中国电力 ›› 2022, Vol. 55 ›› Issue (5): 158-165.DOI: 10.11930/j.issn.1004-9649.202006211

• 信息与通信 • 上一篇    下一篇

基于信息熵的多源电力物联终端设备信任度评价方法

翟峰1, 冯云1, 程凯2, 蔡绍堂3, 于丽莹3, 杨挺3   

  1. 1. 中国电力科学研究院有限公司,北京 100192;
    2. 国网河北省电力有限公司,河北 石家庄 050021;
    3. 天津大学 电气自动化与信息工程学院,天津 300072
  • 收稿日期:2020-06-23 修回日期:2021-09-20 出版日期:2022-05-28 发布日期:2022-05-18
  • 作者简介:翟峰 (1979—),男,硕士,高级工程师,从事电力密码应用相关研究,E-mail:zhaifeng@epri.sgcc.com.cn;蔡绍堂(1992—),男,通信作者,博士研究生,从事电力信息物理系统安全防护相关研究,E-mail:caishaotang1992@tju.edu.cn;杨挺(1979—),男,教授,博士生导师,从事电力信息物理系统相关研究,E-mail:yangting@tju.edu.cn
  • 基金资助:
    国家电网有限公司科技项目(泛在电力物联网端到端安全威胁分析及精准防护技术研究,5700-201958466A-0-0-00)

Information Entropy Based Multi-Source Power IoT Terminal Equipment Trust Degree Evaluation Method

ZHAI Feng1, FENG Yun1, CHENG Kai2, CAI Shaotang3, YU Liying3, YANG Ting3   

  1. 1. China Electric Power Research Institute, Beijing 100192, China;
    2. State Grid Hebei Electric Power Co., Ltd., Shijiazhuang 050021, China;
    3. School of Electrical and Information Engineering, Tianjin University, Tianjin 300072, China
  • Received:2020-06-23 Revised:2021-09-20 Online:2022-05-28 Published:2022-05-18
  • Supported by:
    This work is supported by Science and Technology Project of SGCC(End-to-End Security Threat Analysis and Accurate Protection Technology of Ubiquitous Power Internet of Things, No.5700–201958466A-0-0-00)

摘要: 电力物联网终端设备容易受到身份伪装、信息窃取、数据篡改等多种安全威胁,传统的安全方法无法抵御来自受损终端的网络内部攻击,信任评价体系是保护电力物联网终端免受内部攻击的有效机制。针对电力无线专网通信终端信任问题,提出一种基于信息熵的信任评价方法。首先通过基于指数分布的信誉度的模型估算直接信任值,然后采用滑窗与遗忘因子对直接信任值进行更新,根据熵理论度量直接信任值的不确定性,引入间接信任弥补直接信任判定不准确问题,通过两者综合评价提升判定准确性。实验仿真表明,该方法可有效抵御开关攻击与共谋攻击,同时,提出的方法较二项式的信任管理以及基于beta分布的信任评价能更好地评估恶意终端与正常终端。

关键词: 电力物联网, 指数分布, 信息熵, 网络攻击, 信任评价

Abstract: Power Internet of things terminal (IoT) equipment is vulnerable to identity camouflage, information theft, data tampering and other security threats. Traditional security methods can not resist the network internal attacks from damaged terminals. Trust evaluation system is an effective mechanism to protect power IoT terminals from internal attacks. A trust evaluation method is proposed based on information entropy for power wireless private network communication terminals. Firstly, the direct trust value is estimated by the credibility model based on exponential distribution, and then the sliding window and forgetting factor are used to update the direct trust value. According to the entropy theory, the uncertainty of direct trust value is measured, and the indirect trust value is introduced to make up for the inaccuracy of direct trust judgment, and the judgment accuracy is improved through comprehensive evaluation of both. Simulation results show that the proposed method can effectively resist switch attacks and collusion attacks, and compared to the binomial trust management method and beta distribution based trust evaluation method, it can better evaluate malicious terminals and normal terminals.

Key words: power internet of things, exponential distribution, information entropy, cyber attack, trust evaluation