Research on Network Security Protection Technology Based on P2AEDR in New Low-Voltage Control Scenarios for Power IoT and Other Blockchain-Based IoT Architectures

In the construction of new power systems, the traditional network security protection mainly based on boundary protection belongs to static defense and still relies mainly on manual processing in vulnerability repair, threat response, etc. It is difficult to adapt to the security protection needs in...

Full description

Saved in:
Bibliographic Details
Main Authors: Weiwei Miao, Xinjian Zhao, Nianzhe Li, Song Zhang, Qianmu Li, Xiaochao Li
Format: Article
Language:English
Published: MDPI AG 2024-10-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/24/21/6808
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1846173174443540480
author Weiwei Miao
Xinjian Zhao
Nianzhe Li
Song Zhang
Qianmu Li
Xiaochao Li
author_facet Weiwei Miao
Xinjian Zhao
Nianzhe Li
Song Zhang
Qianmu Li
Xiaochao Li
author_sort Weiwei Miao
collection DOAJ
description In the construction of new power systems, the traditional network security protection mainly based on boundary protection belongs to static defense and still relies mainly on manual processing in vulnerability repair, threat response, etc. It is difficult to adapt to the security protection needs in large-scale distributed new energy, third-party aggregation platforms, and flexible interaction scenarios with power grid enterprise systems. It is necessary to conduct research on dynamic security protection models for IoT and other Blockchain-based IoT architectures. This article proposes a network security comprehensive protection model P2AEDR based on different interaction modes of cloud–edge interaction and cloud–cloud interaction. Through continuous trust evaluation, dynamic access control, and other technologies, it strengthens the internal defense capabilities of power grid business, shifting from static protection as the core mode to a real-time intelligent perception and automated response mode, and ultimately achieving the goal of dynamic defense, meeting the security protection needs of large-scale controlled terminal access and third-party aggregation platforms. Meanwhile, this article proposes a dynamic trust evaluation algorithm based on deep learning, which protects the secure access and use of various resources in a more refined learning approach based on the interaction information monitored in the system. Through experimental verification of the dynamic trust evaluation algorithm, it is shown that the proposed model has good trust evaluation performance. Therefore, this research is beneficial for trustworthy Power IoT and other Blockchain-based IoT architectures.
format Article
id doaj-art-7a9e2088beb84185bea1c94661c9f754
institution Kabale University
issn 1424-8220
language English
publishDate 2024-10-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj-art-7a9e2088beb84185bea1c94661c9f7542024-11-08T14:41:00ZengMDPI AGSensors1424-82202024-10-012421680810.3390/s24216808Research on Network Security Protection Technology Based on P2AEDR in New Low-Voltage Control Scenarios for Power IoT and Other Blockchain-Based IoT ArchitecturesWeiwei Miao0Xinjian Zhao1Nianzhe Li2Song Zhang3Qianmu Li4Xiaochao Li5State Grid Jiangsu Electric Power Co., Ltd., Information & Telecommunication Branch; Nanjing 210024, ChinaState Grid Jiangsu Electric Power Co., Ltd., Information & Telecommunication Branch; Nanjing 210024, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, ChinaState Grid Jiangsu Electric Power Co., Ltd., Information & Telecommunication Branch; Nanjing 210024, ChinaSchool of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, ChinaSchool of Cyber Science and Engineering, Nanjing University of Science and Technology, Nanjing 210094, ChinaIn the construction of new power systems, the traditional network security protection mainly based on boundary protection belongs to static defense and still relies mainly on manual processing in vulnerability repair, threat response, etc. It is difficult to adapt to the security protection needs in large-scale distributed new energy, third-party aggregation platforms, and flexible interaction scenarios with power grid enterprise systems. It is necessary to conduct research on dynamic security protection models for IoT and other Blockchain-based IoT architectures. This article proposes a network security comprehensive protection model P2AEDR based on different interaction modes of cloud–edge interaction and cloud–cloud interaction. Through continuous trust evaluation, dynamic access control, and other technologies, it strengthens the internal defense capabilities of power grid business, shifting from static protection as the core mode to a real-time intelligent perception and automated response mode, and ultimately achieving the goal of dynamic defense, meeting the security protection needs of large-scale controlled terminal access and third-party aggregation platforms. Meanwhile, this article proposes a dynamic trust evaluation algorithm based on deep learning, which protects the secure access and use of various resources in a more refined learning approach based on the interaction information monitored in the system. Through experimental verification of the dynamic trust evaluation algorithm, it is shown that the proposed model has good trust evaluation performance. Therefore, this research is beneficial for trustworthy Power IoT and other Blockchain-based IoT architectures.https://www.mdpi.com/1424-8220/24/21/6808low-voltage controlprotection modeldynamic defensetrust assessmentdeep learningInternet of Things (IoT)
spellingShingle Weiwei Miao
Xinjian Zhao
Nianzhe Li
Song Zhang
Qianmu Li
Xiaochao Li
Research on Network Security Protection Technology Based on P2AEDR in New Low-Voltage Control Scenarios for Power IoT and Other Blockchain-Based IoT Architectures
Sensors
low-voltage control
protection model
dynamic defense
trust assessment
deep learning
Internet of Things (IoT)
title Research on Network Security Protection Technology Based on P2AEDR in New Low-Voltage Control Scenarios for Power IoT and Other Blockchain-Based IoT Architectures
title_full Research on Network Security Protection Technology Based on P2AEDR in New Low-Voltage Control Scenarios for Power IoT and Other Blockchain-Based IoT Architectures
title_fullStr Research on Network Security Protection Technology Based on P2AEDR in New Low-Voltage Control Scenarios for Power IoT and Other Blockchain-Based IoT Architectures
title_full_unstemmed Research on Network Security Protection Technology Based on P2AEDR in New Low-Voltage Control Scenarios for Power IoT and Other Blockchain-Based IoT Architectures
title_short Research on Network Security Protection Technology Based on P2AEDR in New Low-Voltage Control Scenarios for Power IoT and Other Blockchain-Based IoT Architectures
title_sort research on network security protection technology based on p2aedr in new low voltage control scenarios for power iot and other blockchain based iot architectures
topic low-voltage control
protection model
dynamic defense
trust assessment
deep learning
Internet of Things (IoT)
url https://www.mdpi.com/1424-8220/24/21/6808
work_keys_str_mv AT weiweimiao researchonnetworksecurityprotectiontechnologybasedonp2aedrinnewlowvoltagecontrolscenariosforpoweriotandotherblockchainbasediotarchitectures
AT xinjianzhao researchonnetworksecurityprotectiontechnologybasedonp2aedrinnewlowvoltagecontrolscenariosforpoweriotandotherblockchainbasediotarchitectures
AT nianzheli researchonnetworksecurityprotectiontechnologybasedonp2aedrinnewlowvoltagecontrolscenariosforpoweriotandotherblockchainbasediotarchitectures
AT songzhang researchonnetworksecurityprotectiontechnologybasedonp2aedrinnewlowvoltagecontrolscenariosforpoweriotandotherblockchainbasediotarchitectures
AT qianmuli researchonnetworksecurityprotectiontechnologybasedonp2aedrinnewlowvoltagecontrolscenariosforpoweriotandotherblockchainbasediotarchitectures
AT xiaochaoli researchonnetworksecurityprotectiontechnologybasedonp2aedrinnewlowvoltagecontrolscenariosforpoweriotandotherblockchainbasediotarchitectures