated electric power internet of things is m, the number of safety evaluation indexes is n, and the ith electric power internet of things is IiI is 1,2, …, m, then the power internet of things IiIs set as { yi1,yi2,…,yij,…,yin},j=1,2,…,n,yijRepresenting the value of the jth safety assessment index of the ith power internet of things; then all yijAnd (3) forming a security assessment decision matrix Y:
Figure BDA0002167884390000051
step 2: forming a power Internet of things safety evaluation index empowerment expert group, and solving the comprehensive weight given by the whole expert group by adopting a group decision characteristic root method;
an electric power plant composed of p expertsThe networking safety evaluation index empowerment expert group records the ideal safety index empowerment expert as E*The security index of each power internet of things is endowed with the same weight as the whole expert group E, and E is (E ═ E-1,E2,…,Ek,…,Ep) K 1,2, …, p expert EkThe weight vector given to each evaluation index is wk,wkIs an n-order vector, and all experts give a weight forming matrix of w ═ w1,w2,…,wk,…,wp);
According to matrix theory and characteristic root method, ideal safety index empowerment expert E*The given weight, i.e. the overall weight given by the entire expert population, ω ═ ω (ω ═ ω [ ]12,…,ωj,…,ωn) J ═ 1,2, …, n, determined as follows:
1) let the feature matrix F be wTw;
2) Setting the precision epsilon;
3) assuming that the iteration number k is equal to 0, the intermediate value matrix y is initialized0=[1/n,1/n,…,1/n]TLet matrix y1=Fy0Then iterate the initial value matrix z1=y1/||y1||2
4) Let k be k +1, the intermediate value matrix y is iteratedk+1=FzkMatrix of iterative values zk+1=yk+1/||yk+1||2
5) Order to
Figure BDA0002167884390000061
zk,jAn iterative initial value matrix of the jth safety evaluation index if epsilonz< ε, then zk+1Is the ideal safety index empowerment expert E*Is (theta) is the overall evaluation vector of (theta)12,…,θj,…,θn);
6) The comprehensive evaluation vector theta is normalized, and the comprehensive weight omega given by the whole expert group is obtained (omega)12,…,ωj,…,ωn) Wherein, in the step (A),
Figure BDA0002167884390000062
and step 3: forming a power Internet of things safety evaluation expert group, and performing interval fuzzy evaluation on index values in a safety evaluation decision matrix by the expert group;
forming a power Internet of things safety evaluation expert group, and taking y as the jth safety evaluation index value of the ith power Internet of thingsijI is 1,2, …, m; j 1,2, …, n, the expert group gives an interval intuitive fuzzy evaluation
Figure BDA0002167884390000063
Wherein
Figure BDA0002167884390000064
Is an interval intuitive fuzzy number,
Figure BDA0002167884390000065
and
Figure BDA0002167884390000066
respectively are membership degree and non-membership degree, and satisfy
Figure BDA0002167884390000067
Figure BDA0002167884390000068
Wherein
Figure BDA0002167884390000069
And with
Figure BDA00021678843900000610
Are respectively as
Figure BDA00021678843900000611
And with
Figure BDA00021678843900000612
Lower and upper interval limits.
And 4, step 4: and giving a safety evaluation result of the power Internet of things by adopting an interval intuitive fuzzy decision method.
Interval intuition fuzzy decision matrix given by power Internet of things safety assessment expert group
Figure BDA00021678843900000613
Is an interval intuitive fuzzy number; giving out ith to-be-evaluated power Internet of things I based on matrixiIntegrated interval intuitive fuzzy number
Figure BDA00021678843900000614
Namely, it is
Figure BDA00021678843900000615
i=1,2,…,m
Wherein
Figure BDA00021678843900000616
And
Figure BDA00021678843900000617
respectively an intuitive fuzzy number of the integrated interval
Figure BDA00021678843900000618
Lower limit and upper limit of the interval of the membership degree and the non-membership degree;
method for quantizing intuitive fuzzy number of comprehensive interval by using score function and precision function
Figure BDA00021678843900000619
i is 1,2, …, m, the score function
Figure BDA00021678843900000620
And exact function
Figure BDA00021678843900000621
Respectively as follows:
Figure BDA00021678843900000622
Figure BDA00021678843900000623
score function
Figure BDA00021678843900000624
