Abstract
The openness, interconnection and sharing mechanism of the active distribution network bring great security risks to business system data. The existing data security protection strategies for the active distribution network are basically based on encryption, access control, and blockchain technology, which cannot enable the active distribution network operation and maintenance and management personnel to intuitively understand the data security situation affecting the active distribution network from a global perspective. Therefore, this paper combines the concept of knowledge graph to explore the key technologies of data security knowledge graphs for the active distribution network. First, the key technologies for constructing knowledge graph are explained in detail from named entity recognition, entity relation extraction and entity alignment. And then, with the active distribution network data as the object, the process of constructing data security knowledge graph for active distribution network is explained. Finally, the challenge of constructing a data security knowledge map for active distribution network is given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Wang, J., et al.: Review on information and communication key technologies of energy internet. Smart grid 3(6), 473–485 (2015)
Lu, H., Zhang, M., Xu, X., Li, Y., Shen, H.T.: Deep fuzzy hashing network for efficient image retrieval. IEEE Trans. Fuzzy Syst. 29(1), 166–176 (2020)
Mendsaikhan, O., Hasegawa, H., Yamaguchi, Y., Shimada, H.: Quantifying the significance and relevance of cyber-security text through textual similarity and cyber-security knowledge graph. IEEE Access 8, 177041–177052 (2020)
Shahzad, Y., Javed, H., Farman, H., Ahmad, J., Jan, B., Zubair, M.: Internet of energy: opportunities, applications, architectures and challenges in smart industries. Comput. Electr. Eng. 86, 106739 (2020)
Zhang, J.: Distributed network security framework of energy internet based on internet of things. Sustainable Energy Technol. Assess. 44, 101051 (2021)
Chin, W.L., Li, W., Chen, H.H.: Energy big data security threats in iot-based smart grid communications. IEEE Commun. Mag. 55(10), 70–75 (2017)
Deng, S., Yuan, C., Yang, L., Qin, X., Zhou, A.: Data recovery algorithm under intrusion attack for energy internet. Futur. Gener. Comput. Syst. 100, 109–121 (2019)
Rose, T., Kifayat, K., Abbas, S., Asim, M.: A hybrid anomaly-based intrusion detection system to improve time complexity in the internet of energy environment. J. Parallel Distributed Comput. 145, 124–139 (2020)
Wang, H., Ruan, J., Ma, Z., Zhou, B., Fu, X., Cao, G.: Deep learning aided interval state prediction for improving cyber security in energy internet. Energy 174, 1292–1304 (2019)
Hou, R., Ren, G., Gao, W., Liu, L.: Research on cyberspace multi-objective security algorithm and decision mechanism of energy internet. Futur. Gener. Comput. Syst. 120, 119–124 (2021)
Sani, A.S., Yuan, D., **, J., Gao, L., Yu, S., Dong, Z.Y.: Cyber security framework for internet of things-based energy internet. Futur. Gener. Comput. Syst. 93, 849–859 (2019)
Hou, R., Ren, G., Zhou, C., Yue, H., Liu, H., Liu, J.: Analysis and research on network security and privacy security in ubiquitous electricity internet of things. Comput. Commun. 158, 64–72 (2020)
Wang, P., **ang, T., Li, X., **ang, H.: Access control encryption without sanitizers for internet of energy. Inf. Sci. 546, 924–942 (2021)
Sani, A.S., Yuan, D., Bao, W., Dong, Z.Y.: A universally composable key exchange protocol for advanced metering infrastructure in the energy internet. IEEE Trans- actions on Industrial Informatics 17(1), 534–546 (2020)
Guan, Z., Lu, X., Wang, N., Wu, J., Du, X., Guizani, M.: Towards secure and efficient energy trading in iiot-enabled energy internet: a blockchain approach. Futur. Gener. Comput. Syst. 110, 686–695 (2020)
Tu, C., He, X., Liu, X., Shuai, Z., Yu, L.: Resilient and fast state estimation for en- ergy internet: a data-based approach. IEEE Trans. Industr. Inf. 15(5), 2969–2979 (2019)
