Visible to the public Biblio

Filters: Author is Li, Da  [Clear All Filters]
2023-04-14
Peng, Jiaqi, Yang, Ke, Xuan, Jiaxing, Li, Da, Fan, Lei.  2022.  Research on Trust Measurement of Terminal Equipment Based on Device Fingerprint. 2022 International Conference on Blockchain Technology and Information Security (ICBCTIS). :151–155.
Nowadays, network information security is of great concern, and the measurement of the trustworthiness of terminal devices is of great significance to the security of the entire network. The measurement method of terminal device security trust still has the problems of high complexity, lack of universality. In this paper, the device fingerprint library of device access network terminal devices is first established through the device fingerprint mixed collection method; Secondly, the software and hardware features of the device fingerprint are used to increase the uniqueness of the device identification, and the multi- dimensional standard metric is used to measure the trustworthiness of the terminal device; Finally, Block chain technology is used to store the fingerprint and standard model of network access terminal equipment on the chain. To improve the security level of network access devices, a device access method considering the trust of terminal devices from multiple perspectives is implemented.
Li, Da, Guo, Qinglei, Bai, Desheng, Zhang, Wei.  2022.  Research and Implementation on the Operation and Transaction System Based on Blockchain Technology for Virtual Power Plant. 2022 International Conference on Blockchain Technology and Information Security (ICBCTIS). :165–170.
Virtual power plants are among the promising ways that variable generation and flexible demand may be optimally balanced in the future. The virtual power plant is an important branch of the energy internet, and it plays an important role in the aggregation of distributed power generation resources and the establishment of virtual power resource transactions. However, in the existing virtual power plant model, the following problems are becoming increasingly prominent, such as safeguard, credit rating system, privacy protection, benefit distribution. Firstly, the operation and transaction mechanism of the virtual power plant was introduced. Then, the blockchain technology is introduced into the virtual power plant transaction to make it more conducive to the information transparent, stable dispatch system, data security, and storage security. Finally, the operation and transaction system based on blockchain technology for the virtual power plant was design.
2023-02-17
Gao, Xueqin, Shang, Tao, Li, Da, Liu, Jianwei.  2022.  Quantitative Risk Assessment of Threats on SCADA Systems Using Attack Countermeasure Tree. 2022 19th Annual International Conference on Privacy, Security & Trust (PST). :1–5.
SCADA systems are one of the critical infrastructures and face many security threats. Attackers can control SCADA systems through network attacks, destroying the normal operation of the power system. It is important to conduct a risk assessment of security threats on SCADA systems. However, existing models for risk assessment using attack trees mainly focus on describing possible intrusions rather than the interaction between threats and defenses. In this paper, we comprehensively consider intrusion likelihood and defense capability and propose a quantitative risk assessment model of security threats based on attack countermeasure tree (ACT). Each leaf node in ACT contains two attributes: exploitable vulnerabilities and defense countermeasures. An attack scenario can be constructed by means of traversing the leaf nodes. We set up six indicators to evaluate the impact of security threats in attack scenarios according to NISTIR 7628 standard. Experimental results show the attack probability of security threats and high-risk attack scenarios in SCADA systems. We can improve defense countermeasures to protect against security threats corresponding to high-risk scenarios. In addition, the model can continually update risk assessments based on the implementation of the system’s defensive countermeasures.
2023-01-20
Liang, Xiao, An, Ningyu, Li, Da, Zhang, Qiang, Wang, Ruimiao.  2022.  A Blockchain and ABAC Based Data Access Control Scheme in Smart Grid. 2022 International Conference on Blockchain Technology and Information Security (ICBCTIS). :52—55.
In the smart grid, the sharing of power data among various energy entities can make the data play a higher value. However, there may be unauthorized access while sharing data, which makes many entities unwilling to share their data to prevent data leakage. Based on blockchain and ABAC (Attribute-based Access Control) technology, this paper proposes an access control scheme, so that users can achieve fine-grained access control of their data when sharing them. The solution uses smart contract to achieve automated and reliable policy evaluation. IPFS (Interplanetary File System) is used for off-chain distributed storage to share the storage pressure of blockchain and guarantee the reliable storage of data. At the same time, all processes in the system are stored in the blockchain, ensuring the accountability of the system. Finally, the experiment proves the feasibility of the proposed scheme.