Next Article in Journal
A Refined Model for Carbon Footprint Estimation in Electric Railway Transport
Previous Article in Journal
Pressure Monitoring in Medium-Voltage Vacuum Interrupters
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Safety Index, Evaluation Model, and Comprehensive Evaluation Method of Power Information System under Classified Protection 2.0

1
Beijing Engineering Research Center of Energy Electric Power Information Security, North China Electric Power University, Beijing 102206, China
2
Hangzhou Hikvision Digital Technology Co., Ltd., Hangzhou 311599, China
3
State Grid Dalian Changxing Island Lingang Industrial District Power Supply Company, Dalian 116300, China
*
Author to whom correspondence should be addressed.
Energies 2023, 16(18), 6566; https://doi.org/10.3390/en16186566
Submission received: 28 June 2023 / Revised: 8 August 2023 / Accepted: 8 September 2023 / Published: 12 September 2023
(This article belongs to the Section F: Electrical Engineering)

Abstract

:
Aiming at the problems of the low integration of the current power information system security assessment method with classified protection 2.0, strong subjectivity, and the vague quantification of objective indexes, this article proposes to establish a safety index system suitable for the electric power information system with the existing safety inspection standards for power systems on the basis of the classified protection 2.0 evaluation system. Additionally, it quantifies each index through a quantitative method combining subjective and objective methods and uses the analytic hierarchy process entropy method to obtain the combined weight of the evaluation index system. Finally, this paper summarizes the expert scores and the graded protection evaluation reports of the six systems into the original data for comprehensive weight calculation and analyzes the rationality of the weight change. The comparison and analysis of the closeness of the TOPSIS (Technique for Order Preference by Similarity to an Ideal Solution) and the evaluation score of the equal guarantee have confirmed the scientificity and rationality of the evaluation model. It provides a reasonable logical idea for the implementation of the classified protection 2.0 system in the power information system.

1. Introduction

With the continuous development of modern information technology, all walks of life show the trend of intelligence and informatization [1]. The generality and heterogeneity characteristics of network security borders are becoming increasingly obvious, the pressure of network security defense has been increasing, and network security work has risen to the national strategic height [2]. In 2019, the promulgation of the basic requirements [3] for the protection of the information security technology network security level in “(GB/T 22239-2019)” [4] and other standards put forward more detailed information in new areas such as cloud computing, the Internet of Things, mobile internet, industrial control, big data, and other new areas. As an important part of the power grid, network security is of great significance for the network security and reliable operation of the power grid [5].
At present, the deep integration of advanced information and communication technology such as artificial intelligence, big data, and the Internet of Things is often compared with the traditional power grid, and the new power system is more multisource, open, and general. Due to this great expansion, the difficulty of security protection increased sharply [6,7], and improvements in the safety construction of the power system are urgently needed. Compliance inspections and security assessments are important ways to guide the security construction of the power information system. To this end, this article seeks to understand the current status of the network security of the power system, combined with the network security classified protection 2.0 (hereinafter referred to as the “classified protection 2.0”), and proposes a safety assessment system of the power information system based on classified protection 2.0 [8]. In addition, this paper also integrates Trusted Computing into the power system, proposes a power system security protection model, improves the traditional TOPSIS evaluation algorithm, proposes a comprehensive evaluation method combining subjective and objective methods, uses this algorithm to analyze the proposed scheme, and proves the feasibility of the algorithm and the rationality of the scheme. It provides an important theoretical basis for the safe, reliable, and standardized development of the power system.

2. Current Status of Power Information System Security Assessment

2.1. Power Industry Safety Standards

The widespread application of emerging information technology in the power system has led to the continuous expansion of the construction scale of the power system and the massive increase in the types and number of devices involved in the network, resulting in the blurring of the power system network security boundary and the increasingly serious threat of internal and external attacks. As an important component of key information infrastructure, the power system is closely related to people’s daily life, ensuring its network security, and is related to national security and public interests [9].
At present, the relevant protection regulations and management methods for power system network security are relatively complete, and a relatively complete security system has been constructed. However, most of its standard regulations are management systems formed before the formulation of the relevant system standards of classified protection 2.0, and the new content in classified protection 2.0 cannot be well applied. According to the revised ideas and methods of classified protection 2.0 in addition to the universal requirements, evaluation specifications should also be formulated for specific technologies and fields (such as cloud computing, mobile internet, Internet of Things, industrial control, big data, etc.) [10]. To this end, the network security management methods for power information systems should also keep pace with the times and formulate appropriate policy standards for specific fields.
The network security classified protection system 2.0 is constructed by a series of standards, and its main standard documents include the “Information Security Technology Network Security Level Protection Implementation Guide”, “Information Security Technology Network Security Level Protection Grading Guidelines”, “Information Security Technology Network Security Level Protection Grading Guidelines”, ”Information Security Technology Network Security Classification Guidelines”, “Basic Requirements for Network Security Graded Protection”, etc. [11] In the classified protection 2.0 standard, the objects of level protection have been expanded from narrow information systems to network infrastructure, cloud computing platforms/systems, big data platforms/systems, Internet of Things, industrial control systems, systems using mobile internet technology, etc. [12], based on new technologies and new means to propose a new graded technical protection mechanism. Perfect management means are the content that must be considered in the classified protection 2.0 standard.
The implementation of classified protection evaluation generally consists of the following five steps: system grading, filing, construction rectification, grade evaluation, and supervision and inspection [12]. The core standard of classified protection 2.0 is “Basic Requirements for Graded Protection of Information Security Technology Network Security GB/T22239-2019” [4], which specifies the security requirements for the assessment objects of graded protection, which can be divided into two parts: security technical requirements and security management requirements. These are each subdivided into five levels. Technical requirements are divided into safe physical environment, safe communication network, safe area boundary, safe computing environment, and safety management center; management requirements are divided into safety management system, safety management organization, safety management personnel, safety construction management, and safety operation and maintenance management. The classified protection 2.0 architecture is shown in Figure 1.
In the face of different levels of systems, their security requirements are also different. The information security classified protection is divided into five levels: the first level (autonomous protection level), the second level (guidance protection level), the third level (supervision protection level), the fourth level (mandatory protection level), and the fifth level (special control protection level) [13,14,15]. The higher the level of the system, the higher its security requirements. For example, units with high network security requirements such as electricity, military, and finance industries are generally rated as level 3 or level 4 of hierarchical protection. The requirements for level 3 are mainly reflected in network access control, dial-up access control, network security audit, and other specific requirements [16].
This paper analyzes the network security level protection for the power information system as a whole, and the power information system is divided into the power consumption information acquisition system, load control system, power dispatching system, and so on. According to the “Guidelines for Cybersecurity Assessment of Electric Power Monitoring Systems (GB/T 38318-2019)” [17], the protection level of cybersecurity for power communication systems above the provincial level is level 3. In order to ensure the universality and effectiveness of the establishment of the index system, this paper mainly analyzes and models the power information system based on the third-level general requirements and security extension requirements in classified protection 2.0.

