Data Security Knowledge Graph for Active Distribution Network

  • Conference paper
  • First Online:
Artificial Intelligence and Robotics (ISAIR 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1700))

Included in the following conference series:

  • 427 Accesses

Abstract

The openness, interconnection and sharing mechanism of the active distribution network bring great security risks to business system data. The existing data security protection strategies for the active distribution network are basically based on encryption, access control, and blockchain technology, which cannot enable the active distribution network operation and maintenance and management personnel to intuitively understand the data security situation affecting the active distribution network from a global perspective. Therefore, this paper combines the concept of knowledge graph to explore the key technologies of data security knowledge graphs for the active distribution network. First, the key technologies for constructing knowledge graph are explained in detail from named entity recognition, entity relation extraction and entity alignment. And then, with the active distribution network data as the object, the process of constructing data security knowledge graph for active distribution network is explained. Finally, the challenge of constructing a data security knowledge map for active distribution network is given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (Canada)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wang, J., et al.: Review on information and communication key technologies of energy internet. Smart grid 3(6), 473–485 (2015)

    Google Scholar 

  2. Lu, H., Zhang, M., Xu, X., Li, Y., Shen, H.T.: Deep fuzzy hashing network for efficient image retrieval. IEEE Trans. Fuzzy Syst. 29(1), 166–176 (2020)

    Article  Google Scholar 

  3. Mendsaikhan, O., Hasegawa, H., Yamaguchi, Y., Shimada, H.: Quantifying the significance and relevance of cyber-security text through textual similarity and cyber-security knowledge graph. IEEE Access 8, 177041–177052 (2020)

    Article  Google Scholar 

  4. Shahzad, Y., Javed, H., Farman, H., Ahmad, J., Jan, B., Zubair, M.: Internet of energy: opportunities, applications, architectures and challenges in smart industries. Comput. Electr. Eng. 86, 106739 (2020)

    Article  Google Scholar 

  5. Zhang, J.: Distributed network security framework of energy internet based on internet of things. Sustainable Energy Technol. Assess. 44, 101051 (2021)

    Article  Google Scholar 

  6. Chin, W.L., Li, W., Chen, H.H.: Energy big data security threats in iot-based smart grid communications. IEEE Commun. Mag. 55(10), 70–75 (2017)

    Article  Google Scholar 

  7. Deng, S., Yuan, C., Yang, L., Qin, X., Zhou, A.: Data recovery algorithm under intrusion attack for energy internet. Futur. Gener. Comput. Syst. 100, 109–121 (2019)

    Article  Google Scholar 

  8. Rose, T., Kifayat, K., Abbas, S., Asim, M.: A hybrid anomaly-based intrusion detection system to improve time complexity in the internet of energy environment. J. Parallel Distributed Comput. 145, 124–139 (2020)

    Article  Google Scholar 

  9. Wang, H., Ruan, J., Ma, Z., Zhou, B., Fu, X., Cao, G.: Deep learning aided interval state prediction for improving cyber security in energy internet. Energy 174, 1292–1304 (2019)

    Article  Google Scholar 

  10. Hou, R., Ren, G., Gao, W., Liu, L.: Research on cyberspace multi-objective security algorithm and decision mechanism of energy internet. Futur. Gener. Comput. Syst. 120, 119–124 (2021)

    Article  Google Scholar 

  11. Sani, A.S., Yuan, D., **, J., Gao, L., Yu, S., Dong, Z.Y.: Cyber security framework for internet of things-based energy internet. Futur. Gener. Comput. Syst. 93, 849–859 (2019)

    Article  Google Scholar 

  12. Hou, R., Ren, G., Zhou, C., Yue, H., Liu, H., Liu, J.: Analysis and research on network security and privacy security in ubiquitous electricity internet of things. Comput. Commun. 158, 64–72 (2020)

    Article  Google Scholar 

  13. Wang, P., **ang, T., Li, X., **ang, H.: Access control encryption without sanitizers for internet of energy. Inf. Sci. 546, 924–942 (2021)

    Article  MathSciNet  Google Scholar 

  14. Sani, A.S., Yuan, D., Bao, W., Dong, Z.Y.: A universally composable key exchange protocol for advanced metering infrastructure in the energy internet. IEEE Trans- actions on Industrial Informatics 17(1), 534–546 (2020)

    Article  Google Scholar 

  15. Guan, Z., Lu, X., Wang, N., Wu, J., Du, X., Guizani, M.: Towards secure and efficient energy trading in iiot-enabled energy internet: a blockchain approach. Futur. Gener. Comput. Syst. 110, 686–695 (2020)

    Article  Google Scholar 

  16. Tu, C., He, X., Liu, X., Shuai, Z., Yu, L.: Resilient and fast state estimation for en- ergy internet: a data-based approach. IEEE Trans. Industr. Inf. 15(5), 2969–2979 (2019)

    Article  Google Scholar 

  17. Liu, X., Wu, Z.: Online defense research of spatial-hidden malicious data injection attacks in smart grid. In: Proc. Chin. Soc. Electr. Eng. vol. 13, pp. 1520–1534 (2020)

