CN112437407A - Method and system for calculating initialized safety state of power internet of things wireless terminal equipment based on mixed information entropy - Google Patents

Method and system for calculating initialized safety state of power internet of things wireless terminal equipment based on mixed information entropy Download PDF

Info

Publication number
CN112437407A
CN112437407A CN202010991544.4A CN202010991544A CN112437407A CN 112437407 A CN112437407 A CN 112437407A CN 202010991544 A CN202010991544 A CN 202010991544A CN 112437407 A CN112437407 A CN 112437407A
Authority
CN
China
Prior art keywords
trust
value
wireless communication
communication terminal
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010991544.4A
Other languages
Chinese (zh)
Inventor
冯云
翟峰
梁晓兵
马超
刘鹰
吕英杰
付义伦
李保丰
岑炜
曹永峰
冯占成
许斌
孔令达
徐萌
赵英杰
周琪
任博
刘书勇
张庚
袁泉
卢艳
韩文博
王楠
郑旖旎
杨会峰
陈连栋
申培培
程凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
State Grid Hebei Electric Power Co Ltd
Information and Telecommunication Branch of State Grid Hebei Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
State Grid Hebei Electric Power Co Ltd
Information and Telecommunication Branch of State Grid Hebei Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, China Electric Power Research Institute Co Ltd CEPRI, State Grid Hebei Electric Power Co Ltd, Information and Telecommunication Branch of State Grid Hebei Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN202010991544.4A priority Critical patent/CN112437407A/en
Publication of CN112437407A publication Critical patent/CN112437407A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/06Testing, supervising or monitoring using simulated traffic
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses an initial security state calculation method and system of electric power internet of things wireless terminal equipment based on mixed information entropy, and belongs to the technical field of electric power wireless communication terminals. The method comprises the following steps: determining a direct total trust value of the trust of the electric wireless communication terminal equipment; determining an indirect total trust value trusted by the electric wireless communication terminal equipment; the method comprises the steps of self-adaptively distributing weights of a direct total trust value and an indirect total trust value, determining a weight distribution value, correcting the weight distribution value according to an interactive information utility value of the electric power wireless communication terminal, and obtaining a distribution value of a corrected weight; and performing secondary weight distribution on the direct total trust value and the indirect total trust value according to the corrected weight distribution value, and determining the equipment trust of the electric wireless communication terminal. Aiming at the trust problem of the power wireless private network communication terminal, the invention firstly determines a direct trust value, introduces an indirect trust value to make up the problem of inaccurate direct trust judgment, and improves the trust judgment accuracy through the comprehensive evaluation of the direct trust value and the indirect trust value.