2.2. Current Status of Safety Assessment Methods

The power information system security assessment is an important foundation and guarantees the safe and stable operation of the power system. It also points out the direction for the research and formulation of information security management measures. An effective security assessment model can find out the key influencing factors, discover system vulnerabilities in time, and ensure the endogenous security of the power system.
At present, there are relevant standards for the security risk assessment of power information systems, such as the “Code for Information Security Inspection of Power Information Systems” implemented in October 2018, which regulates the inspection process, methods, and content of power information system security. There are also a lot of studies in academic circles for the security risk assessment of power information systems. For example, reference [18] proposes a security risk assessment method for the edge computing information system of the State Grid based on the fuzzy analytic hierarchy process from five aspects: the device layer, the data layer, the network layer, the application layer, and the management layer. Reference [19] is based on practical experience. In summary, the cloud computing platform security capability evaluation system is constructed with three levels: dynamic security assessment, performance efficiency assessment, and static compliance verification. Reference [20] is based on network security classified protection from three aspects: airspace, time domain, and security domain. According to the security mechanism of the power Internet of Things, a multi-dimensional information security quality assessment method is proposed; the document [21] combines the general process of power system security risk assessment and proposes the overall framework and dynamics of the security risk intelligent assessment system based on the machine learning unified security risk assessment model structure.
Most of the above studies focus on the index system summarized from the basic attributes of information security (confidentiality, integrity, availability, authenticity, and controllability), and the degree of integration and applicability of the current classified protection 2.0 system is not high. Most of them only use highly subjective evaluation methods such as the AHP (analytic hierarchy process), and the quantification of objective indexes is relatively vague [22,23,24,25]. Therefore, this paper is based on the classified protection 2.0 evaluation system combined with the existing safety inspection standards of the power system to establish a safety index system suitable for the power information system. It also quantitatively analyzes the indexes through a combination of subjective and objective quantitative methods [26]. The AHP entropy method is used to obtain the combined weight of the evaluation index system, and then the TOPSIS algorithm is used to realize the overall security evaluation of the power information system [27].

3. Establishment of Power Information System Index System Considering Classified Protection 2.0

The main research object of this paper is the power information system, and the power information system security evaluation index system is constructed in combination with the classified protection 2.0 standard, the power information security level evaluation index (GB/T 32351-2015) [28], and the power information system security inspection specification (GB/T 36047-2018) [29]. The index system is divided into three levels: target level (B), primary index (C), and secondary index (D).
This paper mainly evaluates the security of the technical part of the power information system, which is constructed according to classified protection 2.0. The technical part includes five types of first-class indexes: secure physical environment ( C 1 ), secure communication network ( C 2 ), secure area boundary ( C 3 ), secure computing environment ( C 4 ), and security management center ( C 5 ). Under various primary indexes, several secondary indexes are subdivided. The secondary indexes are extracted and established according to grade protection 2.0 and the relevant standards of the power industry. The specific index system is shown in Figure 2.
Since the security evaluation of classified protection 2.0 is conducted by subjective judgment, it is not conducive to academic research. Therefore, this paper integrates and optimizes the secondary indexes with reference to classified protection 2.0 and the relevant standards of the power industry and makes an objective quantitative analysis on some indexes to ensure the comprehensiveness of the security assessment.

3.1. Safe Physical Environment Index

Referring to the basic requirements of level 3 in classified protection 2.0, the secure physical environment index can be optimized and integrated into two level 2 indexes: physical environment conditions ( D 1 ) and physical access control ( D 2 ).
  • Safe physical environment index D 1
The physical environment requirements ( D 1 ) include the physical location selection, anti-theft devices and damage prevention, lightning protection, fire prevention, waterproof and moisture-proof features, anti-static features, temperature and humidity control, power supply protection, and electromagnetic protection. Each item is subdivided into several judgment points, as shown in Table 1.
The physical environmental condition D 1 is a qualitative indicator that is composed of multiple classified protection 2.0 judgment points. Their scores can be expressed by the compliance ratio value, as shown in Equations (1) and (2).
S c o r e i = 1 i   meet   the   requirements ; 0.5 i   Partially   meet   the   requirements ; 0 i   Incompatible   or   Not   Applicable ;
D 1 = S c o r e i N a l l N n u l l
N a l l indicates the total number of judgment points of the physical environmental conditions; N n u l l indicates the number of judgment points that are not applicable; and S c o r e i indicates the score of each judgment point, which is usually obtained through a field evaluation by grade protection evaluation experts. Subsequent qualitative indexes are scored in this way.
2.
Physical access control D 2
Physical access control ( D 2 ) is an index used to evaluate whether the power information system implements the access control of the computer room in accordance with the requirements of classified protection 2.0. It requires that the entrances and exits of the computer room are guarded by special personnel or equipped with an electronic access control system to control, identify, and record the personnel entering. Physical access control D 2 can be expressed by the percentage of machine rooms meeting the requirements of classified protection 2.0, as shown in (3).
D 2 = N s u f f i c e N t o t a l × 100 %
N t o t a l indicates the total number of physical machine rooms of the power information system; N s u f f i c e indicates the number of machine rooms meeting the requirements of classified protection 2.0.