The larger the value is, the more the integrated interval intuitionistic fuzzy number is
Figure BDA00021678843900000625
The larger the score function is, the more the integral interval is
Figure BDA00021678843900000626
If the values are equal, the exact functions are compared
Figure BDA00021678843900000627
The value of the sum of the values,
Figure BDA00021678843900000628
the larger the value is, the larger the corresponding comprehensive interval intuitionistic fuzzy number is; accordingly, the fuzzy number is intuitively recognized according to the comprehensive interval
Figure BDA00021678843900000629
The size of the network E of the electric power Internet to be evaluatediSafe sorting is carried out, and interval intuitionistic fuzzy numbers are integrated
Figure BDA0002167884390000071
The larger the power internet of things is, the higher the safety level of the power internet of things is.
Examples
The method is characterized in that three electric power Internet of things construction schemes to be evaluated are set and are respectively recorded as an electric power Internet of things 1, an electric power Internet of things 2 and an electric power Internet of things 3.
(1) Constructing a safety assessment index set of the power internet of things, and collecting data of each index to form an assessment decision matrix;
and scoring by the power Internet of things safety assessment expert group according to a set standard, and respectively taking the average value of the scores of all the indexes. The obtained data are shown in Table 1.
Table 1 electric power internet of things security evaluation index and evaluation decision matrix element value
Figure BDA0002167884390000072
(2) Forming a power Internet of things safety index empowerment expert group, and solving the comprehensive weight given by a plurality of expert groups by adopting a group decision characteristic root method;
an electric power internet of things safety index weighting expert group is formed by 3 experts, and index weights and comprehensive weights (obtained by a feature root method) given by the experts are shown in table 2.
TABLE 2 index weights and composite index weights given by each expert in the weighted expert group
Figure BDA0002167884390000073
Figure BDA0002167884390000081
Iterative initial value matrix z in process of solving comprehensive weight by characteristic root method1And a matrix of iteration values zk+1The elements in (k ═ 1,2,3,4) are shown in table 3. As can be seen from table 3, when the integrated weight is obtained, it can be converged to a high accuracy in several iterations.
TABLE 3 iterating elements in the initial value matrix and the iteration value matrix
Figure BDA0002167884390000082
(3) Forming a power Internet of things safety evaluation expert group, and performing interval fuzzy evaluation on index values in a safety evaluation decision matrix by the expert group;
the electric power internet of things safety assessment expert group gives interval intuitive fuzzy assessment to all indexes of 3 electric power internet of things to be assessed, and elements in an interval intuitive fuzzy decision matrix are shown in table 4.
TABLE 4 Interval intuitive fuzzy decision matrix elements given by the Security assessment expert group
Figure BDA0002167884390000091
(4) And giving a safety evaluation result of the power Internet of things by adopting an interval intuitive fuzzy decision method.
3 to-be-evaluated power Internet of things I based on interval intuitive fuzzy decision matrixiIntegrated interval intuitive fuzzy value of (i ═ 1,2,3), i.e.
Figure BDA0002167884390000092
Figure BDA0002167884390000093
Figure BDA0002167884390000094
Method for quantizing interval intuitive fuzzy number by using score function and precision function
Figure BDA0002167884390000095
(i-1, 2,3), i.e. a scoring function
Figure BDA0002167884390000096
And function of accuracy
Figure BDA0002167884390000097
Are respectively as
Figure BDA0002167884390000098
Figure BDA0002167884390000099
Figure BDA00021678843900000910
By a scoring function
Figure BDA0002167884390000101
The value (i is 1,2,3) is known, and the safety level of 3 power internet of things to be evaluated is ranked as E1>E3>E2And the 1 st construction scheme is adopted, so that the operation safety of the power internet of things is higher.