Description

Method and system for calculating initialized safety state of power internet of things wireless terminal equipment based on mixed information entropy
Technical Field
The invention relates to the technical field of power wireless communication terminals, in particular to a method and a system for computing an initialization safety state of power internet of things wireless terminal equipment based on mixed information entropy.
Background
The power internet of things is an important driving part in the energy internet construction process, and the power internet of things is an advanced modern communication information technology such as big data, cloud computing, internet of things, mobile communication and the like, so that interconnection and intercommunication and man-machine interaction of various links such as 'sending, outputting, changing, matching, using and scheduling' of a power system are realized. A large number of terminal devices exist in the power internet of things, have functions of data acquisition, transmission, processing, storage and the like, are numerous and complex in variety, and even do not belong to the same subsystem sometimes. With the continuous development of the power internet of things, the security threat faced by the terminal equipment is increased day by day, and under certain conditions, a forged terminal or a damaged terminal can be converted into a legal terminal to invade the system through identity disguising and capturing a secret key, so that the usability and integrity of the system are damaged, and huge damage is brought to the power system.
In the aspect of network security of the Internet of things, internal attacks of the Internet of things are far more harmful than external attacks. Internal attacks are initiated by malicious or denial of service terminals in the network. In recent years, trust management is considered as one of effective protection mechanisms for ensuring network security, and is an effective way to defend against internal attacks. It evaluates the trust value of the terminal based on its historical behavior, and thus estimates its trustworthiness in performing a particular task. Although preliminary studies have been conducted, some disadvantages still exist, for example, researchers improve the accuracy of trust evaluation by improving trust management based on beta distribution and binomial distribution. However, both of them adopt subjective distribution trust factor, which can lead to inaccurate trust evaluation.
Disclosure of Invention
In order to solve the above problem, the present invention provides a method for calculating an initialized security state of an electric power internet of things wireless terminal device based on a mixed information entropy, which includes:
obtaining trust and index data of the electric wireless communication terminal, fitting a trust function according to an index distribution function, and determining a direct total trust value of the trust of the electric wireless communication terminal equipment;
collecting transaction record data of the electric wireless communication terminal and the public neighbor terminal, and determining an indirect total trust value trusted by the electric wireless communication terminal equipment according to the transaction record data;
the method comprises the steps of self-adaptively distributing weights of a direct total trust value and an indirect total trust value, determining a weight distribution value, correcting the weight distribution value according to an interactive information utility value of the electric power wireless communication terminal, and obtaining a distribution value of a corrected weight;
and performing secondary weight distribution on the direct total trust value and the indirect total trust value according to the corrected weight distribution value, and determining the equipment trust of the electric wireless communication terminal.
Optionally, determining a direct total trust value trusted by the power wireless communication terminal device includes:
the method comprises the steps of obtaining trust distribution and index distribution data in trust and index data of the electric power wireless communication terminal, fitting the trust distribution and index distribution data to obtain a trust degree and credibility model, and determining a cooperation probability function model between the terminals according to the trust degree and credibility model;
determining a credibility and credibility model of a credibility system node based on probability distribution according to a cooperative probability function model between terminals, and establishing a credibility and credibility evaluation system model according to the credibility model and the credibility model based on probability distribution;
and determining a direct total trust value of the trust of the electric wireless communication terminal equipment according to the trust and reputation evaluation system model.
Optionally, the transaction record data includes successful transaction record data and failed transaction record data.
Optionally, the interaction data between the terminals of the cooperative probability function model between the terminals is maintained/+ m times.
Optionally, the function in the cooperative probability function model between the terminals is a monotonically decreasing function.
The invention also provides a system for calculating the initialized safe state of the electric power internet of things wireless terminal equipment based on the mixed information entropy, which comprises the following steps:
the direct trust value acquisition module is used for acquiring trust and index data of the electric wireless communication terminal and determining a direct total trust value trusted by the electric wireless communication terminal equipment according to the trust and index data;
the indirect trust value acquisition module is used for acquiring transaction record data of the electric wireless communication terminal and the public neighbor terminal and determining an indirect total trust value trusted by the electric wireless communication terminal equipment according to the transaction record data;
the weight distribution module is used for adaptively distributing weights of the direct total trust value and the indirect total trust value, determining a weight distribution value, and correcting the weight distribution value according to the interactive information utility value of the power wireless communication terminal to obtain a distribution value of corrected weights;
