2022
DOI: 10.3390/s22134663
|View full text |Cite
|
Sign up to set email alerts
|

Security Risk Intelligent Assessment of Power Distribution Internet of Things via Entropy-Weight Method and Cloud Model

Abstract: The current power distribution Internet of Things (PDIoT) lacks security protection terminals and techniques. Network security has a large exposure surface that can be attacked from multiple paths. In addition, there are many network security vulnerabilities and weak security protection capabilities of power distribution Internet of Things terminals. Therefore, it is crucial to conduct a scientific assessment of the security of PDIoT. However, traditional security assessment methods are relatively subjective a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…The model considered the network's deterrence against threats, resilience against attacks, and ability to withstand shocks, and accurately measured the security effectiveness of the entire network and its context components. Cai et al [17] established a three-layer distribution Internet of Things (PDIoT) security evaluation index system and used the entropy weight method and cloud model theory to evaluate the security risks of PDIoT. Venkataramanan et al [18] proposed a model for detecting the resistance of microgrids to attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The model considered the network's deterrence against threats, resilience against attacks, and ability to withstand shocks, and accurately measured the security effectiveness of the entire network and its context components. Cai et al [17] established a three-layer distribution Internet of Things (PDIoT) security evaluation index system and used the entropy weight method and cloud model theory to evaluate the security risks of PDIoT. Venkataramanan et al [18] proposed a model for detecting the resistance of microgrids to attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The threat severity is determined by the attack probability within a time, as shown in (17). If the data in clause i is normal traffic, I i is marked with 0; otherwise, it is marked with 1; M represents the total network traffic within a time.…”
mentioning
confidence: 99%
“…By referring to the existing indicator system and combined with the existing index selection methods ( Feng-zhu et al, 2015 ; Cai et al, 2022 ), the network security situation can be divided into four first-class indexes from different angles, namely, the vulnerability index, threat index, reliability index, and availability index. Among these, the reliability and availability indexes can be subdivided into multiple second-class indexes.…”
Section: Construction Of Nssa Index Systemmentioning
confidence: 99%
“…Although FAHP has obvious advantages, this method still requires subjective judgment from experts, the scoring matrix may have logical errors or omissions, and there would be deviations from human thinking when checking the consistency of machine operations. At this time, A quantitative model presented in Section 3 was introduced to calculate partial risk factors in the FAHP model and optimize the indexes weight calculation, so as to reduce errors [24]. In order to obtain quantitative risk indicators scientifically and objectively, this paper proposed to establish risk failure probability data by means of lithium battery thermal runaway test and mine external cause fire simulation.…”
Section: Quantification Of Risk Indicatorsmentioning
confidence: 99%