Claims (6)

1. A safety assessment method for an electric power Internet of things based on interval intuitive fuzzy decision is characterized by comprising the following steps:
step 1: constructing a power internet of things safety assessment index set, and collecting each safety assessment index data to form a power internet of things safety assessment decision matrix;
step 2: forming a power Internet of things safety evaluation index weighting expert group, and solving the comprehensive weight given by the whole expert group by adopting a group decision characteristic root method;
and step 3: forming a power Internet of things safety evaluation expert group, and performing interval fuzzy evaluation on index values in a safety evaluation decision matrix by the expert group;
and 4, step 4: and giving a safety evaluation result of the power Internet of things by adopting an interval intuitive fuzzy decision method.
2. The electric power internet of things security assessment method based on interval intuitive fuzzy decision-making according to claim 1, wherein the electric power internet of things security assessment index set comprises perception security, network security, application security and cloud-edge cooperative security;
the perceived security indicators include: the method comprises the following steps of object privacy safety, intelligent node safety, node information authentication and control capacity and attack resistance of a wireless sensor network;
the network security indicators include: physical environment security, communication network security, software data security, IPv6 application risk, heterogeneous network identification and integration strength;
the application security indicators include: role recognition efficiency, business safety, platform safety support, normal software and hardware working time, disaster control and recovery capability;
the cloud edge collaborative security indexes include: the method comprises the following steps of cloud-side collaborative computing platform safety, cloud-side collaborative computing monitoring capability, information application safety, data isolation and recovery efficiency, user access control capability and long-term survival time of a supplier;
the value of the safety evaluation index of the power internet of things is determined by a grading method, the total score is 10, and the higher the index value is, the better the safety performance is.
3. The electric power internet of things safety assessment method based on interval intuitive fuzzy decision-making as claimed in claim 1, wherein the method for forming the electric power internet of things safety assessment decision matrix is as follows:
assuming that the total number of the to-be-evaluated electric power internet of things is m, the number of safety evaluation indexes is n, and the ith electric power internet of things is IiI is 1,2, …, m, then the power internet of things IiIs set as { yi1,yi2,…,yij,…,yin},j=1,2,…,n,yijRepresenting the value of the jth safety assessment index of the ith power internet of things; then all yijAnd (3) forming a security assessment decision matrix Y:
Figure FDA0002167884380000011
4. the electric power internet of things security assessment method based on interval intuitive fuzzy decision-making according to claim 1, wherein the step 2 specifically comprises:
let P experts form electric power thing networking safety assessment indexAnd the empowerment expert group records the ideal safety index empowerment expert as E, the empowerment of the safety index of each power Internet of things is highly consistent with the E of the whole expert group, and E is (E)1,E2,…,Ek,…,Ep) K 1,2, …, p expert EkThe weight vector given to each evaluation index is wk,wkIs an n-order vector, and all experts give a weight forming matrix of w ═ w1,w2,…,wk,…,wp);
According to the matrix theory and the characteristic root method, the ideal safety index is weighted by the weight given by the expert E, namely the comprehensive weight omega given by the whole expert group is (omega)12,…,ωj,…,ωn) J ═ 1,2, …, n, determined as follows:
1) let the feature matrix F be wTw;
2) Setting the precision epsilon;
3) assuming that the iteration number k is equal to 0, the intermediate value matrix y is initialized0=[1/n,1/n,…,1/n]TLet the matrix y1=Fy0Then iterate the initial value matrix z1=y1/||y1||2
4) Let k be k +1, the intermediate value matrix y is iteratedk+1=FzkMatrix of iterative values zk+1=yk+1/||yk+1||2
5) Order to
Figure FDA0002167884380000021
zk,jAn iterative initial value matrix of the jth safety evaluation index if epsilonz< ε, then zk+1I.e. the comprehensive evaluation vector theta (theta) of the ideal safety index empowerment expert E12,…,θj,…,θn);
6) The comprehensive evaluation vector theta is normalized, and the comprehensive weight omega given by the whole expert group is obtained (omega)12,…,ωj,…,ωn) Wherein, in the step (A),
Figure FDA0002167884380000022
5. the electric power internet of things security assessment method based on interval intuitive fuzzy decision-making according to claim 1, wherein the step 3 specifically comprises:
forming a power Internet of things safety evaluation expert group, and taking y as the jth safety evaluation index value of the ith power Internet of thingsijI is 1,2, …, m; j 1,2, …, n, the expert group gives an interval intuitive fuzzy evaluation
Figure FDA0002167884380000023
Wherein
Figure FDA0002167884380000024
Is an interval intuitive fuzzy number,
Figure FDA0002167884380000025
and
Figure FDA0002167884380000026
respectively are membership degree and non-membership degree, and satisfy
Figure FDA0002167884380000027
Figure FDA0002167884380000028
Wherein
Figure FDA0002167884380000029
And
Figure FDA00021678843800000210
are respectively as
Figure FDA00021678843800000211
And
Figure FDA00021678843800000212
lower and upper interval limits.
6. The electric power internet of things security assessment method based on interval intuitive fuzzy decision-making according to claim 1, wherein the step 4 specifically comprises:
interval intuition fuzzy decision matrix given by power Internet of things safety assessment expert group
Figure FDA0002167884380000031
Figure FDA0002167884380000032
Is an interval intuitive fuzzy number; giving the ith to-be-evaluated power Internet of things I based on the matrixiIntegrated interval intuitive fuzzy number
Figure FDA0002167884380000033
Namely, it is
Figure FDA0002167884380000034
Wherein
Figure FDA0002167884380000035
And
Figure FDA0002167884380000036
respectively an intuitive fuzzy number of the integrated interval
Figure FDA0002167884380000037
Lower limit and upper limit of the interval of the membership degree and the non-membership degree; wherein
Figure FDA0002167884380000038
And
Figure FDA0002167884380000039
respectively an interval intuitive fuzzy number
Figure FDA00021678843800000310
Lower limit and upper limit of the interval between the membership degree and the non-membership degree;
method for quantizing intuitive fuzzy number of comprehensive interval by using score function and precision function
Figure FDA00021678843800000311
I.e. the score function
Figure FDA00021678843800000312
And exact function
Figure FDA00021678843800000313
Respectively as follows:
Figure FDA00021678843800000314
Figure FDA00021678843800000315
score function
Figure FDA00021678843800000316
The larger the value is, the more the integrated interval intuitionistic fuzzy number is
Figure FDA00021678843800000317
The larger the score function of the intuitive fuzzy number of a plurality of integrated sections
Figure FDA00021678843800000318
If the values are equal, the exact functions are compared
Figure FDA00021678843800000319
The value of the one or more of the one,
Figure FDA00021678843800000320
the larger the value is, the larger the corresponding comprehensive interval intuitionistic fuzzy number is; accordingly, the fuzzy number is intuitively recognized according to the comprehensive interval
Figure FDA00021678843800000321
The size of the network E of the electric power Internet to be evaluatediSafe sorting is carried out, and interval intuitionistic fuzzy numbers are integrated
Figure FDA00021678843800000322
The larger the power internet of things is, the higher the safety level of the power internet of things is.
CN201910753134.3A 2019-08-15 2019-08-15 Electric power Internet of things security assessment method based on interval intuitive fuzzy decision Active CN110458463B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910753134.3A CN110458463B (en) 2019-08-15 2019-08-15 Electric power Internet of things security assessment method based on interval intuitive fuzzy decision

