1. Introduction
The techniques of the Internet of Things (IoT) have been widely used in electric power distribution networks and form the PDIoT. Different from the traditional power distribution network (PDN), PDIoT has may distinctive characteristics: (1) it has a complex network architecture, (2) master stations are located in the cloud, (3) electric terminal devices are connected by the IoT, and (4) it has a flexible architecture, which can be freely expanded. The above characteristics make the PDIoT more vulnerable than traditional PDN. In recent years, the network security situation has become increasingly severe, and the security events of IoT and industrial control systems [
1,
2] have increased year by year [
3,
4]. Through analysis, we found that most of the security problems in PDIoT originated from the following sources: sensors, the network, and terminal devices. Some functional components in the sensors may be attacked to obtain abnormal data and affect system stability. In addition, with functional components as a pluggable expansion module, there may be security risks, permission abuse, and other issues. Network security has a large exposure surface, and a large number of terminals and network interfaces will be deployed to the user side and all levels of system nodes. Malicious attackers can gain physical access to a very large number of points, and these points are difficult to monitor in a comprehensive and timely manner. The terminal devices can attack more paths, such as tablets and other mobile terminals running on various types of third-party developed measurement and control equipment management software, and there may be data leakage, malicious attacks, abuse of privileges, and other abnormal behavior. Therefore, scientific evaluation of the safe and reliable performance of the PDIoT system and a timely grasp of the operation and maintenance status of the distribution network are of great significance to guarantee the security of the PDIoT.
At present, the security assessment of the PDIoT is facing problems of subjectivity and repetition. The traditional reliability assessment method is rule- or model-driven. The main research methods include the fuzzy comprehensive evaluation method, principal component analysis, analytic hierarchy process, etc. For example, Guo et al. [
5] proposed a security risk evaluation method for urban power grids based on the fuzzy comprehensive evaluation method, and calculated the security risk level of a city, providing a basis for power grid enterprises to put forward risk control measures in terms of management measures, technical measures, and working standards. However, there is a strong subjectivity in determining the index weights with a complicated calculation process. He et al. [
6] applied the principal component analysis method to reduce the dimensions and compress the original variables of power equipment status to obtain the principal component system, and then established a comprehensive evaluation model based on the principal component system to perform a comprehensive and objective evaluation of power equipment status, which has certain practicability. However, the meaning of the integrated evaluation function in this method is unclear when the sign of the factor loadings is positive or negative. Lu et al. [
7] designed a state evaluation method of an electric energy metering device by using the analytic hierarchy process and obtained the conclusion of fuzzy evaluation of the operating state of electric energy metering devices. However, it is difficult to conduct consistency tests on the judgment matrix, and the selection of test criteria also lacks a sufficient basis [
8].
In response to the above problems, we establish a security evaluation index system for PDIoT based on sensors, networks, and terminal devices, and abstract it into three levels: sensing layer, network layer, and application layer. We record these three levels as primary evaluation indexes, and establish secondary evaluation indexes under each primary index, totaling 16. The entropy power method is introduced to establish the evaluation matrix of PDIoT indexes and carry out the structural entropy calculation, and the cognitive blindness is processed to obtain the weight coefficient ratio of evaluation indexes, which can combine subjective and objective assignment [
9]. The cloud model theory is used to study the safety evaluation of the PDIoT system, which can solve the problems of complexity and uncertainty and reveal the inner relationship between randomness and fuzziness [
10], which is more consistent with objective facts and higher accuracy of evaluation results than traditional evaluation methods, and makes the evaluation results more intuitive and accurate.
We applied the above method to conduct a security risk assessment on the PDIoT system of the Meizhou Power Supply Bureau of Guangdong Power Grid, and the experiment shows that the security risk level of the PDIoT in this area is “better”, in which the security risk of the network layer is slightly higher, and the security of the sensing layer and the application layer is better. The overall evaluation results are consistent with the facts.
Our main contributions can be summarized as:
Proposing a novel approach to PDIoT security assessment, combining subjective and objective assignment of evaluation indicators, while enabling the interconversion between qualitative and quantitative evaluation indicators, as well as making the evaluation results more intuitive and accurate.
Constructing a new security evaluation index system for PDIoT and scoring criteria.
Putting forward improvement suggestions for modules of potential security risks for the PDIoT.
The rest of this paper is organized as follows. In
Section 2, we construct the evaluation index system scientifically and systematically, and set the scoring criteria and principles according to the characteristics of PDIoT. In
Section 3, we introduce the entropy-weight method and calculate the weight of each index based on the entropy-weight method. In
Section 4, we introduce the cloud model theory, build a comprehensive cloud model of the PDIoT, and use the PDIoT system of Meizhou Power Supply Bureau of Guangdong Power Grid as an example to carry out an empirical test to determine the security level of the PDIoT system in the region and provide the corresponding analysis of the evaluation results. The main conclusions of this paper are presented in
Section 5.
2. Construction of Evaluation Index System
2.1. Construction of Security Evaluation Index
The establishment of the evaluation index system of PDIoT should conform to the principles of systemic and scientific evaluation and be operable, and the evaluation indexes should be independent of each other [
11,
12]. According to the fact that the PDIoT has a similar architecture to other IoT applications and is basically the same in terms of technology and functional level, and the security flaws of PDIoT mainly come from three aspects: sensors, network, and terminal devices, we abstracted it into three levels: perception layer, network layer, and application layer [
13]. We recorded these three levels as the first-level evaluation index, referring to the relevant standards of the PDIoT, and established a second-level evaluation index under each first-level index, with a total of 16 indicators, as shown in
Figure 1.
2.2. Scoring Criteria and Principles
Based on the characteristics of PDIoT and combined with the security evaluation theory, we divided the security evaluation level of the PDIoT system and the rating of each evaluation index into five levels: “excellent”, “superior”, “moderate”, “poor”, and “awful”. Indicators were unified using a 10-point scale, that is, all evaluation indicators were assessed in the range of [0, 10], with higher scores indicating higher security. According to the relevant industry standards, operating procedures, and expert recommendations, we divided the evaluated values into five intervals, namely: [0, 3), [3, 5), [5, 7), [7, 9), and [9, 10], and the corresponding five levels are “awful”, “poor”, “moderate”, “superior”, and “excellent”.
5. Conclusions
In this paper, we built a safety evaluation index system containing three first-level indicators and sixteen second-level indicators for the characteristics of PDIoT, combined with the actual site, relevant operation procedures, and management documents. Then, based on the entropy-weight method, we performed an objective evaluation of the evaluation index weight of the PDIoT, and used the entropy theory to objectively correct the evaluation differences of different experts. We introduced the cloud model into the security evaluation of PDIoT to solve the randomness and fuzziness between the security level of PDIoT and different indicators. To verify the feasibility of the method, we analyzed the case of the PDIoT system of Meizhou Power Supply Bureau of Guangdong Power Grid. The evaluation results showed that the characteristic parameters of the integrated cloud of the PDIoT system in this area were
,
and
, and the comprehensive membership degrees were
and
, indicating that the security level in this area was in a “superior” security state, which is consistent with the actual situation of this area, which proved that the evaluation method proposed in this paper is effective and feasible. Then, we compared and analyzed the security evaluation method used in this paper with the entropy-weight fuzzy set method, and found that the evaluation results of the two methods were similar. However, the evaluation results of the cloud model were more intuitive and persuasive. Finally, according to the evaluation results, we put forward some reasonable suggestions for the PDIoT system in this area to reduce the possible security risks. In the future, the deep learning-based technique [
25,
26,
27] will be examined to improve the performance of PDIoT.