Abstract
With the continuous improvement of the automation level of the electric energy metering system, the measurement security threats it facing increased contrast. Aiming at the fuzzy and dynamic characteristics of the information safety grade of the electric energy metering system, a multi-level and multi-factor security comprehensive evaluation model based on dynamic fuzzy theory which proposes a safety classification evaluation method based on dynamic double fuzzy reasoning, was established based on the study of the security static evaluation model. In this paper, the information security evaluation index system is established by analyzing the related factors of confidentiality, integrity and availability of electric energy measurement information security. The dynamic fuzzy probability vector of the safety grade is calculated based on the ameliorated D-S evidential theory, then the static weight determined by FAHP based on triangular fuzzy number and the time weight determined by the information entropy weight method based on time degree are integrated to calculate the dynamic weight vector of the index, and finally combines examples to analyze and verify the resulting data. This paper provided new solutions for the information security classification evaluation of the electric energy metering automation system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gao, H., Dei, X., Liu, L.: Evaluation of communication security of integrated automation system in substation. Telecommun. Electr. Power Syst. 33(232), 1–4 (2012)
Yu, J., Wang, X., Zhang, D., et al.: Innovation demonstration area construction of Tianjin eco-city smart grid facing multi energy interconnection. Electr. Power Constr. 36(11), 58–61 (2015)
State Grid Corporation of China, Production Safety Accident Report of SGCC in 2014, pp. 10–18. China Power Press, Beijing (2014)
Zhang, R., Hu, X., Gao, J., et al.: Principle and Operation of Integrated Automation in Substation. China Power Press, Beijing (2008)
Guo, L., Dong, W., Sun, X., et al: A method of dynamic risk analysis and assessment for metro power supply system based on fuzzy reasoning. In: 2019 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS), Xiamen, China, pp. 555–561 (2019)
Liu, Y., Tang, Y., Zhang, Q., et al.: Power dispatch software security situation assessment method. Netinfo Secur. 19(8), 15–21 (2019)
Feng, D., Zhang, Y., Zhang, Y.: Survey of information security risk assessment. J. Commun. 25(7), 10–18 (2004)
Qian, B., Cai, X., Yong, X., et al.: Fuzzy inference based cyber security situation awareness of advanced metering system. Southern Power Syst. Technol. 13(2) (2019)
Liu, Y., Man, H.: Network vulnerability assessment using Bayesian networks. In: Proceedings of the SPIE, vol. 5812, pp. 61–71 (2005)
Poolsappasit, N., Dewri, R., Ray, I.: Dynamic security risk management using Bayesian attack graphs. IEEE Trans. Dependable Secure Comput. 9(1), 61–74 (2012)
Chen, J., Sun, T.: Study on quality risk assessment for power transformer based on fault tree analysis. In: 2016 China International Conference on Electricity Distribution (2016)
Xia, J., Fan, K., Lin, L.: Evaluation method of information security protection capability of industrial control system based on AHP and grey fuzzy theory. Network Security Technology or Application (2019)
Deng, C., et al.: A fuzzy comprehensive evaluation for metropolitan power grid risk assessment. In: 2016 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE). IEEE (2016)
Qian, S., Yang, T.: Research on security risk assessment of smart microgrid based on fuzzy set theory. Energy Conserv. 39, 449(02), 12–15 (2020)
Liu, W., Zhang, L.: Formation security levels evaluation of distribution automation system based on FAHP and improved D-S. East China Electr. Power 38(001), 67–71 (2010)
Liu, H., Sun, Y.: The safety assessment of thermal control system in power plant. In: ICCASM 2010, Taiyuan, pp. V10-581–V10-584 (2010)
Gao, J., Cui, Y., Luo, S., et al.: Research on controllability evaluation of information system. Netinfo Secur. (08), 67–75 (2015)
Zhuo, Y., Zhang, Q., Gong, Z.: Network situation assessment based on RST. In: Workshop on Computational Intelligence & Industrial Application. IEEE (2009)
Zeke, L., Zewen, C., Chunyan, W., Zhiguang, X., Ye, L.: Research on security evaluation technology of wireless access of electric power monitoring system based on fuzzy. In: 2020 IEEE 3rd International Conference on Computer and Communication Engineering Technology (CCET), Beijing, China, pp. 318–321 (2020)
Chen, S.: Theory and Application of Fuzzy Sets. Beijing Science Press (2005)
Guan, X., Guo, J., Wang, X.: Double fuzzy information security evaluation algorithm based on improved D-S theory. Comput. Eng. Appl. 53(2), 112–117 (2017)
Gao, H., Zhang, B.: Research on transportation safety evaluation of railway dangerous goods handling station based on dynamic fuzzy theory. Railway Freight 037(001), 55–60 (2019)
Xu, Z., Yager, R.: Dynamic intuitionistic fuzzy multi-attribute decision making. Int. J. Approximate Reasoning 48, 246–262 (2008)
Jin, L., Mesiar, R., Qian, G.: Weighting models to generate weights and capacities in multicriteria group decision making. IEEE Trans. Fuzzy Syst. 26(4), 2225–2236 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Liu, T., Wu, S., Peng, T., Li, S., Zhao, J., Cao, X. (2021). The Evaluation Method of Safety Classification for Electric Energy Measurement Based on Dynamic Double Fuzzy Reasoning. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12736. Springer, Cham. https://doi.org/10.1007/978-3-030-78609-0_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-78609-0_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78608-3
Online ISBN: 978-3-030-78609-0
eBook Packages: Computer ScienceComputer Science (R0)