and the equipment trust acquisition module is used for performing secondary weight distribution on the direct total trust value and the indirect total trust value according to the corrected weight distribution value to determine the equipment trust of the electric wireless communication terminal.
Optionally, determining a direct total trust value trusted by the power wireless communication terminal device includes:
the method comprises the steps of obtaining trust distribution and index distribution data in trust and index data of the electric power wireless communication terminal, fitting the trust distribution and index distribution data to obtain a trust degree and credibility model, and determining a cooperation probability function model between the terminals according to the trust degree and credibility model;
determining a credibility and credibility model of a credibility system node based on probability distribution according to a cooperative probability function model between terminals, and establishing a credibility and credibility evaluation system model according to the credibility model and the credibility model based on probability distribution;
and determining a direct total trust value of the trust of the electric wireless communication terminal equipment according to the trust and reputation evaluation system model.
Optionally, the transaction record data includes successful transaction record data and failed transaction record data.
Optionally, the interaction data between the terminals of the cooperative probability function model between the terminals is maintained/+ m times.
Optionally, the function in the cooperative probability function model between the terminals is a monotonically decreasing function.
Aiming at the trust problem of the power wireless private network communication terminal, the invention firstly determines a direct trust value, introduces an indirect trust value to make up the problem of inaccurate direct trust judgment, and improves the trust judgment accuracy through the comprehensive evaluation of the direct trust value and the indirect trust value.
Drawings
FIG. 1 is a flowchart of an initialization safety state calculation method of an electric power internet of things wireless terminal device based on mixed information entropy according to the present invention;
FIG. 2 is a diagram of a wireless private network telecommunication architecture of an electrical information collection system according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating indirect trust establishment paths for a terminal according to an embodiment of the present invention;
FIG. 4 is a diagram of terminal trust evaluation under selective forwarding attack in an embodiment of the present invention;
FIG. 5 is a diagram of terminal trust evaluation under switch attack in the embodiment of the present invention;
FIG. 6 is a diagram illustrating a terminal trust evaluation under assassassassault by defamation according to an embodiment of the present invention;
FIG. 7 is a diagram illustrating a terminal trust evaluation under assassassassault by defamation according to an embodiment of the present invention;
fig. 8 is a structural diagram of an initialization safety state calculation system of an electric power internet of things wireless terminal device based on mixed information entropy according to the present invention.
Detailed Description
The exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the embodiments described herein, which are provided for complete and complete disclosure of the present invention and to fully convey the scope of the present invention to those skilled in the art. The terminology used in the exemplary embodiments illustrated in the accompanying drawings is not intended to be limiting of the invention. In the drawings, the same units/elements are denoted by the same reference numerals.
Unless otherwise defined, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Further, it will be understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
The invention provides a method for calculating an initialized safety state of electric power internet of things wireless terminal equipment based on mixed information entropy, which comprises the following steps of:
obtaining trust and index data of the electric wireless communication terminal, and determining a direct total trust value of trust of the electric wireless communication terminal equipment according to the trust and index data;
collecting transaction record data of the electric wireless communication terminal and the public neighbor terminal, and determining an indirect total trust value trusted by the electric wireless communication terminal equipment according to the transaction record data;
the method comprises the steps of self-adaptively distributing weights of a direct total trust value and an indirect total trust value, determining a weight distribution value, correcting the weight distribution value according to an interactive information utility value of the electric power wireless communication terminal, and obtaining a distribution value of a corrected weight;
and performing secondary weight distribution on the direct total trust value and the indirect total trust value according to the corrected weight distribution value, and determining the equipment trust of the electric wireless communication terminal.
Wherein, the direct total trust value of the trust of the electric wireless communication terminal equipment is determined, which comprises the following steps:
the method comprises the steps of obtaining trust distribution and index distribution data in trust and index data of the electric power wireless communication terminal, fitting the trust distribution and index distribution data to obtain a trust degree and credibility model, and determining a cooperation probability function model between the terminals according to the trust degree and credibility model;
determining a credibility and credibility model of a credibility system node based on probability distribution according to a cooperative probability function model between terminals, and establishing a credibility and credibility evaluation system model according to the credibility model and the credibility model based on probability distribution;