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910753134.3A CN110458463B (en) 2019-08-15 2019-08-15 Electric power Internet of things security assessment method based on interval intuitive fuzzy decision

Publications (2)

Publication Number Publication Date
CN110458463A CN110458463A (en) 2019-11-15
CN110458463B true CN110458463B (en) 2022-06-03

Family

ID=68486667

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910753134.3A Active CN110458463B (en) 2019-08-15 2019-08-15 Electric power Internet of things security assessment method based on interval intuitive fuzzy decision

Country Status (1)

Country Link
CN (1) CN110458463B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111182076B (en) * 2020-01-02 2022-08-02 合肥工业大学 Cloud-edge cooperative smart power grid monitoring system and resource allocation and scheduling method thereof
CN111339491A (en) * 2020-02-28 2020-06-26 上海电力大学 Evaluation method for urban power distribution network transformation scheme
CN111445068A (en) * 2020-03-25 2020-07-24 中国农业大学 Technical combination scheme selection method and device based on group decision
CN111784166B (en) * 2020-07-03 2024-01-16 东莞理工学院 Comprehensive energy efficiency evaluation method and system for medium-low voltage distribution network
CN112184075B (en) * 2020-10-29 2022-04-22 西南交通大学 Sustainable supply chain risk analysis method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104933505A (en) * 2015-04-22 2015-09-23 国家电网公司 Decision and evaluation method for intelligent power distribution network group based on fuzzy assessment
CN106789946A (en) * 2016-11-30 2017-05-31 平顶山学院 A kind of Internet of Things security evaluation method
CN107565688A (en) * 2017-08-21 2018-01-09 四川电之盾安全技术有限公司 A kind of Electrical Safety prevention and control system based on Internet of Things
CN108319776A (en) * 2018-01-30 2018-07-24 江西理工大学 Simulation Parameters decision-making technique based on the soft collection of group's generalized interval intuitionistic fuzzy
CN109146184A (en) * 2018-08-28 2019-01-04 成都信息工程大学 Based on the Interval Intuitionistic Fuzzy multiple attributive decision making method for improving entropy and scoring function
CN109784732A (en) * 2019-01-18 2019-05-21 西南交通大学 A kind of multiple attributive decision making method of energy internet security assessment
CN109872044A (en) * 2019-01-18 2019-06-11 西南交通大学 A kind of energy internet security appraisal procedure based on expert fuzzy preference