3.2. Safe Communication Network Index

The index of the secure communication network includes three secondary indexes: communication network architecture D 3 , communication transmission D 4 , and trusted verification D 5 .
(1)
Communication network architecture D 3
The core requirements of the communication network architecture ( D 3 ) are as follows: 1. The system network bandwidth is appropriate, and the processing capacity of the core equipment should match the bandwidth. 2. The system network architecture shall be divided into security areas, and corresponding protective measures shall be taken between each area. 3. The whole network design shall ensure the redundancy of communication lines and equipment.
The network communication architecture is composed of measurement indexes and qualitative indexes. The calculation formula of this paper is as follows:
D 3 = a 1 × f ( B ) + i = 2 n a i × S c o r e i
f ( B ) = 1 B r e a l i t y B m a x ; B r e a l i t y B m a x B r e a l i t y < B m a x ;
where a i represents the weight value of each judgment point of item i. In this paper, the weight value is taken as 1/n, which can be adjusted according to the actual importance during the specific implementation. represents the qualitative index judgment point of the communication network architecture D 3 , and its score formula is shown in Formula (1).
In addition, f ( B ) indicates the score of the system network bandwidth, B r e a l i t y indicates the actual network bandwidth, and B m a x indicates the maximum bandwidth required by the service. The unit is Gbps.
(2)
Communication transmission D 4
Communication transmission D 4 is the core index used to ensure the communication transmission quality of the power information system. Its security requirements can be summarized as follows: ensure the integrity and confidentiality of data transmission.
A quantitative analysis of the available packet loss rate must be undertaken for transmission integrity. The smaller the packet loss rate, the better the communication transmission integrity. This equation for this rate is expressed as follows:
P l o s s = V i n p u t P k t s V o u t P k t s V i n p u t P k t s × 100 %
P l o s s is the packet loss rate, V i n p u t P k t s is the size of the input message in the measurement time period, and V o u t P k t s is the size of the output message in the time period.
Transmission confidentiality is a qualitative index that mainly ensures the confidentiality of data in the communication process by checking that cryptographic technology should be used, which can be quantified by Formula (1).
Therefore, considering both data integrity and confidentiality, this paper establishes the communication transmission quantization formula as follows:
D 4 = δ 1 × θ + δ 2 × S c o r e i n
where δ 1 , δ 1 are the weight values of integrity and confidentiality, which are taken as 1/2 in this paper, and can be adjusted according to the actual importance during implementation. S c o r e i is the quantized value of each judgment point of transmission confidentiality, which is quantized by Formula (1); θ is the judgment value of the packet loss rate. Referring to the overload packet loss rate of the China Southern Power Grid, which is required to be lower than 0.1 ‰, the judgment value of the packet loss rate is defined as follows:
θ = 1 P l o s s < 0.1 , c o m p a t i b l e ; 0 P l o s s 0.1 , i n c o m p a t i b l e ;
(3)
Trusted authentication D 5
The trusted verification D 5 is a technical index used to evaluate whether the communication equipment of the power information system is reliable and credible. The trusted verification is carried out through the system boot program, system program, important configuration parameters, and communication application program of the equipment. Trusted verification D 5 is a qualitative index, and it is difficult to obtain accurate values of it through measurement and calculation. In this paper, Equations (1) and (2) are used to quantify it.

3.3. Safety Zone Boundary Index

According to the requirements of classified protection 2.0, the security area boundary puts forward security control requirements for the network boundary of the power information system. The main objects are the system boundary and area boundary, including network gates, firewalls, switches, routers, etc. The security control points involved include boundary protection, access control, intrusion prevention, malicious code and spam prevention, security audit, and trusted verification. In order to ensure the efficiency of index evaluation, this paper refines and integrates three secondary indexes: access and protection strategy D 6 , network attack prevention D 7 , and network attack prevention D 8 .
In the classified protection 2.0 system, the evaluation indexes for the boundary of the security area are qualitative indexes. The three level 2 indexes integrated in this paper are composed of multiple classified protection 2.0 judgment points. The scores of judgment points are shown in Formula (1), and the comprehensive scores of all secondary indexes are shown in Formula (2).

3.4. Safety Calculation of Environment Indexes

The security computing environment puts forward security control requirements for the interior of the boundary. The main objects are all objects of the power information system, including network devices, security devices, server devices, terminal devices, application systems, data objects, and other devices. The security control points involved include identity authentication, access control, security audit, intrusion prevention, malicious code prevention, trusted verification, data integrity, data confidentiality, data backup and recovery, residual information protection, and personal information protection. Combined with the relevant standards of the power industry, this paper refines and integrates four secondary indexes: identity authentication and access strategy D 9 , equipment intrusion prevention D 10 , equipment trusted verification D 11 , and data security D 12 .
  • Identity authentication and access policy D 9
This index includes identity authentication and access control. In this approach, the components are sorted and analyzed according to the level 3 general requirements of classified protection 2.0, and the identity authentication requirements include the following:
  • Identity uniqueness, with automatic de-duplication inspection;
  • Mandatory application function for password complexity;
  • Have login failure function;
  • Encrypted transmission is adopted for remote access;
  • Have more than two identification methods.
The access control requirements include the following:
  • Account authority allocation;
  • Access rules for authorized subjects to objects;
  • Granularity requirements for access control;
  • Set safety signs for important subjects and objects.
2.
Intrusion prevention D 10
Intrusion prevention D 10 can be divided into two parts: intrusion prevention and malicious code prevention. The system is required to detect intrusion on important nodes. It is required to adopt technical measures against malicious code attacks or active immune trusted verification mechanisms to identify intrusion and virus behaviors and effectively block them in a timely manner.
3.
Device trusted verification D 11
The main objects of equipment trusted verification are the network equipment, security equipment, server equipment, terminal equipment, application system, data objects, and other equipment of the power information system. It is required that the trusted root can be used to verify the system boot program, system program, important configuration parameters, and the application program of the computing equipment, and the dynamic trusted verification can be carried out in the key execution links of the application program. After detecting that its credibility is damaged, it will give an alarm, and the verification results will be formed into audit records and sent to the security management center.
4.
Data security D 12
Data security indexes include data integrity, data confidentiality, data backup and recovery, residual information protection, and personal information protection. The specific requirements can be summarized as follows:
  • Data shall not be tampered with or accessed without authorization;
  • Ensure data confidentiality through encryption algorithm;
  • Real-time backup of important data;
  • Only collect and save personal information necessary for business.
Identity authentication and access strategy D 9 , equipment intrusion prevention D 10 , equipment trusted verification D 11 , and data security D 12 are qualitative indexes. The scores of judgment points are shown in Formula (1), and the comprehensive scores of various secondary indexes are shown in Formula (2).

3.5. Indexes of Safety Management Center

The security management center is a new technical requirement in the classified protection 2.0 version compared with the 1.0 version. It strengthens the concept of the security management center and highlights the importance of the security management center in the construction of information security classified protection. Referring to classified protection 2.0, this index item is divided into four level 2 indexes: system management D 13 , audit management D 14 , security management, and centralized control D 16 .
System management D 13 , audit management D 14 , and security management D 15 put forward clear requirements for the management subject, authority control, and control process of system administrators, audit administrators, and security administrators, respectively, and require the management system in the security management center to comply with the “separation of powers” authority management model. Centralized control specifies the centralized control functions that the management system needs to comply with. The four secondary indexes are qualitative indexes. The scores of judgment points are shown in Formula (1), and the comprehensive scores of all secondary indexes are shown in Formula (2).

4. Security Protection Model for Power Information System

4.1. Power Information System Architecture

The architecture of the new power system, like other forms of IoT systems, is divided into four layers: perception layer, network layer, platform layer, and application layer. Since the platform layer is the core of the entire IoT system, generally speaking, the direction from the platform layer to the application layer is called north, the direction from the perception layer is the south, and the platform layer is called the middle platform. The architecture of the power information system is shown in Figure 3.
Perception Layer: Previously, various business departments of the State Grid of China have built some typical applications using terminals, networks, and business systems based on actual needs. The power Internet of Things has begun to take shape, and we believe that the construction of the new power system perception layer is mainly based on the unified communication technology standards of the previous construction of the power grid power system, expanding the perception range in various aspects of the power system.
Network layer: The new power system aims to establish ubiquitous connections between power-related equipment, with a larger number of terminals and information volume compared to the core power system and lower requirements for information security. Due to the high security requirements of data in the power system, it exists in the industrial intranet and has low network scalability. Due to the differences in data volume and data security, the construction of the ubiquitous power IoT requires the construction of another network. A power wireless private network has become the preferred solution due to its high security and low cost.
Platform layer: The construction content of the platform layer mainly includes the data center, State Grid cloud platform, IoT management platform, and other parts. The focus is to achieve IoT management of massive power-related terminals, achieve various types of data collection, collect data at once and use these data everywhere, explore the value of massive data collection, improve platform support ability, achieve refined management of networked devices, improve data processing efficiency, and achieve open and shared platform capabilities.
Application layer: The construction of the application layer is divided into two parts: internal business and external business. The main construction direction of internal business is to improve customer service level, improve enterprise business performance, ensure safe and economic operation of the power grid, and promote clean energy consumption. The main construction direction of external business is to create an intelligent energy storage service platform, cultivate and develop emerging businesses, and build an energy ecosystem. We believe that internal business aims to improve the internal management efficiency of the State Grid by improving the level of intelligence, while external business aims to achieve the transformation of State Grid business through content provision.

4.2. Power System Security Protection Model Based on Trusted Computing

With the in-depth development of the power system, the types and quantities of terminal devices are complex, and their performance and working properties are also very different. There is also a significant gap in their security requirements. Therefore, it is necessary to propose a unified security architecture model to ensure the security of the power system.
The power system is simplified into a three-layer model of a terminal layer, network layer, and master station layer. In order to achieve secure and reliable information exchange in the power system, a security management and control architecture of the power system based on Trusted Computing is proposed to achieve trusted authentication between layers and the integrity measurement of each device. The specific architecture is shown in the Figure 4.
The Trusted Computing technology is integrated into the power system architecture, which is divided into the master station layer, network layer, and terminal layer according to the system hierarchy. The main station layer is composed of the distribution network main station, database server, application server, etc. Its main function is to achieve the overall control of the main station over the power grid. At the same level as the main station, there is also the security management center CA, which mainly participates in grid security management and control as a third party for security certification. The network layer includes the distribution network communication network and substations, which act as relay stations to control and exchange information with the perception layer terminals. The perception layer includes intelligent terminals, intelligent sensors, and other control and perception devices, as well as lightweight perception devices such as fault detectors and smart meters, responsible for the control and information collection of power grid terminals.
With the development of Trusted Computing, Trusted Computing technology has developed from a single hardware chip to a variety of software and hardware forms, especially in mobile devices and embedded devices with limited computing and storage resources. For example, the ARM-based TrustZone achieves device trustworthiness through processor partitioning; Physical Unclonable Functions (PUFs), which achieve trusted authentication, key management, and other functions through the uniqueness of their physical security features, are commonly used in scenarios such as the Internet of Things, mobile networks, and wearable devices due to their lightweight and easy implementation characteristics. As a technology to ensure the predictability of information systems, Trusted Computing can be used in the research of secure communication of power system terminals, which can not only verify the integrity of equipment itself, but also achieve trusted access between equipment. In order to introduce Trusted Computing into the power system security protection model, it is necessary to trust the root TCM (Trusted Cryptography Modul) on each equipment platform. There are three ways that this can be achieved:
  • For embedded platforms with weak computing performance, soft TCM design can be adopted, and only basic TCM function commands can be implemented, including integrity measurement and cryptography calculation;
  • For platforms with ARM equipped with Trustzone and low requirements for TCM performance, Trustzone can be used to build a more complete TCM functional area, and then build the trusted root of the platform;
  • Like a host platform, a TCM security chip is built in/out of the system motherboard bus interface to build a complete TCM trusted root function.
Considering the large number, variety, and complex access mode of power system equipment, this paper conceives to use multiple platform trusted root design, flexibly use Trusted Computing, and achieve the security and reliability of the terminal.
In this architecture, the second and third trusted root TCM construction methods are adopted for Trusted Computing applications of the awareness layer devices. The Trustzone structure is introduced based on the ARM system to build a fully functional TCM area in the substation equipment, or, like the host platform, build a TCM security chip through the system motherboard bus interface, and then build a complete TCM trusted root function to achieve the integrity measurement of the substation layer equipment itself and secure and trusted communication between the equipment and the substation.
Due to the low computing power and weak performance of some sensing layer terminals, in this architecture, such terminals mainly implement soft TCM design through physical non-cloning technology (PUF), and only implement basic TCM function commands (including integrity measurement and cryptography calculation). This can also achieve integrity measurement of the terminal device itself and secure and trustworthy communication between the terminal and the substation.
Terminal:
The trusted logic on the terminal side is shown in the Figure 5 above. The chip is trusted security hardware, the operating system is Linux, and the whitelist is the application program.
Master station:
The Trusted Computing support platform on the master station side is shown in the Figure 6 above. The application software of the computer system and the trusted password support platform are two-way interconnected. The Trusted Computing password support platform consists of the TCM service module and the trusted password module. The cryptographic algorithm engine includes SM2, SM3, SM4, and a random number generator.

5. Comprehensive Weight Analysis Based on AHP and Entropy Weight Method

The analytic hierarchy process (AHP) regards a multi-objective decision-making problem as a system. By analyzing each small objective of the objective, it is divided into multiple secondary indexes, and then the AHP is carried out.
The AHP mainly starts from the evaluator’s understanding of the essence and elements of the evaluation problem, takes the research object as a system, and makes decisions according to the thinking mode of decomposition, comparative judgment, and synthesis.
Considering that the index evaluation of the classified protection 2.0 system is mostly qualitative and conforms to the core idea of the analytic hierarchy process, this paper takes the analytic hierarchy process as the basic weight analysis method. However, the AHP has some shortcomings, such as small quantitative data and many qualitative components, and it is not convincing. This paper aims to use the entropy weight method to correct the basic weight with the goal of minimizing the deviation. The specific evaluation model used in this paper is shown in Figure 7. The AHP method is based on expert experience, and the entropy weight method is based on historical evaluation data of similar systems. The combination of subjective and objective methods can effectively ensure the rationality of index weight distribution.

5.1. Subjective Weighting of Evaluation Indexes Based on Analytic Hierarchy Process

The specific steps of obtaining the index weight by the analytic hierarchy process can be roughly divided into the following: (1) establishing the hierarchical structure of the analytic hierarchy process, quantifying the qualitative results, and obtaining the judgment matrix; (2) carrying out hierarchical single sorting and consistency judgment; (3) carrying out hierarchical total sorting and consistency judgment. The specific process is shown in Figure 8.
First, according to expert opinions, the indexes of each layer are judged by two, the relative importance n i j is obtained, and the judgment matrix is constructed. The judgment matrix N is established as follows:
N = n 11 n 1 n n n 1 n n n
Secondly, the eigenvector of the maximum eigenvalue λ m a x of the judgment matrix is found, ω, ω is obtained after normalization, and ω′, ω′ is the basic weight value of the indicator at this level. The relationship can be expressed by Formula (10):
N ω = λ m a x ω
Then, a consistency check is performed on the weight values of a single sort. The consistency check formula is as follows:
C I = λ m a x n 1
C R = C I R I
where CI (consistency index), RI (average random consistency index), CR (consistency ratio), and n are the order of judgment matrix. RI is a constant, which is related to the order of the judgment matrix. When CI = 0, the judgment matrix n has complete consistency; when CI tends to zero, it has relatively reliable consistency; and when the consistency ratio < 0.10, it can be considered that the judgment matrix n has consistency and meets the requirements of design.
Finally, the total weight value of the three-level indexes is calculated by a single sorting weight value, and the consistency is tested. The total weight is calculated as shown in the following formula:
d i = c × d c i
where c is the upper secondary indicator weight of the tertiary indicator i and d c i is the weight value of the tertiary indicator I at the secondary indicator level.

5.2. Objective Weighting of Evaluation Indexes Based on Entropy Weight Method

In multi-index decision-making problems, the smaller the entropy of an index, the greater the amount of information, the greater the role it plays in the comprehensive evaluation of models, and the greater the weight of the index. The entropy weight method gives appropriate weights to the indexes according to the entropy value of the indexes in the original data. Its practical significance is to enhance the weights of those indexes that are more easily ignored. The entropy weight method can avoid the influence of subjective factors and make the calculated weight more objective.
In order to calculate the entropy weight of power information system indexes, it is necessary to calculate the entropy weight of secondary indexes according to the original data and then accumulate from bottom to top to obtain the entropy weight of primary indexes. The specific steps are as follows:
  • Build raw data matrix
According to the historical evaluation data and the evaluation data of similar systems, the original data matrix can be constructed. It is assumed that there are m groups of original data, and each group of data is composed of n evaluation index data. The form is as follows:
X = x 11 x 1 n x m 1 x m n
where x i j ( i = 1,2 , m ; j = 1,2 , n )   x i j represents the j-th index value of the i-th group of original data.
2.
Standardization of raw data
The index values in the original matrix X are standardized as follows:
y i j = x i j min ( x i ) max ( x i ) min ( x i )
3.
Calculate the entropy of the j-th index
e j = ln ( 1 m ) i = 1 m p i j ln ( p i j )
where p i j = y i j i = 1 m y i j represents the proportion of the j-th index of evaluation object i.
4.
Calculate the difference coefficient of the j-th index
d j = 1 e j
where e j represents the entropy value of the j-th indicator.
5.
Calculate the entropy weight of the j-th index
w j = d j j = 1 n d j

5.3. Comprehensive Index Weighting Based on the Principle of Minimum Discriminant Information

The subjective weight and objective weight are calculated by the analytic hierarchy process, ω s = ω s 1 , ω s 2 , , ω s n , and the entropy method, ω d = ω d 1 , ω d 2 , , ω d n . In this paper, the influence of subjective and objective factors on the weight is fully considered, and the subjective weight and objective weight are combined to obtain the comprehensive weight, ω = ω 1 , ω 2 , , ω n . The commonly used combination methods are linear combination and multiplication combination. Among them, the linear combination obtains the comprehensive weight by adding the subjective and objective weights according to a certain proportion coefficient. The proportion coefficient of this method is determined by human experience, which has a great impact on the subjectivity of the comprehensive weight. The multiplicative combination obtains the comprehensive weight by multiplying the subjective and objective weights and then normalizing them, in which is easy to produce a “multiplication effect” on the weight value, which deviates from the actual situation. Therefore, this paper uses the method based on the principle of minimum discriminant information to calculate the comprehensive weight to ensure that the calculated weight is closest to the subjective weight and objective weight. The specific calculation process is as follows:
Step 1: the objective function is set as follows:
min F ω = i = 1 m ω i ln ω i ω z i + ω i ln ω i ω k i s . t . i = 1 m ω i = 1 , ω i 0 i = 1 , 2 , , m
F ω represents the objective function.
Step 2: the objective function is solved based on the Lagrange function:
L = i = 1 m ω i ln ω i ω z i + ω i ln ω i ω k i + λ i = 1 m ω i 1 L ω i = 2 ln ω i + 2 ln ω i ω i + λ = 0 i = 1 , 2 , , m L λ = i = 1 m ω i 1 = 0
Step 3: the formula for calculating the comprehensive weight is as follows:
ω i = ω s i ω d i j = 1 n ω s j ω d j

5.4. Comprehensive Evaluation of Indexes Based on TOPSIS Algorithm

The TOPSIS algorithm is an algorithm that can sort the relative advantages and disadvantages of a limited number of evaluation objects. It reflects the advantages and disadvantages of the scheme through the closeness to the optimal target and the worst target. Based on the comprehensive weight calculated in Section 3.3, this paper uses the TOPSIS algorithm to comprehensively evaluate the security of the power information system. The specific steps are as follows:
Step 1: Establish the specification matrix. Based on the original data matrix of grade protection evaluation, this paper carries out normalization processing and a row weighting calculation to obtain the normalized matrix.
V = v 11 v 1 n v m 1 v m n       ,       v i j = ω j × x i j i = 1 n x i j 2
where V represents the normalization matrix, x i j i = 1 , 2 , m ; j = 1 , 2 , n represents the j-th index value of the i-th group of original data, and ω j represents the comprehensive weight value of the j-th index.
Step 2: Generate the best scheme and the worst scheme. The calculation process involves two ideal schemes, the optimal scheme A m a x and the worst-case scenario A m i n . The maximum v i m a x and minimum v i m i n values of the original data of each index i are taken as the optimal scheme and the worst scheme of the system, respectively. That is, the best scheme is A m a x = v 1 m a x , v 2 m a x , , v n m a x and the worst scheme is A m i n = v 1 m i n , v 2 m i n , , v n m i n .
Step 3: Calculate the Euclidean A i = v i 1 , v i 2 , , v i n distance between the target scheme and the optimal scheme and the Euclidean distance between the target scheme D + and the worst scheme D . The calculation method is as follows:
D + = j = 1 n ( v i j v j m a x ) 2
D = j = 1 n ( v i j v j m i n ) 2
Step 4: Calculate the closeness. The closeness degree can be calculated according to the distance from the best and worst scheme. The greater the closeness degree is, the better the scheme is. The calculation method is as follows:
C = D D + D +
C represents the closeness.
According to the closeness of the system, we can judge whether the safety protection of the system is reliable. The greater the pasting progress, the closer the system is to the optimal scheme and the farther it is from the worst scheme, indicating that the better the system security protection, the better its security.

6. Case Analysis

6.1. Analytic Hierarchy Process Weight Calculation

In this paper, experts are invited to compare and scale indexes at each level to construct a judgment matrix. Taking the first-level index layer as an example, an example analysis was carried out, and the results are shown in Table 1.
It can be seen from the analysis results that the secure computing environment occupies the largest weight, which is 0.4073 after normalization. The weight of the safe physical environment index is the smallest, which is 0.0541 after normalization, and both the CR and CI are less than 0.1, which is consistent.
The weights were calculated by the AHP method for other secondary indexes, and the results are summarized as shown in Table 2. Among the related standards of classified protection 2.0, the secure computing environment contains the most general security requirements and is the most important index item to ensure the safe operation of the power information system. Therefore, the weight of its secure computing environment is the highest using the AHP, which is 0.4073.
Taking the weight analysis of the secondary indicator data security D 12 in a secure computing environment as an example, data security D 12 has the highest weight among all secondary indexes, at 0.1916. Data security includes key contents such as data integrity, confidentiality, personal information protection, and residual information protection, and is closely related to the basic services of the power information system, electricity security, and user information protection. Therefore, it is reasonable to have the highest total weight of data security.

6.2. Entropy Weight Method Weight Calculation

The weight of the entropy weight method is calculated based on the similar and historical data of the power information system classified protection evaluation. In this paper, based on the network security level evaluation reports of six information systems, according to the quantitative rules shown in the preceding text and the attached table, the following raw data table (Table 3) was formed by summarizing and sorting out the indexes.
The smaller the information entropy of an index, the smaller the dispersion of the original data of the evaluation object, and the smaller the security gap of this index in various systems, so the weight occupied by this index is also small. Formulas (15)–(18) were used to calculate the information entropy and weight of the evaluation indexes, and the specific results can be summarized in Table 4.
As shown in Table 4, among all the indexes obtained by the entropy weight method, the trusted verification D 5 occupies the highest weight, which is 0.1527. It is easy to see from the analysis of the original data that the compliance of the D 5 index of the trusted verification is the lowest, indicating that most systems tend to ignore this index during their security construction. Therefore, it is reasonable for trusted verification D 5 to occupy the highest weight. In the evaluation of the graded protection of the six sample systems, the four indexes of physical access control D 2 , communication network architecture D 3 , communication transmission D 4 , and audit management D 14 almost all meet the evaluation requirements, indicating that most systems can effectively guarantee their reliability. Therefore, the weights of such indexes calculated by the entropy weight method are relatively small.

6.3. Comprehensive Weight Calculation

The comprehensive weight calculation method is shown in Formula (21). The comprehensive weight was calculated by combining the two-level index weight of the AHP and the entropy weight method, and the results are shown in Table 5.
From the perspective of the first-level indexes, the weight of the AHP is not much different from the final comprehensive weight. The weight proportion of the secure computing environment C 4 is slightly reduced, but it still occupies the highest weight, which is consistent with the weight ranking obtained by expert evaluation.
From the point of view of the secondary indexes, the larger changes in weight are in credible verification D 5 , auditing and trusted verification D 8 , and device trust verification D 11 . Relative to the AHP weights, regarding D 5 , the comprehensive weight ranking has risen by 2 places, D 8 by 3 places, and D 11 by 2 places. This is the result of correcting the base weight using the entropy weight method. From the original data of the entropy weight method, it can be seen that the D 5 , D 8 , and D 11 indexes show that most systems do not meet the requirements of the indexes, indicating that the requirements of such indexes are easily ignored in the construction and maintenance of information systems, so it is reasonable to increase their comprehensive weights.
The weight changes can also be intuitively seen in Figure 9. The comprehensive weight is between the weight of the AHP method and the entropy weight method, which reduces the subjective influence of the AHP method and avoids the problem that the AHP method relies on the subjective tendencies of decision makers. At the same time, it also weakens the degree of deviation between some conclusions of the entropy weight method and the actual situation, avoiding the problem of the entropy weight method relying on objective data, and the evaluation results are more accurate and objective.

6.4. Comprehensive Evaluation Analysis and Verification

Based on Table 3 as the original data table, the optimal solution and the worst solution were constructed, as shown in Table 6.
Based on the original data table and the comprehensive weight of each indicator calculated in the previous section, the Euclidean distance D + and Euclidean distance for the worst case D between each system and the optimal solution was calculated using Formulas (23) and (24). The closeness was calculated using Formula (25). The specific calculation results are shown in the following table.
The comprehensive evaluation results based on the TOPSIS algorithm are shown in Table 7. It can be seen that the Euclidean distance D + of the optimal solution of system 6 is the smallest, which is 0.151, indicating that it is the closest to the optimal solution A m a x . The Euclidean distance D of the worst scheme of system 6 is the largest, which is 0.449, indicating that it is the farthest from the worst scheme. System 6 has the highest degree of closeness C, which is 0.748, indicating that system 6 is the closest to the optimal solution.
Combined with the analysis from a practical point of view, several secondary indexes with a large proportion of comprehensive weight were analyzed: safety management D 15 , trusted verification D 5 , and network attack prevention D 7 . The index evaluation of system 6 is the optimal solution or close to the optimal solution, and the comprehensive evaluation result has certain rationality. The graded protection test scores of the six power information systems selected in this paper were compared and analyzed with the TOPSIS post-progress calculation results, as shown in Figure 10. The results show that the TOPSIS-based comprehensive evaluation results are basically consistent with the grade protection evaluation results, which confirms the scientificity and practicability of the evaluation model.

7. Conclusions

This paper takes classified protection 2.0 as the starting point and combines relevant standards for power information system evaluation. It evaluates the security of the power information system from five aspects: secure physical environment, secure communication network, secure area boundary, secure computing environment, and security management center. It constructs an evaluation index system that takes into account classified protection 2.0 and combines the analytic hierarchy process and entropy weight method to construct reasonable index weights from both subjective and objective aspects. In addition, this paper integrates Trusted Computing into the power system and constructs a power system security protection model, which has a certain positive guiding significance for improving the overall security of the power information system, helps to build a complete power information system network security protection system, and comprehensively improves the defense capability.
In this paper, the expert scores and the rating protection evaluation reports of the six systems are summarized and sorted into the original data, the comprehensive weight is calculated, and the comprehensive weight changes are compared and analyzed. The analytic hierarchy process (AHP) shows that in the relevant standards of classified protection 2.0, the secure computing environment contains the most common security requirements and is the most important index to ensure the safe operation of the power information system. Among all indexes obtained by the entropy weight method, credible verification accounts for the highest weight. It is easy to see from the analysis of the original data that the conformance of the credible verification index is the lowest, so it is reasonable that the credible verification accounts for the highest weight. Finally, by calculating the comprehensive weight, it can be concluded that the entropy weight method is used to correct the basic weight, resulting in a change in the weight ranking of relevant secondary indexes. This indicates that it is easy to overlook the requirements of such indexes in the construction and maintenance of information systems, so it is necessary to improve their comprehensive weight. The comparison and analysis of the TOPSIS closeness of the proposed evaluation model with the equivalency evaluation score confirmed the scientificity of the evaluation model.

Author Contributions

Conceptualization, Q.Y. and G.G.; methodology, B.Z. and J.Y.; software, Q.Y.; validation, Q.Y.; formal analysis, G.G.; investigation, Z.L. and M.X.; resources, G.G.; data curation, Q.Y.; writing—original draft preparation, Q.Y.; writing—review and editing, Q.Y. and J.Y.; visualization, Q.Y.; supervision, H.Y.; project administration, G.G. and H.Y.; funding acquisition, G.G. All authors have read and agreed to the published version of the manuscript.

Funding

This project is supported by the National Key Research and Development Program: Research on collaborative regulation of new urban multi-energy interconnection system based on cyber-physical fusion (2021YFE0102400).

Data Availability Statement

Not applicable.