and determining a direct total trust value of the trust of the electric wireless communication terminal equipment according to the trust and reputation evaluation system model.
The transaction record data comprises successful transaction record data and failed transaction record data.
And the interactive data between the terminals of the cooperative probability function model between the terminals is kept for l + m times.
The function in the cooperative probability function model between the terminals is a monotone decreasing function.
The invention is further illustrated by the following examples:
the method comprises the steps of obtaining trust and index data of the electric wireless communication terminal, and determining a direct total trust value of trust of electric wireless communication terminal equipment according to the trust and index data, wherein the direct total trust value comprises the following steps:
firstly, a power wireless communication terminal trust model is established, and the architecture of the wireless communication terminal is as shown in fig. 2, that is, a cooperation probability function model between terminals includes:
fitting according to the trust distribution and the exponential distribution of the power wireless communication terminal to obtain an expression of the trust degree and the credibility of the terminal, setting the interaction between the terminals to be kept for (l + m) times, and obtaining a cooperative probability function modeling between the terminals, wherein the model is as follows:
Figure BDA0002689224040000061
according to the above-mentioned cooperation probability modeling between the terminals, it represents the reputation R of the terminal j held by the terminal iijWhere,/represents the number of successful interactions, and m represents the number of failed interactions, the formula is as follows:
Figure BDA0002689224040000062
f (p) is a probability distribution function of the reputation p, the maximum probability of the reputation p being represented by the maximum value of the function, which is defined as the trust value of the terminal, where f' (p benefits the derivative of f (p), TijRepresenting a trust value for terminal i to hold terminal jThe formula is as follows:
Figure BDA0002689224040000063
Figure BDA0002689224040000064
Figure BDA0002689224040000065
it turns out that trust still converges no matter how the number of malicious terminals increases, the formula is as follows:
Figure BDA0002689224040000066
Figure BDA0002689224040000067
the trust function is bounded, and T' ij is less than 0 for verifying monotonicity of the function, which indicates that the function is strictly monotonously decreased, and the trust function still converges no matter how the number of malicious terminals increases according to the theorem of monotonous convergence.
Secondly, establishing a trust and reputation evaluation system model, comprising:
the expression of the terminal credibility and the credibility based on the exponential distribution is obtained through the electric power wireless communication terminal trust model, and then a trust and credibility system is established to realize trust evaluation, and the establishment of the electric power wireless communication terminal direct trust evaluation model comprises the following steps:
direct trust calculation, the formula is as follows:
Figure BDA0002689224040000068
wherein D isijIndicates terminal j to terminal ji direct trust rating value.
Dividing N times of terminal interaction data records recorded by a sliding window of a trust calculation formula into N time slots, numbering each time slot in sequence, and introducing a forgetting factor ut to measure the influence degree of malicious behaviors
Figure BDA0002689224040000069
And calculating the successful interaction number at the end of the time slot, wherein the formula is as follows:
Figure BDA0002689224040000071
the number of failed interactions, the formula is as follows:
Figure BDA0002689224040000072
and further obtaining an updated trust value, wherein the formula is as follows:
Figure BDA0002689224040000073
direct trust determination, let H (D)ij) Is the entropy of the direct observation, thr is the threshold of uncertainty, when thr ≦ H (D)ij) When the value is less than or equal to 1, the terminal evaluation needs more related information, indirect trust is introduced, and when H (D) is usedij) < thr, the total trust of terminal j can simply be set to the direct trust value, i.e. the total trust OTij=Dij
Collecting transaction record data of the electric wireless communication terminal and the public neighbor terminal, determining an indirect total trust value of trust of the electric wireless communication terminal device according to the transaction record data, and establishing an indirect trust link as shown in fig. 3 specifically as follows:
let the successful interaction records observed by the public neighbor terminals as follows:
Figure BDA0002689224040000074
the failure interaction observed by the public neighbor terminal is recorded as follows:
Figure BDA0002689224040000075
the recommendations provided by the common neighbor terminal k are as follows:
Figure BDA0002689224040000076
the trust level of the terminal i for the recommender k is expressed as:
Figure BDA0002689224040000077
setting r intermediate terminals, and marking the trust value held by the terminal i as Ti1、…、Ti(r-1)、Tir
If T isikAnd x, the suggestion of the terminal k is used, otherwise, the suggestion is ignored.
Where x (0 ≦ x ≦ 1) is a custom threshold, k ≦ 1, 2 … r.
Weights are assigned according to the recommender's confidence level, as follows:
Figure BDA0002689224040000078
the indirect trust is then:
Figure BDA0002689224040000079
the method comprises the steps of self-adaptively distributing weights of a direct total trust value and an indirect total trust value, determining a weight distribution value, correcting the weight distribution value according to an interactive information utility value of the electric power wireless communication terminal, and obtaining a distribution value of a corrected weight;
in order to avoid subjective direct weight distribution, the weight self-adaptive distribution of direct trust and indirect trust is carried out on a terminal trust value based on the information entropy, and the utility value of interactive information provided by the terminal is utilized to realize the correction of the weight distribution value, the specific steps are as follows:
computing a direct trust information entropy value H (D)ij)=-Dijlog2Dij-(1-Dij)log2(1-Dij)。
Computing an indirect trust information entropy value H (ID)ij)=-IDijlog2IDij-(1-IDij)log2(1-IDij)。
Weighting direct trust
Figure BDA0002689224040000081
Weighting indirect trust
Figure BDA0002689224040000082
The aggregate trust is computed according to a direct trust decision method, as follows:
Figure BDA0002689224040000083
wherein, OTijIndicating terminal aggregate trust.
And performing secondary weight distribution on the direct total trust value and the indirect total trust value according to the corrected weight distribution value, and determining the equipment trust of the electric wireless communication terminal.
An internal attack scenario of the power wireless communication private network is set as follows, and the explanation is made by combining the attack scenario:
scenario 1 selective forwarding attack scenario setup: all terminals are set to be trusted terminals, information interaction can be achieved among the terminals, attack objects are selectively forwarded and set to be random numbers between [0.6 and 1.0], generation of malicious behaviors is simulated, the number of times of information interaction failure of the malicious terminals is increased along with the increase of an acquisition period, and therefore a trust value is rapidly reduced.
Scene 2 on-off attack scene setting: and setting the interaction periods of the first 20 terminals to be good in performance so as to establish good credit, introducing a small number of malicious terminals in the 20 th period, simulating switch attack, and removing attack behaviors after the 40 th period.
Scene 3 assassassassault scene setting: and setting the terminal j as an unreliable terminal, wherein one of the neighbor terminals between the terminal i and the terminal j is the unreliable terminal, and the rest neighbor terminals are reliable terminals.
Scene 4 collusion attack scene setting: under collusion attack, the malicious terminal can serve as a normal terminal to continue working, the terminal j is set to be unreliable and have unreliable neighbor terminals, and meanwhile, the malicious terminals are combined with respective interaction times.
The terminal equipment of the power internet of things is easily subjected to various security threats such as identity disguise, information stealing, data tampering and the like, a traditional security method cannot resist network internal attack from a damaged terminal, and a trust evaluation system is an effective mechanism for protecting the terminal of the power internet of things from the internal attack.
The present invention is implemented in view of the above-mentioned scenario, which includes 100 interactive communication terminals, including an intelligent electric meter, a charging pile metering device, a pole switch controller, and the like, distributed in a power supply area of 500 × 500m 2. Assuming that the communication capability of each terminal is the same, the communication radius is 50m, and the size of each data packet is 500 bits. In order to ensure the simplicity of network control, the number of neighbors of each terminal is set to be 2 or 3 in the logical connection.
The invention simulates the trust evaluation under different initial trust conditions by using the (l, m) set values of four different scenes, and compares the trust evaluation with the RFSN algorithm based on binomial trust management BTMS and Beta trust management.
As shown in fig. 4, the method of the present invention, BTMS, and RFSN are used to evaluate the trust of the terminal in scenario 1.
The solid line shows that the reliable terminal trust value is gradually improved along with the change of the acquisition period, and the dotted line shows that the malicious terminal trust value is gradually reduced along with the change of the acquisition period, as can be seen from fig. 4, the method and other two methods can distinguish the reliable terminal from the malicious terminal, but the convergence speed of the method is higher, and in the 50 th period, the reliable terminal trust value of the method is 0.9719, the BTMS reliable terminal trust value is 0.9516, and the RFSN reliable terminal trust value is 0.9276;
meanwhile, the method of the invention evaluates the trust value of the malicious terminal to be 0.027, the trust value of the BTMS malicious terminal to be 0.037 and the trust value of the RFSN reliable terminal to be 0.075.
The trust evaluation precision of the algorithm of the invention is improved by 2.13 percent and 4.78 percent respectively compared with BTMS and RFSN on the trust evaluation precision of the reliable terminal; the trust evaluation precision of the malicious terminal is respectively improved by 27.03% and 64.00% compared with that of BTMS and RFSN.
As shown in fig. 5, the situation of the change of the trust value of the switch attack resistance by the method of the present invention, BTMS, and RFSN in scene 2 is shown.
As can be seen from FIG. 5, the trust values of the three methods are all significantly reduced when the switch attack occurs, and slowly rise after the switch attack is finished, but the rate of the decrease of the trust value of the method is much higher than that of RFSN and BTMS, which indicates that the terminal can rapidly lose trust in a short time by only a small amount of bad actions, and indicates that the algorithm can more sensitively detect the malicious attack, and in the 40 th cycle, the terminal trust value of the method is 0.1099, the terminal trust value of BTMS is 0.2698, and the terminal trust value of RFSN is 0.3069.
As shown in fig. 6, the situation that the attack trust value change initiated by the unreliable terminal is resisted by the three methods of the invention, BTMS and RFSN in scene 3 is shown.
As can be seen from fig. 6, when an attack is initiated by an unreliable terminal, the terminal trust values of the three methods are gradually reduced, but the rate of decrease of the trust value of the method of the present invention is faster than that of RFSN and BTMS, which indicates that the method of the present invention has better response performance when resisting the attack initiated by the unreliable terminal, and in the 50 th cycle, the malicious terminal trust value of the method of the present invention is 0.1938, the malicious terminal trust value of BTMS is 0.0880, and the malicious terminal trust value of RFSN is 0.0765.
As shown in fig. 7, the situation that the trust value changes in the collusion attack resistance method, BTMS, and RFSN of the present invention in scene 4 is shown.
As can be seen from fig. 7, the terminal trust value of the method of the present invention is gradually reduced when collusion attack occurs, but the terminal trust values of RFSN and BTMS are gradually increased along with the occurrence of collusion attack. This shows that the method of the present invention can effectively resist collusion attack, while the performance of RFSN and BTMS for resisting collusion attack is poor. In the 30 th period, the trust value of the malicious terminal of the method is 0.2535, the trust value of the malicious terminal of the BTMS is 0.8267, and the trust value of the malicious terminal of the RFSN is 08484.
The power wireless private network communication system composed of the electricity consumption information acquisition terminal equipment, the 230 communication terminal, the communication base station, the core network and the service master station is taken as an example.
A large number of remote communication terminals exist in the electricity utilization information collection wireless communication private network, and the large number of terminals are widely deployed in a low-trust environment and are vulnerable to assarage, switching, defamation, denial of service and the like initiated by malicious terminals or denial of service terminals in the network. In the trust evaluation process, the method is applied to carry out trust evaluation on the remote communication terminal in the electricity consumption information acquisition wireless communication system, and mainly comprises the steps of determining the successful interaction times between the terminals according to the communication time and the data volume between the remote terminals, immediately judging the direct trust of the terminals according to the interaction information between the terminals, introducing the indirect observation entropy of the terminals when the observation entropy of the direct trust value is larger than the set uncertain entropy, realizing the indirect trust evaluation on the target terminal by introducing a neighbor terminal evaluation mechanism, finally carrying out entropy calculation on the direct trust and the indirect trust, and realizing the correction of the weight distribution value by using the utility value of the interaction information provided by the terminals so as to obtain the aggregate trust value of the electricity consumption information acquisition remote communication terminals. In the trust system verification, four attack modes of selective attack, on-off attack, slur attack and collusion attack are carried out on a 230 communication terminal in the electricity utilization information acquisition wireless communication remote terminal equipment.
The invention further provides an initialization safety state computing system 200 of an electric power internet of things wireless terminal device based on mixed information entropy, as shown in fig. 8, including:
the direct trust value acquisition module 201 is used for acquiring trust and index data of the electric wireless communication terminal and determining a direct total trust value trusted by the electric wireless communication terminal equipment according to the trust and index data;
the indirect trust value acquisition module 202 is used for acquiring transaction record data of the electric wireless communication terminal and the public neighbor terminal, and determining an indirect total trust value trusted by the electric wireless communication terminal equipment according to the transaction record data;
the weight distribution module 203 is used for adaptively distributing the weights of the direct total trust value and the indirect total trust value, determining a weight distribution value, and correcting the weight distribution value according to the utility value of the interactive information of the power wireless communication terminal to obtain a distribution value of the corrected weight;
and the device trust obtaining module 203 performs secondary weight distribution on the direct total trust value and the indirect total trust value according to the corrected weight distribution value, and determines the device trust of the electric wireless communication terminal.
Wherein, the direct total trust value of the trust of the electric wireless communication terminal equipment is determined, which comprises the following steps:
the method comprises the steps of obtaining trust distribution and index distribution data in trust and index data of the electric power wireless communication terminal, fitting the trust distribution and index distribution data to obtain a trust degree and credibility model, and determining a cooperation probability function model between the terminals according to the trust degree and credibility model;
determining a credibility and credibility model of a credibility system node based on probability distribution according to a cooperative probability function model between terminals, and establishing a credibility and credibility evaluation system model according to the credibility model and the credibility model based on probability distribution;
and determining a direct total trust value of the trust of the electric wireless communication terminal equipment according to the trust and reputation evaluation system model.
The transaction record data includes successful transaction record data and failed transaction record data.
And (3) keeping the interactive data between the terminals of the cooperative probability function model between the terminals for l + m times.
The function in the cooperative probability function model between the terminals is a monotonically decreasing function.
Aiming at the trust problem of the power wireless private network communication terminal, the invention firstly determines a direct trust value, introduces an indirect trust value to make up the problem of inaccurate direct trust judgment, and improves the trust judgment accuracy through the comprehensive evaluation of the direct trust value and the indirect trust value.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein. The scheme in the embodiment of the application can be implemented by adopting various computer languages, such as object-oriented programming language Java and transliterated scripting language JavaScript.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. A method for evaluating trust of a power wireless communication terminal device, the method comprising:
obtaining trust and index data of the electric wireless communication terminal, and determining a direct total trust value of trust of the electric wireless communication terminal equipment according to the trust and index data;
collecting transaction record data of the electric wireless communication terminal and the public neighbor terminal, and determining an indirect total trust value trusted by the electric wireless communication terminal equipment according to the transaction record data;
the method comprises the steps of self-adaptively distributing weights of a direct total trust value and an indirect total trust value, determining a weight distribution value, correcting the weight distribution value according to an interactive information utility value of the electric power wireless communication terminal, and obtaining a distribution value of a corrected weight;
and performing secondary weight distribution on the direct total trust value and the indirect total trust value according to the corrected weight distribution value, and determining the equipment trust of the electric wireless communication terminal.
2. The method of claim 1, the determining a direct overall trust value trusted by the power wireless communication terminal device, comprising:
the method comprises the steps of obtaining trust distribution and index distribution data in trust and index data of the electric power wireless communication terminal, fitting the trust distribution and index distribution data to obtain a trust degree and credibility model, and determining a cooperation probability function model between the terminals according to the trust degree and credibility model;
determining a credibility and credibility model of a credibility system node based on probability distribution according to a cooperative probability function model between terminals, and establishing a credibility and credibility evaluation system model according to the credibility model and the credibility model based on probability distribution;
and determining a direct total trust value of the trust of the electric wireless communication terminal equipment according to the trust and reputation evaluation system model.
3. The method of claim 1, the transaction record data comprising successful transaction record data and failed transaction record data.
4. The method of claim 2, wherein the data of interaction between terminals of the inter-terminal cooperation probability function model is maintained/+ m times.
5. The method of claim 2, wherein the function in the model of the cooperative probability function between the terminals is a monotonically decreasing function.
6. A system for evaluating trust of a power wireless communication terminal device, the system comprising:
the direct trust value acquisition module is used for acquiring trust and index data of the electric wireless communication terminal and determining a direct total trust value trusted by the electric wireless communication terminal equipment according to the trust and index data;
the indirect trust value acquisition module is used for acquiring transaction record data of the electric wireless communication terminal and the public neighbor terminal and determining an indirect total trust value trusted by the electric wireless communication terminal equipment according to the transaction record data;
the weight distribution module is used for adaptively distributing weights of the direct total trust value and the indirect total trust value, determining a weight distribution value, and correcting the weight distribution value according to the interactive information utility value of the power wireless communication terminal to obtain a distribution value of corrected weights;
and the equipment trust acquisition module is used for performing secondary weight distribution on the direct total trust value and the indirect total trust value according to the corrected weight distribution value to determine the equipment trust of the electric wireless communication terminal.
7. The system of claim 6, said determining a direct overall trust value trusted by the power wireless communication terminal device comprising:
the method comprises the steps of obtaining trust distribution and index distribution data in trust and index data of the electric power wireless communication terminal, fitting the trust distribution and index distribution data to obtain a trust degree and credibility model, and determining a cooperation probability function model between the terminals according to the trust degree and credibility model;
determining a credibility and credibility model of a credibility system node based on probability distribution according to a cooperative probability function model between terminals, and establishing a credibility and credibility evaluation system model according to the credibility model and the credibility model based on probability distribution;
and determining a direct total trust value of the trust of the electric wireless communication terminal equipment according to the trust and reputation evaluation system model.
8. The system of claim 6, the transaction record data comprising successful transaction record data and failed transaction record data.
9. The system of claim 7, wherein the data of the interaction between the terminals of the inter-terminal cooperation probability function model is maintained for I + m times.
10. The system of claim 7, wherein the function in the model of the cooperative probability function between the terminals is a monotonically decreasing function.
CN202010991544.4A 2020-09-18 2020-09-18 Method and system for calculating initialized safety state of power internet of things wireless terminal equipment based on mixed information entropy Pending CN112437407A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010991544.4A CN112437407A (en) 2020-09-18 2020-09-18 Method and system for calculating initialized safety state of power internet of things wireless terminal equipment based on mixed information entropy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010991544.4A CN112437407A (en) 2020-09-18 2020-09-18 Method and system for calculating initialized safety state of power internet of things wireless terminal equipment based on mixed information entropy