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104933505A (en) * 2015-04-22 2015-09-23 国家电网公司 Decision and evaluation method for intelligent power distribution network group based on fuzzy assessment
CN106789946A (en) * 2016-11-30 2017-05-31 平顶山学院 A kind of Internet of Things security evaluation method
CN107565688A (en) * 2017-08-21 2018-01-09 四川电之盾安全技术有限公司 A kind of Electrical Safety prevention and control system based on Internet of Things
CN108319776A (en) * 2018-01-30 2018-07-24 江西理工大学 Simulation Parameters decision-making technique based on the soft collection of group's generalized interval intuitionistic fuzzy
CN109146184A (en) * 2018-08-28 2019-01-04 成都信息工程大学 Based on the Interval Intuitionistic Fuzzy multiple attributive decision making method for improving entropy and scoring function
CN109784732A (en) * 2019-01-18 2019-05-21 西南交通大学 A kind of multiple attributive decision making method of energy internet security assessment
CN109872044A (en) * 2019-01-18 2019-06-11 西南交通大学 A kind of energy internet security appraisal procedure based on expert fuzzy preference

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Atanassov"s intuitionistic fuzzy risk estimation of the ship system failures based on the expert judgments;Hoang Nguyen;《 2017 IEEE International Conference on INnovations in Intelligent SysTems and Applications (INISTA)》;20170705;全文 *
Fault Section Estimation for Power Systems Based on Adaptive Fuzzy Petri Nets;Zang TL etc;《international journal of computational intelligence systems》;20110228;全文 *
基于区间值直觉模糊集的信息系统风险评估研究;滕希龙;《中国优秀硕士论文全文数据库》;20160715;全文 *
基于区间直觉模糊理论的直流配网规划方案综合决策;罗志刚 等;《电工技术学报》;20190525;全文 *

Also Published As

Publication number Publication date
CN110458463A (en) 2019-11-15

Similar Documents

Publication Publication Date Title
CN110458463B (en) Electric power Internet of things security assessment method based on interval intuitive fuzzy decision
CN108182536B (en) CPS security defense method for power distribution network based on finiteness
CN105681338A (en) Vulnerability exploiting success probability calculation method and network security risk management method
CN105933316B (en) The determination method and apparatus of network security level
CN108881110A (en) A kind of safety situation evaluation and defence policies joint decision method and system
Natarajan Cyber secure man-in-the-middle attack intrusion detection using machine learning algorithms
CN111431862A (en) Network security deep protection method and system for threat-driven power monitoring system
Brown et al. Multi-objective optimization for security games.
CN106203164B (en) Information security big data resource management system based on trust computing and cloud computing
Xiao et al. Network security situation prediction method based on MEA-BP
CN106101098A (en) A kind of information assets recognition methods and device
Zheng [Retracted] Information System Security Evaluation Algorithm Based on PSO‐BP Neural Network
Mohajerani et al. Cyber-related risk assessment and critical asset identification within the power grid
CN111815137A (en) Comprehensive assessment method for vulnerability of power system
Li et al. Information security evaluation based on artificial neural network
CN106851689B (en) Multifactor method for allocating tasks in wireless sensor and actor network
CN114493246A (en) Power information network node risk assessment method based on DW-Degree centrality
Zhu et al. Research on smart home security threat modeling based on STRIDE-IAHP-BN
Chen et al. Research of P2P trust based on fuzzy decision-making
CN106067872B (en) The determination method and apparatus of network safe state
Rahim et al. Cybersecurity vulnerabilities in smart grids with solar photovoltaic: a threat modelling and risk assessment approach
CN112070315A (en) Terrorist attack network analysis and event prediction method based on centrality measurement
Janicijevic et al. Performance of sine cosine algorithm for ann tuning and training for iot security
CN113158574B (en) Safety evaluation method for edge computing system
Sun et al. Immunity-inspired risk assessment approach for network security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant