[1] 赵武智, 邬小坤, 王宇恩, 等. 面向变电站安全隔离的一体化通信分析平台构建[J]. 电力系统保护与控制, 2020, 44(48): 123–129 ZHAO Wuzhi, WU Xiaokun, WANG Yuen, et al. Construction of integrated communication analysis platform for substation safety isolation[J]. Power System Protection and Control, 2020, 44(48): 123–129 [2] 李晓, 李满礼, 倪明. 配电信息物理系统分析与控制研究综述[J]. 中国电力, 2020, 53(1): 11–21 LI Xiao, LI Manli, NI Ming. A review of analysis and control of cyber physical distribution system[J]. Electric Power, 2020, 53(1): 11–21 [3] 刘宣, 唐悦, 卢继哲, 等. 基于概率预测的用电采集终端电量异常在线实时识别方法[J]. 电力系统保护与控制, 2021, 49(19): 99–106 LIU Xuan, TANG Yue, LU Jizhe, et al. Online real time anomaly recognition method for power consumption of electric energy data acquisition terminal based on probability prediction[J]. Power System Protection and Control, 2021, 49(19): 99–106 [4] 翁嘉明, 刘东, 安宇, 等. 馈线功率控制下的主动配电网信息物理风险演化分析[J]. 中国电力, 2021, 54(3): 13–22 WENG Jiaming, LIU Dong, AN Yu, et al. Cyber-physical risk evolution analysis of active distribution network under feeder control error[J]. Electric Power, 2021, 54(3): 13–22 [5] 李桐, 王刚, 刘扬, 等. 配电网智能终端信息安全风险分析[J]. 智慧电力, 2020, 48(9): 118–122 LI Tong, WANG Gang, LIU Yang, et al. Information security risk analysis of intelligent terminal in distribution network[J]. Smart Power, 2020, 48(9): 118–122 [6] 化存卿. 物联网安全检测与防护机制综述[J]. 上海交通大学学报, 2018, 52(10): 1307–1313 HUA Cunqing. A survey of security detection and protection for Internet of Things[J]. Journal of Shanghai Jiao Tong University, 2018, 52(10): 1307–1313 [7] 任彦冰, 李兴华, 刘海, 等. 基于区块链的分布式物联网信任管理方法研究[J]. 计算机研究与发展, 2018, 55(7): 1462–1478 REN Yanbing, LI Xinghua, LIU Hai, et al. Blockchain-based trust management framework for distributed Internet of Things[J]. Journal of Computer Research and Development, 2018, 55(7): 1462–1478 [8] FANG W D, ZHANG W X, YANG Y, et al. A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution[J]. Science China Information Sciences, 2017, 60(4): 1–11. [9] 房卫东, 张小珑, 石志东, 等. 基于二项分布的无线传感器网络信任管理系统[J]. 传感技术学报, 2015, 28(5): 703–708 FANG Weidong, ZHANG Xiaolong, SHI Zhidong, et al. Binomial-based trust management system in wireless sensor networks[J]. Chinese Journal of Sensors and Actuators, 2015, 28(5): 703–708 [10] 刘林, 祁兵, 李彬, 等. 面向电力物联网新业务的电力通信网需求及发展趋势[J]. 电网技术, 2020, 44(8): 3114–3130 LIU Lin, QI Bing, LI Bin, et al. Requirements and developing trends of electric power communication network for new services in electric Internet of Things[J]. Power System Technology, 2020, 44(8): 3114–3130 [11] ZHAO J, HUANG J F, XIONG N X. An effective exponential-based trust and reputation evaluation system in wireless sensor networks[J]. IEEE Access, 2019, 7: 33859–33869. [12] MA Wei, WANG Yudong, YANG Jinmei, et al. Security analysis and early warning research of power big data[J]. Smart Grid, 2018, 8(1): 1–7. [13] 何金栋, 王宇, 赵志超, 等. 智能变电站嵌入式终端的网络攻击类型研究及验证[J]. 中国电力, 2020, 53(1): 81–91 HE Jindong, WANG Yu, ZHAO Zhichao, et al. Type and verification of network attacks on embedded terminals of intelligent substation[J]. Electric Power, 2020, 53(1): 81–91 [14] YU Wenjie. The coordinated defense of power stability control system and communication system[J]. Smart Grid, 2017, 7(1): 28–36. [15] WU X L, HUANG J J, LING J, et al. BLTM: beta and LQI based trust model for wireless sensor networks[J]. IEEE Access, 2019, 7: 43679–43690. [16] ISHMANOV F, MALIK A S, KIM S W, et al. Trust management system in wireless sensor networks: design considerations and research challenges[J]. Transactions on Emerging Telecommunications Technologies, 2015, 26(2): 107–130. [17] VELUSAMY D, PUGALENDHI G, RAMASAMY K. A cross-layer trust evaluation protocol for secured routing in communication network of smart grid[J]. IEEE Journal on Selected Areas in Communications, 2020, 38(1): 193–204. [18] ZHANG P Y, KONG Y, ZHOU M C. A domain partition-based trust model for unreliable clouds[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(9): 2167–2178. [19] RANI R, KUMAR S, DOHARE U. Trust evaluation for light weight security in sensor enabled Internet of Things: game theory oriented approach[J]. IEEE Internet of Things Journal, 2019, 6(5): 8421–8432. [20] TRUONG N B, LEE G M, UM T W, et al. Trust evaluation mechanism for user recruitment in mobile crowd-sensing in the Internet of Things[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(10): 2705–2719. [21] WANG T, LUO H, JIA W J, et al. MTES: an intelligent trust evaluation scheme in sensor-cloud-enabled industrial Internet of Things[J]. IEEE Transactions on Industrial Informatics, 2020, 16(3): 2054–2062. [22] 吴昊, 朱自伟. 基于熵权-层次分析法综合指标的电网关键线路辨识[J]. 中国电力, 2020, 53(5): 39–47, 55 WU Hao, ZHU Ziwei. Key lines identification in power grid based on comprehensive index calculated by the entropy weight-analytical hierarchy process[J]. Electric Power, 2020, 53(5): 39–47, 55 [23] SUN Y L, YU W, HAN Z, et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 305–317.
|