Publications (1)

Publication Number Publication Date
CN112437407A true CN112437407A (en) 2021-03-02

Family

ID=74690680

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010991544.4A Pending CN112437407A (en) 2020-09-18 2020-09-18 Method and system for calculating initialized safety state of power internet of things wireless terminal equipment based on mixed information entropy

Country Status (1)

Country Link
CN (1) CN112437407A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114302400A (en) * 2021-10-25 2022-04-08 国网天津市电力公司 Electric power 5G wireless private network communication terminal trust evaluation method based on information entropy

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101835158A (en) * 2010-04-12 2010-09-15 北京航空航天大学 Sensor network trust evaluation method based on node behaviors and D-S evidence theory
CN102045707A (en) * 2010-12-28 2011-05-04 华中科技大学 Trust construction method for accelerating trust convergence
CN102333307A (en) * 2011-09-28 2012-01-25 北京航空航天大学 Wireless sensor network (WSN) trust evaluation method based on subjective belief
US20130173616A1 (en) * 2011-07-08 2013-07-04 Georgia Tech Research Corporation Systems and methods for providing reputation management
CN103297956A (en) * 2013-05-06 2013-09-11 北京航空航天大学 Dynamic lightweight class trust evaluation method based on Bayesian theory and entropy theory
CN104836801A (en) * 2015-04-22 2015-08-12 上海物联网有限公司 Binomial-based wireless sensor network trust management method
CN107750053A (en) * 2017-05-25 2018-03-02 天津大学 Based on multifactor wireless sensor network dynamic trust evaluation system and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101835158A (en) * 2010-04-12 2010-09-15 北京航空航天大学 Sensor network trust evaluation method based on node behaviors and D-S evidence theory
CN102045707A (en) * 2010-12-28 2011-05-04 华中科技大学 Trust construction method for accelerating trust convergence
US20130173616A1 (en) * 2011-07-08 2013-07-04 Georgia Tech Research Corporation Systems and methods for providing reputation management
CN102333307A (en) * 2011-09-28 2012-01-25 北京航空航天大学 Wireless sensor network (WSN) trust evaluation method based on subjective belief
CN103297956A (en) * 2013-05-06 2013-09-11 北京航空航天大学 Dynamic lightweight class trust evaluation method based on Bayesian theory and entropy theory
CN104836801A (en) * 2015-04-22 2015-08-12 上海物联网有限公司 Binomial-based wireless sensor network trust management method
CN107750053A (en) * 2017-05-25 2018-03-02 天津大学 Based on multifactor wireless sensor network dynamic trust evaluation system and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114302400A (en) * 2021-10-25 2022-04-08 国网天津市电力公司 Electric power 5G wireless private network communication terminal trust evaluation method based on information entropy

Similar Documents

Publication Publication Date Title
Liang et al. A secure fabric blockchain-based data transmission technique for industrial Internet-of-Things
CN103152345A (en) Network safety optimum attacking and defending decision method for attacking and defending game
CN112633649A (en) Power grid multi-attribute important node evaluation and planning method
WO2024051822A1 (en) Multi-terminal collaborative dynamic security analysis method and system for distributed power supply
CN112688315A (en) Attack and defense system and method based on electric vehicle power distribution network information physical system
CN103747003A (en) Peer-to-peer botnet core node detection method and detection device
CN112437407A (en) Method and system for calculating initialized safety state of power internet of things wireless terminal equipment based on mixed information entropy
CN113132398A (en) Array honeypot system defense strategy prediction method based on Q learning
Li Network Intrusion Detection Algorithm and Simulation of Complex System in Internet Environment
CN115208604B (en) AMI network intrusion detection method, device and medium
Li et al. A hybrid trust management framework for wireless sensor and actuator networks in cyber-physical systems
CN115953044A (en) Power grid state stability evaluation method based on federal learning and block chain technology
Guan et al. A Bayesian Improved Defense Model for Deceptive Attack in Honeypot-Enabled Networks
Li et al. A security defense model for ubiquitous electric internet of things based on game theory
Qian et al. Based on random game Petri net model CPS risk assessment and defense decision of distribution network
Sridharan et al. Game-theoretic approach to malicious controller detection in software defined networks
CN113806800A (en) Privacy protection method and system for improving communication efficiency and reasonably distributing rewards
Yu Fast Detection of Advanced Persistent Threats for Smart Grids: A Deep Reinforcement Learning Approach
Li et al. Research on risk prevention and control strategy of power grid CPS system based on intrusion tolerance
CN107995204A (en) Hadoop framework method for evaluating trust based on Bayes models
CN114124784B (en) Intelligent routing decision protection method and system based on vertical federation
CN112819300B (en) Power distribution network risk assessment method based on random game network under network attack
CN114302400A (en) Electric power 5G wireless private network communication terminal trust evaluation method based on information entropy
CN117556475A (en) Virtual power plant-oriented distributed multi-party trusted joint learning method
CN112819300A (en) Power distribution network risk assessment method based on random game network under network attack

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination