A RMF and AHP- Based Approach to Risk Assessment of Power Internet of Things

被引:1
|
作者
Li, Kunchang [1 ]
Shi, Runhua [1 ]
Yan, Jingchen [1 ]
Cai, Chenxi [1 ]
Sun, Mingyu [1 ]
Li, Jianbin [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
power Internet of Things; RMF; AHP; risk assessment; cyberspace security;
D O I
10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00117
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of the power Internet of Things, it has countless sensing terminals, complex information communication channels, and huge data storage and processing centers. The risk assessment of power Internet of Things is crucial to the cyberspace security. In this paper, firstly, the architecture of power Internet of Things and RMF is investigated. RMF is applied to the risk assessment of power Internet of things for the first time. Secondly, a risk assessment method of power Internet of Things based on RMF and improved AHP is proposed, in which we introduce RMF and combine improved AHP to analyze the risk and threat of power Internet of Things. Accordingly, the risk value is obtained, which can be used as the basis of the decision, authorize and monitor of power Internet of Things. Finally, a simple scenario of the power Internet of Things is simulated to verify our risk assessment method. The simulated results show that our risk assessment method can be dynamically implemented in the power Internet of things.
引用
收藏
页码:684 / 689
页数:6
相关论文
共 50 条
  • [31] An Internet of Things Approach to Electrical Power Monitoring and Outage Reporting
    Koch, Daniel B.
    SOUTHEASTCON 2017, 2017,
  • [32] Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment
    Alsubaei, Faisal
    Shiva, Sajjan
    Abuhussein, Abdullah
    2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN WORKSHOPS 2017), 2017, : 112 - 120
  • [33] A Novel Risk Assessment Model for Privacy Security in Internet of Things
    WU Tianshui
    ZHAO Gang
    Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 398 - 404
  • [34] Security Risk Assessment Methodologies in The Internet of Things: Survey and Taxonomy
    Yassine, Imad
    Halabi, Talal
    Bellaiche, Martine
    2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 668 - 675
  • [35] Operational Risk Assessment on Internet of Things: Mitigating Inherent Vulnerabilities
    Park, Youngjun
    Reith, Mark
    Mullins, Barry
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 346 - 353
  • [36] Power Monitoring System Based on Industrial Internet of Things
    Sun, Hongyu
    Han, Dong
    Chen, Geng
    Wang, Song
    Wang, Ao
    Zhang, Die
    2021 11TH INTERNATIONAL CONFERENCE ON POWER AND ENERGY SYSTEMS (ICPES 2021), 2021, : 490 - 495
  • [37] Exploration of power consumption monitoring based on Internet of things
    Chen, Xi
    Li, Xin
    Huang, Zhenzhen
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (10):
  • [38] Internet of Things (IoT)-based Power Meter Reading
    Slamet
    Hermawan, Lambang Nur
    Hidayat, Nurul
    Zubaidah, Siti
    2021 24TH INTERNATIONAL CONFERENCE ON ELECTRICAL MACHINES AND SYSTEMS (ICEMS 2021), 2021, : 680 - 684
  • [39] Internet of Things and the Risk Management Approach in the Pharmaceutical Supply Chain
    Montoya, Giset N.
    Santos Junior, Jose Benedito S.
    Novaes, Antonio G. N.
    Lima, Orlando F., Jr.
    DYNAMICS IN LOGISTICS, 2018, : 284 - 288
  • [40] A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management
    Choo, Kim-Kwang Raymond
    Gai, Keke
    Chiaraviglio, Luca
    Yang, Qing
    COMPUTERS & SECURITY, 2021, 102