Security Assessment of Electricity Video Terminal Network Based on Improved Dempster-Shafer Evidence Theory

An improved DSET ( dempster-shafer evidence theory ) network security assessment method of Internet of Things intelligent terminal is proposed in this paper. The cluster centers of different frames of discernment are obtained through the k-means method as the median value of the data-driven curve...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG Minjie, LIN Jing, HE Liangyuan, XIA Fei
Format: Article
Language:zho
Published: Harbin University of Science and Technology Publications 2024-06-01
Series:Journal of Harbin University of Science and Technology
Subjects:
Online Access:https://hlgxb.hrbust.edu.cn/#/digest?ArticleID=2332
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849415843815882752
author YANG Minjie
LIN Jing
HE Liangyuan
XIA Fei
author_facet YANG Minjie
LIN Jing
HE Liangyuan
XIA Fei
author_sort YANG Minjie
collection DOAJ
description An improved DSET ( dempster-shafer evidence theory ) network security assessment method of Internet of Things intelligent terminal is proposed in this paper. The cluster centers of different frames of discernment are obtained through the k-means method as the median value of the data-driven curve, which improves the BPA (basic probability allocation) accuracy of the data- driven method, especially to avoid the generation of conflict evidence with a focal element support rate of 1. To distribute the conflict between evidences, key evidence is calculated based on all evidences ’sources, and similarity weight conflict allocation rules are addressed. In order to verify the method proposed in this paper, a video terminal network is built, and DAC ( device application controller) equipment is used to explore equipment operating assets information. Taking the element layer security assessment of video terminal network as an example, fusion results of the elements BPA obtained by different methods and the fusion results of fusing conflict evidences obtained by different fusion rules were compared. The experimental results show that the improved DSET method proposed can greatly avoid generating conflict evidences and distribute conflict reasonably, thus ensuring a high accuracy rate of Internet of things terminal network security assessment.
format Article
id doaj-art-b17c2fa0ffd54e419f29b280e562d775
institution Kabale University
issn 1007-2683
language zho
publishDate 2024-06-01
publisher Harbin University of Science and Technology Publications
record_format Article
series Journal of Harbin University of Science and Technology
spelling doaj-art-b17c2fa0ffd54e419f29b280e562d7752025-08-20T03:33:22ZzhoHarbin University of Science and Technology PublicationsJournal of Harbin University of Science and Technology1007-26832024-06-012903607010.15938/j.jhust.2024.03.008Security Assessment of Electricity Video Terminal Network Based on Improved Dempster-Shafer Evidence TheoryYANG Minjie0LIN Jing1HE Liangyuan2XIA Fei3Jiading Power Supply Company, State Grid Shanghai Electric Power Co. , Ltd. , Shanghai 201800 , ChinaJiading Power Supply Company, State Grid Shanghai Electric Power Co. , Ltd. , Shanghai 201800 , ChinaCollege of Automation Engineering, Shanghai University of Electric Power, Shanghai 200090 , ChinaCollege of Automation Engineering, Shanghai University of Electric Power, Shanghai 200090 , China An improved DSET ( dempster-shafer evidence theory ) network security assessment method of Internet of Things intelligent terminal is proposed in this paper. The cluster centers of different frames of discernment are obtained through the k-means method as the median value of the data-driven curve, which improves the BPA (basic probability allocation) accuracy of the data- driven method, especially to avoid the generation of conflict evidence with a focal element support rate of 1. To distribute the conflict between evidences, key evidence is calculated based on all evidences ’sources, and similarity weight conflict allocation rules are addressed. In order to verify the method proposed in this paper, a video terminal network is built, and DAC ( device application controller) equipment is used to explore equipment operating assets information. Taking the element layer security assessment of video terminal network as an example, fusion results of the elements BPA obtained by different methods and the fusion results of fusing conflict evidences obtained by different fusion rules were compared. The experimental results show that the improved DSET method proposed can greatly avoid generating conflict evidences and distribute conflict reasonably, thus ensuring a high accuracy rate of Internet of things terminal network security assessment.https://hlgxb.hrbust.edu.cn/#/digest?ArticleID=2332dempster-shafer evidence theoryclusteringinternet of thingsintelligent terminalnetwork security
spellingShingle YANG Minjie
LIN Jing
HE Liangyuan
XIA Fei
Security Assessment of Electricity Video Terminal Network Based on Improved Dempster-Shafer Evidence Theory
Journal of Harbin University of Science and Technology
dempster-shafer evidence theory
clustering
internet of things
intelligent terminal
network security
title Security Assessment of Electricity Video Terminal Network Based on Improved Dempster-Shafer Evidence Theory
title_full Security Assessment of Electricity Video Terminal Network Based on Improved Dempster-Shafer Evidence Theory
title_fullStr Security Assessment of Electricity Video Terminal Network Based on Improved Dempster-Shafer Evidence Theory
title_full_unstemmed Security Assessment of Electricity Video Terminal Network Based on Improved Dempster-Shafer Evidence Theory
title_short Security Assessment of Electricity Video Terminal Network Based on Improved Dempster-Shafer Evidence Theory
title_sort security assessment of electricity video terminal network based on improved dempster shafer evidence theory
topic dempster-shafer evidence theory
clustering
internet of things
intelligent terminal
network security
url https://hlgxb.hrbust.edu.cn/#/digest?ArticleID=2332
work_keys_str_mv AT yangminjie securityassessmentofelectricityvideoterminalnetworkbasedonimproveddempstershaferevidencetheory
AT linjing securityassessmentofelectricityvideoterminalnetworkbasedonimproveddempstershaferevidencetheory
AT heliangyuan securityassessmentofelectricityvideoterminalnetworkbasedonimproveddempstershaferevidencetheory
AT xiafei securityassessmentofelectricityvideoterminalnetworkbasedonimproveddempstershaferevidencetheory