Electric Power ›› 2022, Vol. 55 ›› Issue (5): 158-165.DOI: 10.11930/j.issn.1004-9649.202006211
• Information and Communication • Previous Articles Next Articles
ZHAI Feng1, FENG Yun1, CHENG Kai2, CAI Shaotang3, YU Liying3, YANG Ting3
Received:
2020-06-23
Revised:
2021-09-20
Online:
2022-05-28
Published:
2022-05-18
Supported by:
ZHAI Feng, FENG Yun, CHENG Kai, CAI Shaotang, YU Liying, YANG Ting. Information Entropy Based Multi-Source Power IoT Terminal Equipment Trust Degree Evaluation Method[J]. Electric Power, 2022, 55(5): 158-165.
[1] 赵武智, 邬小坤, 王宇恩, 等. 面向变电站安全隔离的一体化通信分析平台构建[J]. 电力系统保护与控制, 2020, 44(48): 123–129 ZHAO Wuzhi, WU Xiaokun, WANG Yuen, et al. Construction of integrated communication analysis platform for substation safety isolation[J]. Power System Protection and Control, 2020, 44(48): 123–129 [2] 李晓, 李满礼, 倪明. 配电信息物理系统分析与控制研究综述[J]. 中国电力, 2020, 53(1): 11–21 LI Xiao, LI Manli, NI Ming. A review of analysis and control of cyber physical distribution system[J]. Electric Power, 2020, 53(1): 11–21 [3] 刘宣, 唐悦, 卢继哲, 等. 基于概率预测的用电采集终端电量异常在线实时识别方法[J]. 电力系统保护与控制, 2021, 49(19): 99–106 LIU Xuan, TANG Yue, LU Jizhe, et al. Online real time anomaly recognition method for power consumption of electric energy data acquisition terminal based on probability prediction[J]. Power System Protection and Control, 2021, 49(19): 99–106 [4] 翁嘉明, 刘东, 安宇, 等. 馈线功率控制下的主动配电网信息物理风险演化分析[J]. 中国电力, 2021, 54(3): 13–22 WENG Jiaming, LIU Dong, AN Yu, et al. Cyber-physical risk evolution analysis of active distribution network under feeder control error[J]. Electric Power, 2021, 54(3): 13–22 [5] 李桐, 王刚, 刘扬, 等. 配电网智能终端信息安全风险分析[J]. 智慧电力, 2020, 48(9): 118–122 LI Tong, WANG Gang, LIU Yang, et al. Information security risk analysis of intelligent terminal in distribution network[J]. Smart Power, 2020, 48(9): 118–122 [6] 化存卿. 物联网安全检测与防护机制综述[J]. 上海交通大学学报, 2018, 52(10): 1307–1313 HUA Cunqing. A survey of security detection and protection for Internet of Things[J]. Journal of Shanghai Jiao Tong University, 2018, 52(10): 1307–1313 [7] 任彦冰, 李兴华, 刘海, 等. 基于区块链的分布式物联网信任管理方法研究[J]. 计算机研究与发展, 2018, 55(7): 1462–1478 REN Yanbing, LI Xinghua, LIU Hai, et al. Blockchain-based trust management framework for distributed Internet of Things[J]. Journal of Computer Research and Development, 2018, 55(7): 1462–1478 [8] FANG W D, ZHANG W X, YANG Y, et al. A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution[J]. Science China Information Sciences, 2017, 60(4): 1–11. [9] 房卫东, 张小珑, 石志东, 等. 基于二项分布的无线传感器网络信任管理系统[J]. 传感技术学报, 2015, 28(5): 703–708 FANG Weidong, ZHANG Xiaolong, SHI Zhidong, et al. Binomial-based trust management system in wireless sensor networks[J]. Chinese Journal of Sensors and Actuators, 2015, 28(5): 703–708 [10] 刘林, 祁兵, 李彬, 等. 面向电力物联网新业务的电力通信网需求及发展趋势[J]. 电网技术, 2020, 44(8): 3114–3130 LIU Lin, QI Bing, LI Bin, et al. Requirements and developing trends of electric power communication network for new services in electric Internet of Things[J]. Power System Technology, 2020, 44(8): 3114–3130 [11] ZHAO J, HUANG J F, XIONG N X. An effective exponential-based trust and reputation evaluation system in wireless sensor networks[J]. IEEE Access, 2019, 7: 33859–33869. [12] MA Wei, WANG Yudong, YANG Jinmei, et al. Security analysis and early warning research of power big data[J]. Smart Grid, 2018, 8(1): 1–7. [13] 何金栋, 王宇, 赵志超, 等. 智能变电站嵌入式终端的网络攻击类型研究及验证[J]. 中国电力, 2020, 53(1): 81–91 HE Jindong, WANG Yu, ZHAO Zhichao, et al. Type and verification of network attacks on embedded terminals of intelligent substation[J]. Electric Power, 2020, 53(1): 81–91 [14] YU Wenjie. The coordinated defense of power stability control system and communication system[J]. Smart Grid, 2017, 7(1): 28–36. [15] WU X L, HUANG J J, LING J, et al. BLTM: beta and LQI based trust model for wireless sensor networks[J]. IEEE Access, 2019, 7: 43679–43690. [16] ISHMANOV F, MALIK A S, KIM S W, et al. Trust management system in wireless sensor networks: design considerations and research challenges[J]. Transactions on Emerging Telecommunications Technologies, 2015, 26(2): 107–130. [17] VELUSAMY D, PUGALENDHI G, RAMASAMY K. A cross-layer trust evaluation protocol for secured routing in communication network of smart grid[J]. IEEE Journal on Selected Areas in Communications, 2020, 38(1): 193–204. [18] ZHANG