    Google Scholar 

  18. Rawat, D.B., Bajracharya, C.: Detection of false data injection attacks in smart grid communication systems. IEEE Signal Process. Lett. 22(10), 1652–1656 (2015)

    Article  Google Scholar 

  19. Huang, X., Tang, J., Tan, Z., Zeng, W., Wang, J., Zhao, X.: Knowledge graph embedding by relational and entity rotation. Knowl.-Based Syst. 229, 107310 (2021)

    Article  Google Scholar 

  20. Liao, X., Yuan, K., Wang, X., Li, Z., **ng, L., Beyah, R.: Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 755–766 (2016)

    Google Scholar 

  21. Hung, J.C., Chang, J.W.: Multi-level transfer learning for improving the performance of deep neural networks: theory and practice from the tasks of facial emotion recognition and named entity recognition. Appl. Soft Comput. 109, 107491 (2021)

    Article  Google Scholar 

  22. Santoso, J., Setiawan, E.I., Purwanto, C.N., Yuniarno, E.M., Hariadi, M., Purnomo, M.H.: Named entity recognition for extracting concept in ontology building on indonesian language using end-to-end bidirectional long short term memory. Expert Syst. Appl. 176, 114856 (2021)

    Article  Google Scholar 

  23. Lu, H., Yang, R., Deng, Z., Zhang, Y., Gao, G., Lan, R.: Chinese image caption- ing via fuzzy attention-based densenet-bilstm. ACM Trans. Multimedia Computing, Communications, and Applications (TOMM) 17(1s), 1–18 (2021)

    Google Scholar 

  24. Wan, Q., Wei, L., Chen, X., Liu, J.: A region-based hypergraph network for joint entity-relation extraction. Knowl.-Based Syst. 228, 107298 (2021)

    Article  Google Scholar 

  25. Shi, Y., **ao, Y., Quan, P., Lei, M., Niu, L.: Distant supervision relation extraction via adaptive dependency-path and additional knowledge graph supervision. Neural Netw. 134, 42–53 (2021)

    Article  Google Scholar 

  26. Wen, H., Zhu, X., Zhang, L., Li, F.: A gated piecewise cnn with entity-aware enhancement for distantly supervised relation extraction. Inf. Process. Manage. 57(6), 102373 (2020)

    Article  Google Scholar 

  27. Hou, S., Lu, R.: Knowledge-guided unsupervised rhetorical parsing for text summarization. Inf. Syst. 94, 101615 (2020)

    Article  Google Scholar 

  28. Zeng, D., Liu, K., Chen, Y., Zhao, J.: Distant supervision for relation extraction via piecewise convolutional neural networks. In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, pp. 1753–1762 (2015)

    Google Scholar 

  29. Zheng, Q., Zhu, J., Tang, H., Liu, X., Li, Z., Lu, H.: Generalized label enhancement with sample correlations. IEEE Transactions on Knowledge and Data Engineering (2021)

    Google Scholar 

  30. Zeng, K., Li, C., Hou, L., Li, J., Feng, L.: A comprehensive survey of entity alignment for knowledge graphs. AI Open 2, 1–13 (2021)

    Article  Google Scholar 

  31. Zhu, H., **e, R., Liu, Z., Sun, M.: Iterative entity alignment via knowledge embeddings. In: Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI) (2017)

    Google Scholar 

  32. Huimin, L., Zhang, M., Xu, X.LDeep fuzzy hashing network for efficient image retrieval. IEEE Transactions on Fuzzy Systems (2020). https://doi.org/10.1109/TFUZZ.2020.2984991

  33. Huimin, L., Li, Y., Chen, M., et al.: Brain Intelligence: go beyond artificial intelligence. Mobile Networks Appl. 23, 368–375 (2018)

    Article  Google Scholar 

  34. Huimin, L., Li, Y., Shenglin, M., et al.: Motor anomaly detection for unmanned aerial vehicles using reinforcement learning. IEEE Internet Things J. 5(4), 2315–2322 (2018)

    Article  Google Scholar 

  35. Huimin, L., Qin, M., Zhang, F., et al.: RSCNN: A CNN-based method to en-hance low-light remote-sensing images. Remote Sensing 13(1), 62 (2020)

    Google Scholar 

  36. Huimin, L., Zhang, Y., Li, Y., et al.: User-oriented virtual mobile network resource management for vehicle communications. IEEE Trans. Intelligent Transportation Syst. 22(6), 3521–3532 (2021)

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported by the State Grid Shanghai Municipal Electric Power Company Technology Projects (B30935210005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Song Deng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, Q., Dai, R., Wei, S., Zhang, J., Deng, S. (2022). Data Security Knowledge Graph for Active Distribution Network. In: Yang, S., Lu, H. (eds) Artificial Intelligence and Robotics. ISAIR 2022. Communications in Computer and Information Science, vol 1700. Springer, Singapore. https://doi.org/10.1007/978-981-19-7946-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-7946-0_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-7945-3

  • Online ISBN: 978-981-19-7946-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation