一种基于信任值的有源配电台区“边-端”设备信任评估机制
作者:
作者单位:

国网天津市供电公司 电力科学研究院,天津 300074

作者简介:

张 磐(1983-),男,硕士,正高级工程师,主要研究方向为配电自动化、智能配用电技术.email:ator66w@163.com.
吴 磊(1985-),男,硕士,高级工程师,主要研究方向为智能配电网和继电保护技术.
庞 超(1995-),男,硕士,工程师,主要研究方向为智能配用电技术研究.

通讯作者:

基金项目:

国网天津市电力公司科技资助项目(电科-研发 2023-41)

伦理声明:



A trust value-based trust evaluation mechanism for "edge-to-end" devices in active distribution substation area
Author:
Ethical statement:

Affiliation:

Electric Power Research Institute,State Grid Tianjin Electric Power Company,Tianjin 300074,China

Funding:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
    摘要:

    随着分布式能源的普及,有源配电台区内大量分布式“边-端”设备的身份认证和行为识别越来越具有挑战性。受损设备可能会危及配电网的安全性,恶意设备则可以通过注入虚假和恶意数据破坏网络的完整性。与高成本的基于密钥的安全方案相比,使用基于信任的安全性检测恶意节点是一种有效且轻量化的对策。本文提出一种高效信任值评估机制,可有效区分恶意设备,并防御开关和拒绝服务(DoS)攻击。使用贝叶斯估计方法收集并计算边端设备的直接和间接信任值,进一步考虑随时间收集的数据的相关性,通过应用两阶段信任评估框架,在动态环境中实现精确的信任评估,进而确保数据传输的安全性。与现有方法相比,提出的方法在恶意节点检测方面延迟更少,网络吞吐量更高。

    Abstract:

    With the widespread adoption of distributed energy resources, the authentication of a large number of distributed "edge-to-end" devices and the identification of their behaviors within active distribution substations are becoming increasingly challenging. The damaged devices may jeopardize the security of the distribution network, while the malicious devices can disrupt the integrity of the network by injecting false and malicious data. Compared to high-cost key-based security solutions, employing trust-based security to detect malicious nodes is an effective and lightweight countermeasure. This paper proposes an efficient trust evaluation mechanism that can effectively distinguish malicious devices and defend against switch and Denial-of-Service(DoS) attacks. Using the Bayesian estimation method, the direct and indirect trust values of edge-end devices are collected and calculated, further considering the correlation of data collected over time. By applying a two-stage trust evaluation framework, accurate trust evaluation is achieved in dynamic environments, thereby ensuring the security of data transmission. Compared with existing methods, the proposed method has less delay in detecting malicious nodes and higher network throughput.

    参考文献
    相似文献
    引证文献
引用本文

张磐,吴磊,庞超.一种基于信任值的有源配电台区“边-端”设备信任评估机制[J].太赫兹科学与电子信息学报,2025,23(7):711~719

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
历史
  • 收稿日期:2025-02-24
  • 最后修改日期:2025-04-05
  • 录用日期:
  • 在线发布日期: 2025-08-01
  • 出版日期:
关闭