P Y, KONG Y, ZHOU M C. A domain partition-based trust model for unreliable clouds[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(9): 2167–2178. [19] RANI R, KUMAR S, DOHARE U. Trust evaluation for light weight security in sensor enabled Internet of Things: game theory oriented approach[J]. IEEE Internet of Things Journal, 2019, 6(5): 8421–8432. [20] TRUONG N B, LEE G M, UM T W, et al. Trust evaluation mechanism for user recruitment in mobile crowd-sensing in the Internet of Things[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(10): 2705–2719. [21] WANG T, LUO H, JIA W J, et al. MTES: an intelligent trust evaluation scheme in sensor-cloud-enabled industrial Internet of Things[J]. IEEE Transactions on Industrial Informatics, 2020, 16(3): 2054–2062. [22] 吴昊, 朱自伟. 基于熵权-层次分析法综合指标的电网关键线路辨识[J]. 中国电力, 2020, 53(5): 39–47, 55 WU Hao, ZHU Ziwei. Key lines identification in power grid based on comprehensive index calculated by the entropy weight-analytical hierarchy process[J]. Electric Power, 2020, 53(5): 39–47, 55 [23] SUN Y L, YU W, HAN Z, et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 305–317. |
[1] | ZHAO Baohua, WANG Zhihao, CHEN Liandong, REN Chunhui, YU Fajiang, XU Qing. A Trusted Batch Authentication Mechanism Based on Tree for Power Internet of Things [J]. Electric Power, 2022, 55(5): 149-157. |
[2] | YAO Pengchao, YAN Bingjing, Hao Weijie, YANG Qiang. An Intrusion Tolerance Assessment Method for Cyber-Physical Power System [J]. Electric Power, 2022, 55(4): 13-22. |
[3] | XIE Jingdong, LU Chixin, LU Siwei, SUN Bo, HUANG Xiying, SUN Xin. Electricity Market Risk Evaluation Based on Order Relation-Entropy Weight Method [J]. Electric Power, 2021, 54(6): 71-78. |
[4] | SHE Rui, ZHANG Ningchi, WANG Yanru, GUO Dandan, MA Wenjie, LIU Hui, ZHANG Jie. Research on Cognitive Radio Non-orthogonal Multiple Access System in 5G Communications Oriented to Ubiquitous Power Internet of Things [J]. Electric Power, 2021, 54(5): 35-45. |
[5] | WENG Jiaming, LIU Dong, AN Yu, YIN Haoyang, HUANG Zhi, QIN Han. Cyber-Physical Risk Evolution Analysis of Active Distribution Network under Feeder Control Error [J]. Electric Power, 2021, 54(3): 13-22. |
[6] | LIN Jieyu, CUI Weiping. Power-Data-Asset Trading Platform Architecture Based on Double-chained Blockchain [J]. Electric Power, 2021, 54(11): 164-170,180. |
[7] | HU Yuan, XUE Song, ZHANG Han, ZHANG Hua, FENG Xinxin, TANG Chenghui, LIN Yi, ZHENG Peng. Cause Analysis and Enlightenment of Global Blackouts in the Past 30 Years [J]. Electric Power, 2021, 54(10): 204-210. |
[8] | WANG Yufei, QIU Jian, LI June. A Station Level Early Warning Method of Cascading Failures Across Space Based on Attack Gain and Cost Principle in GCPS [J]. Electric Power, 2020, 53(1): 92-99. |
[9] | WANG Zhe, ZHAO Hongda, ZHU Mingxia, ZHOU Xia, XIE Xiangpeng, XIE Hongfu, ZANG Bipeng. Application of Power Wireless Private Network in Ubiquitous Power Internet of Things [J]. Electric Power, 2019, 52(12): 27-38. |
[10] | CHEN Jialin, HE Yi, LI Lei, ZHOU Zheng, SUN Jun, ZHANG Jie. Research on Key Optimization Technologies for Transmission Network of Ubiquitous Power Internet of Things [J]. Electric Power, 2019, 52(12): 20-26,38. |
[11] | WANG Shenhua, HE Xiangwei, FANG Xiaofang, CHEN Bingsong, GUO Chuangxin. Dynamic Risk Assessment System for Power System Based on Multi-source Information of the Ubiquitous Power Internet of Things [J]. Electric Power, 2019, 52(12): 10-19. |
[12] | LI Baojie, LIU Yan, LI Hongjie, HE Weisheng, ZENG Xiangfeng, CHEN Shuo. Enlightenment on the Security of Cyber Information System Under Smart Grid from Ukraine Blackout [J]. Electric Power, 2017, 50(5): 71-77. |
[13] | HE Yao, ZHOU Cong, ZHENG Lingyue, ZHANG Weixi, XIE Yuxian. Detection Method Against False Data Injection Attack Based on Extended Kalman Filter [J]. Electric Power, 2017, 50(10): 35-40. |
[14] | ZHAI Shaolei, LI Bo, ZHANG Linshan, TANG Biao. An Efficient Cognitive Radio Communication Algorithm for Electric Power IOT Information Control [J]. Electric Power, 2016, 49(8): 130-134. |
[15] | TAO Xinmin, LI Zhen, ZHANG Yue. Acquisition System of Wavelet Energy Spectrum Entropy of Transformer Vibration Signal Based on DSP [J]. journal1, 2015, 48(8): 37-41. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||