首页 | 本学科首页   官方微博 | 高级检索  
     检索      

物联网环境下不协调目标信息脆弱性风险评估系统研究
引用本文:陶振文,张俊锋.物联网环境下不协调目标信息脆弱性风险评估系统研究[J].科学技术与工程,2018,18(9).
作者姓名:陶振文  张俊锋
作者单位:国网江西省电力公司电力科学研究院,国网江西省电力公司电力科学研究院
基金项目:基于压缩感知的精密轴高精度视觉测量方法研究 国家自然科学基金:61762037
摘    要:传统风险评估系统普遍存在可操作性差,评估准确性低的问题,为此,在物联网环境下,设计了一种不协调目标信息脆弱性风险评估系统。依据规则集识别物联网环境下不同类型的不协调目标信息,将不协调目标信息脆弱性评估问题按照目标、评价准则和方案划分成三个层次。对同一层次中的要素进行分析比较,得到各个要素和各个备选策略的权重,考虑风险分布规律和不协调目标信息分布规律,对脆弱性重要程度施行量化处理,通过评估脆弱性得到每条不协调目标信息的脆弱性列表。对存在风险的不协调目标信息及其造成的损失进行分析,得到相应的风险大小,确定不协调目标信息脆弱性风险等级。实验结果表明,所设计系统可操作性强,评估准确性高。

关 键 词:物联网环境  不协调目标信息  脆弱性  风险  评估
收稿时间:2017/9/12 0:00:00
修稿时间:2018/3/11 0:00:00

Research on risk assessment system of heterogeneous target information vulnerability in Internet of things
Tao Zhenwen and Zhang Junfeng.Research on risk assessment system of heterogeneous target information vulnerability in Internet of things[J].Science Technology and Engineering,2018,18(9).
Authors:Tao Zhenwen and Zhang Junfeng
Institution:State Grid Jiangxi Electric Power Company Electric Power Research Institute,State Grid Jiangxi Electric Power Company Electric Power Research Institute
Abstract:The traditional risk assessment system has the problems of poor operability and low evaluation accuracy. Therefore, in the context of Internet of things, a risk assessment system of inconsistent target information vulnerability is designed. According to the rule set, different types of inconsistent target information in the Internet of things are identified, and the problem of the evaluation of the inconsistent target information vulnerability is divided into three levels according to the target, the evaluation criteria and the scheme. The elements of the same level of analysis and comparison, get the weight of each factor and various alternative strategies, considering the risk distribution and inconsistent information distribution, the vulnerability degree of importance to quantitative processing, fragile vulnerability list of each inconsistent information through evaluation. The risk of inconsistent target information and its losses are analyzed, the corresponding risk size is determined, and the risk grade of inconsistent target information vulnerability is determined. The experimental results show that the designed system is highly operational and highly accurate.
Keywords:Internet of things environment  inconsistent target information  vulnerability  risk  evaluation
本文献已被 CNKI 等数据库收录!
点击此处可从《科学技术与工程》浏览原始摘要信息
点击此处可从《科学技术与工程》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号