Liu, X., Wu, Z.: Online defense research of spatial-hidden malicious data injection attacks in smart grid. In: Proc. Chin. Soc. Electr. Eng. vol. 13, pp. 1520–1534 (2020)
Rawat, D.B., Bajracharya, C.: Detection of false data injection attacks in smart grid communication systems. IEEE Signal Process. Lett. 22(10), 1652–1656 (2015)
Huang, X., Tang, J., Tan, Z., Zeng, W., Wang, J., Zhao, X.: Knowledge graph embedding by relational and entity rotation. Knowl.-Based Syst. 229, 107310 (2021)
Liao, X., Yuan, K., Wang, X., Li, Z., **ng, L., Beyah, R.: Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 755–766 (2016)
Hung, J.C., Chang, J.W.: Multi-level transfer learning for improving the performance of deep neural networks: theory and practice from the tasks of facial emotion recognition and named entity recognition. Appl. Soft Comput. 109, 107491 (2021)
Santoso, J., Setiawan, E.I., Purwanto, C.N., Yuniarno, E.M., Hariadi, M., Purnomo, M.H.: Named entity recognition for extracting concept in ontology building on indonesian language using end-to-end bidirectional long short term memory. Expert Syst. Appl. 176, 114856 (2021)
Lu, H., Yang, R., Deng, Z., Zhang, Y., Gao, G., Lan, R.: Chinese image caption- ing via fuzzy attention-based densenet-bilstm. ACM Trans. Multimedia Computing, Communications, and Applications (TOMM) 17(1s), 1–18 (2021)
Wan, Q., Wei, L., Chen, X., Liu, J.: A region-based hypergraph network for joint entity-relation extraction. Knowl.-Based Syst. 228, 107298 (2021)
Shi, Y., **ao, Y., Quan, P., Lei, M., Niu, L.: Distant supervision relation extraction via adaptive dependency-path and additional knowledge graph supervision. Neural Netw. 134, 42–53 (2021)
Wen, H., Zhu, X., Zhang, L., Li, F.: A gated piecewise cnn with entity-aware enhancement for distantly supervised relation extraction. Inf. Process. Manage. 57(6), 102373 (2020)
Hou, S., Lu, R.: Knowledge-guided unsupervised rhetorical parsing for text summarization. Inf. Syst. 94, 101615 (2020)
Zeng, D., Liu, K., Chen, Y., Zhao, J.: Distant supervision for relation extraction via piecewise convolutional neural networks. In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, pp. 1753–1762 (2015)
Zheng, Q., Zhu, J., Tang, H., Liu, X., Li, Z., Lu, H.: Generalized label enhancement with sample correlations. IEEE Transactions on Knowledge and Data Engineering (2021)
Zeng, K., Li, C., Hou, L., Li, J., Feng, L.: A comprehensive survey of entity alignment for knowledge graphs. AI Open 2, 1–13 (2021)
Zhu, H., **e, R., Liu, Z., Sun, M.: Iterative entity alignment via knowledge embeddings. In: Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI) (2017)
Huimin, L., Zhang, M., Xu, X.LDeep fuzzy hashing network for efficient image retrieval. IEEE Transactions on Fuzzy Systems (2020). https://doi.org/10.1109/TFUZZ.2020.2984991
Huimin, L., Li, Y., Chen, M., et al.: Brain Intelligence: go beyond artificial intelligence. Mobile Networks Appl. 23, 368–375 (2018)
Huimin, L., Li, Y., Shenglin, M., et al.: Motor anomaly detection for unmanned aerial vehicles using reinforcement learning. IEEE Internet Things J. 5(4), 2315–2322 (2018)
Huimin, L., Qin, M., Zhang, F., et al.: RSCNN: A CNN-based method to en-hance low-light remote-sensing images. Remote Sensing 13(1), 62 (2020)
Huimin, L., Zhang, Y., Li, Y., et al.: User-oriented virtual mobile network resource management for vehicle communications. IEEE Trans. Intelligent Transportation Syst. 22(6), 3521–3532 (2021)
Acknowledgment
This work was supported by the State Grid Shanghai Municipal Electric Power Company Technology Projects (B30935210005).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, Q., Dai, R., Wei, S., Zhang, J., Deng, S. (2022). Data Security Knowledge Graph for Active Distribution Network. In: Yang, S., Lu, H. (eds) Artificial Intelligence and Robotics. ISAIR 2022. Communications in Computer and Information Science, vol 1700. Springer, Singapore. https://doi.org/10.1007/978-981-19-7946-0_17
Download citation
DOI: https://doi.org/10.1007/978-981-19-7946-0_17
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-7945-3
Online ISBN: 978-981-19-7946-0
eBook Packages: Computer ScienceComputer Science (R0)