Visible to the public Biblio

Filters: Author is Liang, Haolan  [Clear All Filters]
2022-05-05
Liang, Haolan, Ye, Chunxiao, Zhou, Yuangao, Yang, Hongzhao.  2021.  Anomaly Detection Based on Edge Computing Framework for AMI. 2021 IEEE International Conference on Electrical Engineering and Mechatronics Technology (ICEEMT). :385—390.
Aiming at the cyber security problem of the advanced metering infrastructure(AMI), an anomaly detection method based on edge computing framework for the AMI is proposed. Due to the characteristics of the edge node of data concentrator, the data concentrator has the capability of computing a large amount of data. In this paper, distributing the intrusion detection model on the edge node data concentrator of the AMI instead of the metering center, meanwhile, two-way communication of distributed local model parameters replaces a large amount of data transmission. The proposed method avoids the risk of privacy leakage during the communication of data in AMI, and it greatly reduces communication delay and computational time. In this paper, KDDCUP99 datasets is used to verify the effectiveness of the method. The results show that compared with Deep Convolutional Neural Network (DCNN), the detection accuracy of the proposed method reach 99.05%, and false detection rate only gets 0.74%, and the results indicts the proposed method ensures a high detection performance with less communication rounds, it also reduces computational consumption.
2022-04-01
Liu, Dongqi, Wang, Zhou, Liang, Haolan, Zeng, Xiangjun.  2021.  Artificial Immune Technology Architecture for Electric Power Equipment Embedded System. 2021 IEEE International Conference on Electrical Engineering and Mechatronics Technology (ICEEMT). :485–490.
This paper proposes an artificial immune information security protection technology architecture for embedded system of Electric power equipment. By simulating the three functions of human immunity, namely "immune homeostasis", "immune surveillance" and "immune defense", the power equipment is endowed with the ability of human like active immune security protection. Among them, "immune homeostasis" is constructed by trusted computing technology components to establish a trusted embedded system running environment. Through fault-tolerant component construction, "immune surveillance" and "immune defense" realize illegal data defense, business logic legitimacy check and equipment status evaluation, realize real-time perception and evaluation of power equipment's own security status, as well as fault emergency handling and event backtracking record, so that power equipment can realize self recovery from abnormal status. The proposed technology architecture is systematic, scientific and rich in scalability, which can significantly improve the information security protection ability of electric power equipment.