Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Power Internet of Things security vulnerability evaluation method integrating service security

A technology of power Internet of things and integrated services, which is applied in the field of security vulnerability assessment of electric power Internet of things with integrated business security, can solve the problems of low accuracy of security protection of electric power Internet of things, and achieve improved calculation reliability, improved accuracy, and guaranteed safety effect

Pending Publication Date: 2020-12-15
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, an embodiment of the present invention provides a security vulnerability assessment method for the Internet of Things that integrates business security to solve the problem of low accuracy of security protection for the Internet of Things

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power Internet of Things security vulnerability evaluation method integrating service security
  • Power Internet of Things security vulnerability evaluation method integrating service security
  • Power Internet of Things security vulnerability evaluation method integrating service security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0074] figure 1 An optional implementation manner of the attack tree model of the target electric power Internet of Things in the embodiment of the present invention is shown. Among them, the discussed target power Internet of Things has a four-layer logical architecture of perception layer, network layer, platform layer and application layer.

[0075]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of power internet of things, and particularly relates to a power internet of things security vulnerability evaluation method integrating service security.The method comprises the steps of acquiring an attack tree model of a target power internet of things, data corresponding to each leaf node in the attack tree model and at least one evaluation index;determining the weight of at least one evaluation index based on the data of each leaf node; calculating the security vulnerability of each leaf node by using the weight of the at least one evaluationindex and the at least one evaluation index; determining the security vulnerability of each node in the attack tree model according to the security vulnerability of each leaf node and the relationship between each node in the attack tree model and the corresponding child node; and based on the security vulnerability of each node, performing security protection on the corresponding node of the power Internet of Things. After the security vulnerability of each node is calculated, security protection can be carried out on each node in a targeted manner, so that the security protection accuracy is improved.

Description

technical field [0001] The invention relates to the technical field of electric power Internet of Things, in particular to a method for evaluating security vulnerability of electric power Internet of Things that integrates business security. Background technique [0002] The power Internet of Things is an intelligent service system for the interconnection of all things and human-computer interaction for power systems. Its business is very extensive, which can be generally divided into internal business such as customer service and power grid operation, and external business such as virtual power plant and multi-station integration. Compared with traditional power grid services, these services require more data collection and transmission, more extensive objects of information interaction, more frequent information interactions, wider scope of information sharing, and greater granularity of information mining. More in-depth, higher degree of business data, stronger business ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24G06Q10/06G06Q50/30G16Y30/10
CPCH04L63/20H04L41/142G06Q10/06393G16Y30/10G06Q50/40
Inventor 张小建石聪聪姚启桂王向群王齐
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products