Security feedback trust model of power network demand response terminal triggered by hacker attacks

With the rapid expansion of power system scale, demand response business is promoted to develop. More and more demand response terminals are connected to the smart grid, smart grid is an intelligent system that allows the grid to effectively perform its functions. Its data can be used in intelligent...

Full description

Bibliographic Details
Main Authors: Jianfei Chen, Lina Zhao, Qiang Sun, Cheng Zhang
Format: Article
Language:English
Published: Frontiers Media S.A. 2023-02-01
Series:Frontiers in Energy Research
Subjects:
Online Access:https://www.frontiersin.org/articles/10.3389/fenrg.2023.1113384/full
_version_ 1811170379669962752
author Jianfei Chen
Lina Zhao
Qiang Sun
Cheng Zhang
author_facet Jianfei Chen
Lina Zhao
Qiang Sun
Cheng Zhang
author_sort Jianfei Chen
collection DOAJ
description With the rapid expansion of power system scale, demand response business is promoted to develop. More and more demand response terminals are connected to the smart grid, smart grid is an intelligent system that allows the grid to effectively perform its functions. Its data can be used in intelligent decision-making during grid operation, which may be attacked by hackers in practical applications, causing security problems of demand response terminals of the power network. The security feedback trust model establishes trust relationship through trust mechanism, which can effectively ensure the security of interaction between nodes and demand response terminals of the smart grid. Therefore, a security feedback trust model of power network demand response terminal triggered by hacker attacks is proposed. Analyze the role of smart grid in power grid, and use convolutional neural network in artificial intelligence technology to enhance the flexibility of smart grid. Aiming at the security problem of the demand response terminal of the power network being attacked by hackers, based on the trust theory, the security feedback trust model of the demand response terminal of the power network is designed through the main services provided by the security feedback trust model, the trust information storage of the power network nodes and the summary of the main work. Establish the identity trust relationship, adopt the distributed verifiable signature scheme, update the power grid node certificate, update the identity trust relationship, and revoke the identity trust relationship based on the trust evaluation and threshold value to prevent hackers from attacking the power grid demand response terminal. Based on information theory, trust is established and measured. Entropy is used to represent the trust value. Behavior trust evaluation and composition mechanism are introduced into the security feedback trust model of power network demand response terminals to achieve the credibility of identity and behavior among power network nodes. The experimental results show that the proposed method can judge the hacker attacks, reduce the impact of hacker attacks on the trust of power grid nodes, and improve the interaction security between power grid demand response terminals and power grid nodes.
first_indexed 2024-04-10T16:56:55Z
format Article
id doaj.art-ecc6bf90bccc4941b207dd645dc1481d
institution Directory Open Access Journal
issn 2296-598X
language English
last_indexed 2024-04-10T16:56:55Z
publishDate 2023-02-01
publisher Frontiers Media S.A.
record_format Article
series Frontiers in Energy Research
spelling doaj.art-ecc6bf90bccc4941b207dd645dc1481d2023-02-07T07:34:19ZengFrontiers Media S.A.Frontiers in Energy Research2296-598X2023-02-011110.3389/fenrg.2023.11133841113384Security feedback trust model of power network demand response terminal triggered by hacker attacksJianfei Chen0Lina Zhao1Qiang Sun2Cheng Zhang3State Grid Shandong Electric Power Company, Jinan, ChinaInformation and Communications Company, State Grid Shandong Electric Power Company, Jinan, ChinaState Grid Weihai Wendeng Power Supply Company, Weihai, ChinaState Grid Juxian Power Supply Company, Rizhao, ChinaWith the rapid expansion of power system scale, demand response business is promoted to develop. More and more demand response terminals are connected to the smart grid, smart grid is an intelligent system that allows the grid to effectively perform its functions. Its data can be used in intelligent decision-making during grid operation, which may be attacked by hackers in practical applications, causing security problems of demand response terminals of the power network. The security feedback trust model establishes trust relationship through trust mechanism, which can effectively ensure the security of interaction between nodes and demand response terminals of the smart grid. Therefore, a security feedback trust model of power network demand response terminal triggered by hacker attacks is proposed. Analyze the role of smart grid in power grid, and use convolutional neural network in artificial intelligence technology to enhance the flexibility of smart grid. Aiming at the security problem of the demand response terminal of the power network being attacked by hackers, based on the trust theory, the security feedback trust model of the demand response terminal of the power network is designed through the main services provided by the security feedback trust model, the trust information storage of the power network nodes and the summary of the main work. Establish the identity trust relationship, adopt the distributed verifiable signature scheme, update the power grid node certificate, update the identity trust relationship, and revoke the identity trust relationship based on the trust evaluation and threshold value to prevent hackers from attacking the power grid demand response terminal. Based on information theory, trust is established and measured. Entropy is used to represent the trust value. Behavior trust evaluation and composition mechanism are introduced into the security feedback trust model of power network demand response terminals to achieve the credibility of identity and behavior among power network nodes. The experimental results show that the proposed method can judge the hacker attacks, reduce the impact of hacker attacks on the trust of power grid nodes, and improve the interaction security between power grid demand response terminals and power grid nodes.https://www.frontiersin.org/articles/10.3389/fenrg.2023.1113384/fullhacker attackspower networktrust assessmentnode certificatedemand response terminalsecurity feedback trust model
spellingShingle Jianfei Chen
Lina Zhao
Qiang Sun
Cheng Zhang
Security feedback trust model of power network demand response terminal triggered by hacker attacks
Frontiers in Energy Research
hacker attacks
power network
trust assessment
node certificate
demand response terminal
security feedback trust model
title Security feedback trust model of power network demand response terminal triggered by hacker attacks
title_full Security feedback trust model of power network demand response terminal triggered by hacker attacks
title_fullStr Security feedback trust model of power network demand response terminal triggered by hacker attacks
title_full_unstemmed Security feedback trust model of power network demand response terminal triggered by hacker attacks
title_short Security feedback trust model of power network demand response terminal triggered by hacker attacks
title_sort security feedback trust model of power network demand response terminal triggered by hacker attacks
topic hacker attacks
power network
trust assessment
node certificate
demand response terminal
security feedback trust model
url https://www.frontiersin.org/articles/10.3389/fenrg.2023.1113384/full
work_keys_str_mv AT jianfeichen securityfeedbacktrustmodelofpowernetworkdemandresponseterminaltriggeredbyhackerattacks
AT linazhao securityfeedbacktrustmodelofpowernetworkdemandresponseterminaltriggeredbyhackerattacks
AT qiangsun securityfeedbacktrustmodelofpowernetworkdemandresponseterminaltriggeredbyhackerattacks
AT chengzhang securityfeedbacktrustmodelofpowernetworkdemandresponseterminaltriggeredbyhackerattacks