Security Assessment of Electricity Video Terminal Network Based on Improved Dempster-Shafer Evidence Theory
An improved DSET ( dempster-shafer evidence theory ) network security assessment method of Internet of Things intelligent terminal is proposed in this paper. The cluster centers of different frames of discernment are obtained through the k-means method as the median value of the data-driven curve...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Harbin University of Science and Technology Publications
2024-06-01
|
| Series: | Journal of Harbin University of Science and Technology |
| Subjects: | |
| Online Access: | https://hlgxb.hrbust.edu.cn/#/digest?ArticleID=2332 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849415843815882752 |
|---|---|
| author | YANG Minjie LIN Jing HE Liangyuan XIA Fei |
| author_facet | YANG Minjie LIN Jing HE Liangyuan XIA Fei |
| author_sort | YANG Minjie |
| collection | DOAJ |
| description |
An improved DSET ( dempster-shafer evidence theory ) network security assessment method of Internet of Things intelligent terminal is proposed in this paper. The cluster centers of different frames of discernment are obtained through the k-means method as the median value of the data-driven curve, which improves the BPA (basic probability allocation) accuracy of the data- driven method, especially to avoid the generation of conflict evidence with a focal element support rate of 1. To distribute the conflict between evidences, key evidence is calculated based on all evidences ’sources, and similarity weight conflict allocation rules are addressed. In order to verify the method proposed in this paper, a video terminal network is built, and DAC ( device application controller) equipment is used to explore equipment operating assets information. Taking the element layer security assessment of video terminal network as an example, fusion results of the elements BPA obtained by different methods and the fusion results of fusing conflict evidences obtained by different fusion rules were compared. The experimental results show that the improved DSET method proposed can greatly avoid generating conflict evidences and distribute conflict reasonably, thus ensuring a high accuracy rate of Internet of things terminal network security assessment. |
| format | Article |
| id | doaj-art-b17c2fa0ffd54e419f29b280e562d775 |
| institution | Kabale University |
| issn | 1007-2683 |
| language | zho |
| publishDate | 2024-06-01 |
| publisher | Harbin University of Science and Technology Publications |
| record_format | Article |
| series | Journal of Harbin University of Science and Technology |
| spelling | doaj-art-b17c2fa0ffd54e419f29b280e562d7752025-08-20T03:33:22ZzhoHarbin University of Science and Technology PublicationsJournal of Harbin University of Science and Technology1007-26832024-06-012903607010.15938/j.jhust.2024.03.008Security Assessment of Electricity Video Terminal Network Based on Improved Dempster-Shafer Evidence TheoryYANG Minjie0LIN Jing1HE Liangyuan2XIA Fei3Jiading Power Supply Company, State Grid Shanghai Electric Power Co. , Ltd. , Shanghai 201800 , ChinaJiading Power Supply Company, State Grid Shanghai Electric Power Co. , Ltd. , Shanghai 201800 , ChinaCollege of Automation Engineering, Shanghai University of Electric Power, Shanghai 200090 , ChinaCollege of Automation Engineering, Shanghai University of Electric Power, Shanghai 200090 , China An improved DSET ( dempster-shafer evidence theory ) network security assessment method of Internet of Things intelligent terminal is proposed in this paper. The cluster centers of different frames of discernment are obtained through the k-means method as the median value of the data-driven curve, which improves the BPA (basic probability allocation) accuracy of the data- driven method, especially to avoid the generation of conflict evidence with a focal element support rate of 1. To distribute the conflict between evidences, key evidence is calculated based on all evidences ’sources, and similarity weight conflict allocation rules are addressed. In order to verify the method proposed in this paper, a video terminal network is built, and DAC ( device application controller) equipment is used to explore equipment operating assets information. Taking the element layer security assessment of video terminal network as an example, fusion results of the elements BPA obtained by different methods and the fusion results of fusing conflict evidences obtained by different fusion rules were compared. The experimental results show that the improved DSET method proposed can greatly avoid generating conflict evidences and distribute conflict reasonably, thus ensuring a high accuracy rate of Internet of things terminal network security assessment.https://hlgxb.hrbust.edu.cn/#/digest?ArticleID=2332dempster-shafer evidence theoryclusteringinternet of thingsintelligent terminalnetwork security |
| spellingShingle | YANG Minjie LIN Jing HE Liangyuan XIA Fei Security Assessment of Electricity Video Terminal Network Based on Improved Dempster-Shafer Evidence Theory Journal of Harbin University of Science and Technology dempster-shafer evidence theory clustering internet of things intelligent terminal network security |
| title | Security Assessment of Electricity Video Terminal Network Based on Improved Dempster-Shafer Evidence Theory |
| title_full | Security Assessment of Electricity Video Terminal Network Based on Improved Dempster-Shafer Evidence Theory |
| title_fullStr | Security Assessment of Electricity Video Terminal Network Based on Improved Dempster-Shafer Evidence Theory |
| title_full_unstemmed | Security Assessment of Electricity Video Terminal Network Based on Improved Dempster-Shafer Evidence Theory |
| title_short | Security Assessment of Electricity Video Terminal Network Based on Improved Dempster-Shafer Evidence Theory |
| title_sort | security assessment of electricity video terminal network based on improved dempster shafer evidence theory |
| topic | dempster-shafer evidence theory clustering internet of things intelligent terminal network security |
| url | https://hlgxb.hrbust.edu.cn/#/digest?ArticleID=2332 |
| work_keys_str_mv | AT yangminjie securityassessmentofelectricityvideoterminalnetworkbasedonimproveddempstershaferevidencetheory AT linjing securityassessmentofelectricityvideoterminalnetworkbasedonimproveddempstershaferevidencetheory AT heliangyuan securityassessmentofelectricityvideoterminalnetworkbasedonimproveddempstershaferevidencetheory AT xiafei securityassessmentofelectricityvideoterminalnetworkbasedonimproveddempstershaferevidencetheory |