Security Assessment of Electricity Video Terminal Network Based on Improved Dempster-Shafer Evidence Theory

An improved DSET ( dempster-shafer evidence theory ) network security assessment method of Internet of Things intelligent terminal is proposed in this paper. The cluster centers of different frames of discernment are obtained through the k-means method as the median value of the data-driven curve...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG Minjie, LIN Jing, HE Liangyuan, XIA Fei
Format: Article
Language:zho
Published: Harbin University of Science and Technology Publications 2024-06-01
Series:Journal of Harbin University of Science and Technology
Subjects:
Online Access:https://hlgxb.hrbust.edu.cn/#/digest?ArticleID=2332
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:An improved DSET ( dempster-shafer evidence theory ) network security assessment method of Internet of Things intelligent terminal is proposed in this paper. The cluster centers of different frames of discernment are obtained through the k-means method as the median value of the data-driven curve, which improves the BPA (basic probability allocation) accuracy of the data- driven method, especially to avoid the generation of conflict evidence with a focal element support rate of 1. To distribute the conflict between evidences, key evidence is calculated based on all evidences ’sources, and similarity weight conflict allocation rules are addressed. In order to verify the method proposed in this paper, a video terminal network is built, and DAC ( device application controller) equipment is used to explore equipment operating assets information. Taking the element layer security assessment of video terminal network as an example, fusion results of the elements BPA obtained by different methods and the fusion results of fusing conflict evidences obtained by different fusion rules were compared. The experimental results show that the improved DSET method proposed can greatly avoid generating conflict evidences and distribute conflict reasonably, thus ensuring a high accuracy rate of Internet of things terminal network security assessment.
ISSN:1007-2683