Design and implementation of a vulnerability mining system for power internet of things terminal based on fuzzy mathematical model simulation platform

被引:0
|
作者
Chen, Haifeng [1 ]
机构
[1] Lianyungang Tech Coll, Sch Informat Engn, Lianyungang, Jiangsu, Peoples R China
来源
关键词
Power simulation platform; Internet of Things terminals; vulnerability mining systems; fuzzy mathematical model; fuzz test; fuzzy logic;
D O I
10.3233/IDT-230241
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid development of the economy, the power supply has also shown an increasing trend year by year, and many loopholes and hidden dangers have emerged during the operation of the power grid. The power grid may be subject to malicious attacks, such as hacker attacks, power theft, etc. This may lead to security risks such as power grid system paralysis and information leakage. In order to ensure the quality of power supply, it is necessary to optimize the distribution of electricity and improve power supply efficiency. This article pointed out the security performance issues of power Internet of Things (IoT) terminals and analyzed the design and implementation of a vulnerability mining system for power IoT terminals based on a fuzzy mathematical model simulation platform. This article used a fuzzy mathematical model to quantitatively evaluate the security performance of power IoT terminals, providing an effective theoretical basis for vulnerability mining. Based on the analysis of vulnerability mining technology classification and vulnerability attack process, this article characterizes vulnerability parameters through fuzzy mapping. Based on the collected vulnerability data and the online and device status of power IoT terminals, fuzzy logic inference is used to determine and mine potential vulnerability issues in power IoT terminals. This article aimed to improve the security performance of power IoT terminals and ensure the safe and stable operation of the power system. By testing the number of system vulnerabilities, vulnerability risk level, and vulnerability mining time of the power IoT terminal vulnerability mining system based on fuzzy mathematical models, it was found that the power IoT simulation platform based on fuzzy mathematical models has fewer terminal vulnerabilities. The fuzzy mathematical model can reduce the vulnerability risk level of the power IoT simulation platform system, and the time required for vulnerability mining was reduced; the time was reduced by 0.48 seconds, and the speed of vulnerability mining was improved. Fuzzy mathematical models can promote the development of the power industry, which provides strong support for the security protection of power IoT terminals.
引用
收藏
页码:2873 / 2883
页数:11
相关论文
共 50 条
  • [1] The Design and Implementation of Mobile Intelligent Terminal Guide System based on the Internet of Things
    Song, Zimu
    Yao, Kaixue
    2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 1, 2014, : 133 - 137
  • [2] Design and Implementation of Reactive Distributed Internet of Things Platform based on Actor Model
    Lv, Haidong
    Ge, Xiaolong
    Zhu, Hongzhi
    Wang, Chen
    Yuan, Zhiwei
    Zhu, Yongkang
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 1993 - 1996
  • [3] Design and implementation of data platform based on internet of things technology
    Liu, De-Qiang
    International Journal of Database Theory and Application, 2015, 8 (05): : 99 - 108
  • [4] Design and implementation of intelligent traffic and big data mining system based on internet of things
    Li, Weiguang
    Zhu, Juan
    Zhang, Yong
    Zhang, Shuyan
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (02) : 1967 - 1975
  • [5] Design and Implementation of Internet of Things in Electricity Terminal Identity Authentication System
    Chen, Guanlan
    Wang, Zhuxiao
    Chen, Fei
    Gao, Xue
    2020 IEEE 6TH INTERNATIONAL CONFERENCE ON CONTROL SCIENCE AND SYSTEMS ENGINEERING (ICCSSE), 2019, : 223 - 227
  • [6] Design and Implementation of the Zero Trust Model in the Power Internet of Things
    Wu, Kehe
    Cheng, Rui
    Xu, Huiyan
    Tong, Jie
    INTERNATIONAL TRANSACTIONS ON ELECTRICAL ENERGY SYSTEMS, 2023, 2023
  • [7] System Design and Model Research of Renewable Energy Policy Evaluation System Based on Platform of Ubiquitous Power Internet of Things
    Zeng M.
    Wang Y.
    Yan T.
    Lan M.
    Dong H.
    Zhang X.
    Wang H.
    Sun C.
    Dianwang Jishu/Power System Technology, 2019, 43 (12): : 4263 - 4273
  • [8] Monitoring System Design And Implementation Based On The Internet Of Things
    Xu Jianguo
    Xu Gang
    Yan Mengmeng
    2013 FOURTH INTERNATIONAL CONFERENCE ON DIGITAL MANUFACTURING AND AUTOMATION (ICDMA), 2013, : 801 - 804
  • [9] Design and implementation of music teaching assistant platform based on Internet of Things
    Li, Wajia
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (09):
  • [10] Design and implementation of an 'Internet of Things' based quality control system
    Deng, Yuhao
    Zhu, Haiping
    Zhang, Guojun
    Yin, Hui
    2013 INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL, INFORMATICS AND ITS APPLICATIONS (IC3INA), 2013, : 141 - 146