Acknowledgments

We are indebted to Gangjun Gong for their insightful suggestions on the original manuscript. All the editors and anonymous reviewers are gratefully acknowledged.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cheng, F.; Yang, L.; Huang, Z. Design and Thinking of Network Security System Based on the Equal Protection 2.0. Standard. J. Mod. Ind. Econ. Inf. Technol. 2022, 12, 101–102. [Google Scholar]
  2. Cheng, Z.; Mao, C. Research on the Construction of Active Defense System of University Network Security under Equal Protection 2.0. J. Netw. Secur. Technol. Appl. 2023, 4, 96–97. [Google Scholar]
  3. Shi, Z.; Zhang, L.; Yang, Y. The importance and measures of power system information network security protection. J. Netw. Secur. Informatiz. 2023, 6, 20–22. [Google Scholar]
  4. GB/T 22239-2019; Information Security Technology—Baseline for Classified Protection of Cybersecurity. Chinese National Standard: Beijing, China, 2019.
  5. Fang, Y. The achievements and future of “Network Security Law”. J. China Inf. Secur. 2020, 6, 42–44. [Google Scholar]
  6. Guo, Q.; Zhang, H. Key information infrastructure security protection technology system. J. Inf. Netw. Secur. 2020, 20, 1–9. [Google Scholar]
  7. Xiao, A.; Zhu, H.; Zhang, W.; Xiong, L.; Jiao, Y. Research on Network Security Protection in the Environment of Electric Power Internet of Things. J. Electr. Autom. 2021, 43, 94–97. [Google Scholar]
  8. Zhou, Z.; Ban, Q.; Tao, J. The Importance and Protection of Information Security in Power System. J. Netw. Secur. Technol. Appl. 2021, 4, 151–152. [Google Scholar]
  9. Wang, K.; Zhang, Y.; Dong, S.; Wu, J. Evaluation of Cyberspace Defense Capability Based on TOPSIS Grey Correlation Analysis Method. J. Mod. Def. Technol. 2023, 12, 1–8. [Google Scholar]
  10. Yang, Y.; Liu, W.; Yu, X. Thinking about the safety protection of power monitoring system. J. Commun. Power Technol. 2018, 35, 267–268. [Google Scholar]
  11. Fang, Y.; Zhang, Y.; Guo, Y. Analysis of Mobile Internet Application and Security Protection in Power Industry. J. Smart City. 2020, 6, 54–55. [Google Scholar]
  12. Chen, X. Construction of Network Security Level Protection 2.0 Security System. J. China New Commun. 2019, 21, 76–77. [Google Scholar]
  13. Chen, X.; Dai, Q. Internet of Things security protection measures under level protection 2.0. J. Sci. Technol. Innov. 2020, 3, 80–81. [Google Scholar]
  14. Fan, B.; Gong, G.; Sun, S. Research on Dynamic Security System of Power Distribution Internet of Things Based on Equal Protection 2.0. J. Inf. Netw. Secur. 2020, 20, 10–14. [Google Scholar]
  15. Ma, M.; Zhao, G. Co-opetition and Solution Path of Hierarchical Protection and Critical Information Infrastructure Protection. J. Xian Jiaotong Univ. Soc. Sci. Ed. 2018, 38, 16–22. [Google Scholar]
  16. Chen, G.; Zhu, G.; Fan, C. Interpretation of “Information Security Technology Network Security Level Protection Evaluation Requirements” (GB/T 28448-2019) Standard. J. Inf. Netw. Secur. 2019, 7, 1–7. [Google Scholar]
  17. GB/T 38318-2019; Cyber Security Assessment Guide for Electric Power System Supervision and Control. Chinese National Standard: Beijing, China, 2019.
  18. Zhang, W. Application of network security level protection in industrial control system. J. Autom. Expo. 2019, 36, 14–18. [Google Scholar]
  19. Zhang, X.; Guo, H.; He, X.; Liu, Z.; Sun, X.; Chen, H. Research on Security Risk Assessment Method of State Grid Edge Computing Information System. J. Comput. Sci. 2019, 46, 428–432. [Google Scholar]
  20. He, H.; Liu, H.; Cheng, J. Research on cloud computing platform security capability evaluation system and evaluation index. J. Inf. Secur. Res. 2020, 6, 990–995. [Google Scholar]
  21. Zhang, B.; Zheng, B.; Li, J. Research on Information Security Quality Assessment of Power Internet of Things Based on Hierarchical Protection 2.0. A. The First Research Institute of the Ministry of Public Security. In Proceedings of the 2020 China Network Security Hierarchical Protection and Critical Information Infrastructure Protection Conference, Calgary, AB, Canada, 17–22 August 2020; Volume 4. [Google Scholar]
  22. Li, C.; Li, H.; Liu, Y.; Wu, H.; Zhang, Q.; Fan, H. Dynamic Security Risk Intelligent Assessment System for Large Power Grids. J. Autom. Electr. Power Syst. 2019, 43, 67–75. [Google Scholar]
  23. Huang, K.; Zhou, C.; Tian, Y. Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks. In Proceedings of the IEEE Telecommunication Networks & Applications Conference, Melbourne, VIC, Australia, 22–24 November 2017; pp. 1–6. [Google Scholar]
  24. Aksu, M.; Dilek, M.; Tatli, E. A quantitative CVSS-based cyber security risk assessment methodology for IT systems. In Proceedings of the IEEE International Carnahan Conference on Security Technology, Madrid, Spain, 23–26 October 2017. [Google Scholar]
  25. Li, T.; Zhang, C. Research on network security risk model based on information security and other security standards. J. Inf. Netw. Secur. 2016, 9, 177–183. [Google Scholar]
  26. Ning, H.; Rong, X.; Liu, H.; Shi, Y.; Li, Y. Zero-trust SDP evaluation method under network security level protection. J. Netw. Secur. Technol. Appl. 2021, 7, 2–5. [Google Scholar]
  27. Zhao, X.; Zeng, C.; Xue, J.; Lin, Q.; Guo, X. Research on Multidimensional Network Security Metric Model Based on TOPSIS. J. Beijing Inst. Technol. 2021, 41, 311–321. [Google Scholar]
  28. GB/T 32351-2015; Information Security Level Evaluation Indicators for Electric Power Industry. Chinese National Standard: Beijing, China, 2015.
  29. GB/T 36047-2018; Electric Power Information System Security Inspection Standard. Chinese National Standard: Beijing, China, 2018.
Figure 1. Classified protection 2.0 system.
Figure 1. Classified protection 2.0 system.
Energies 16 06566 g001
Figure 2. The safety index of electric power information system.
Figure 2. The safety index of electric power information system.
Energies 16 06566 g002
Figure 3. Power information system architecture.
Figure 3. Power information system architecture.
Energies 16 06566 g003
Figure 4. Security protection model for power information system.
Figure 4. Security protection model for power information system.
Energies 16 06566 g004
Figure 5. Trusted logic on the terminal side.
Figure 5. Trusted logic on the terminal side.
Energies 16 06566 g005
Figure 6. Trusted logic on the master station side.
Figure 6. Trusted logic on the master station side.
Energies 16 06566 g006
Figure 7. Assessment Model.
Figure 7. Assessment Model.
Energies 16 06566 g007
Figure 8. The flow chart of AHP.
Figure 8. The flow chart of AHP.
Energies 16 06566 g008
Figure 9. Comparison diagram of results of AHP entropy weight method.
Figure 9. Comparison diagram of results of AHP entropy weight method.
Energies 16 06566 g009
Figure 10. Comparison results of TOPSIS and classified protection evaluation.
Figure 10. Comparison results of TOPSIS and classified protection evaluation.
Energies 16 06566 g010
Table 1. Example for the weight of level-1 indicator groups.
Table 1. Example for the weight of level-1 indicator groups.
First-Level IndicatorSafe Physical Environment C1Secure Communication Network C2Safe Area Boundary C3Secure Computing Environment C4Security Management Center
Safe physical environment C111/41/31/51/4
Secure communication network C24121/21/2
Safe area boundary31/211/31/2
Secure computing environment C452313
Security management center C54221/31
Weight calculation ω 0.10390.35740.23270.78220.4441
ω 0.0541 0.1861 0.1212 0.4073 0.2313
Consistency checkn5
λ m a x 5.1795
CI0.0449
CR0.0401
Table 2. Weight and sort of AHP.
Table 2. Weight and sort of AHP.
First-Level IndicatorWeightsSecondary IndexesThe Weight of the Secondary Indicator GroupTotal Weight of Secondary IndexesSort
Safe physical environment0.0541Physical environmental conditions D10.5000.027113
Physical access control D20.5000.027113
Secure communication network0.1861Communication network architecture D30.44340.08254
Communication transmission D40.16920.031512
Trusted verification D50.38740.07215
Safe area boundary0.1212Access and protection policy D60.41610.05049
Network attack prevention D70.45790.05556
Auditing and trusted verification D80.12600.015316
Secure computing environment0.4073Authentication and access policy D90.13530.05517
Device intrusion prevention D100.28030.11423
Device trust verification D110.11410.046510
Data security D120.47030.19161
Security management center0.2313System management D130.23320.05398
Audit management D140.08160.018915
Safety management D150.49420.11432
Centralized control0.19100.044211
Table 3. Raw data of classified protection evaluation.
Table 3. Raw data of classified protection evaluation.
Number D 1 D 2 D 3 D 4 D 5 D 6 D 7 D 8 D 9 D 10 D 11 D 12 D 13 D 14 D 15 D 16
System 10.9311110.980.850.570.9110.750.70.810.50.83
System 20.9511110.940.830.660.9110.8750.7110.50.83
System 30.910.80.5010.750.70.630.830.70.670.750.750.50.67
System 410.9110110.830.930.830.80.781111
System 50.8711100.810.60.70.860.670.80.8751110.5
System 60.9211110.940.830.920.9110.80.3751110.92
Table 4. The results of entropy weight method.
Table 4. The results of entropy weight method.
Three-Level IndicatorInformation EntropyWeightsSort
Physical environmental conditions D10.83500.0651 4
Physical access control D20.89820.0402 13
Communication network architecture D30.89820.0402 13
Communication transmission D40.89820.0402 13
Trusted verification D50.61310.1527 1
Access and protection policy D60.89030.0433 11
Network attack prevention D70.87030.0512 9
Auditing and trusted verification D80.19340.0675 3
Authentication and access policy D90.89620.0410 12
Device Intrusion Prevention D100.86820.0520 7
Device Trust Verification D110.85820.0560 6
Data Security D120.88740.0444 10
System Management0.84370.0617 5
Audit management D140.89820.0402 13
Safety management D150.61310.1527 1
Centralized control D160.86850.0519 8
Table 5. The result of combining weights.
Table 5. The result of combining weights.
First-Level IndicatorComprehensive WeightSecondary IndexesAHP WeightsEntropy Weight Comprehensive WeightSortSort Change
Safe physical environment0.0398Physical environmental D10.0271 0.0651 0.0461 121
Physical access control D20.0271 0.0402 0.0336 15−2
Secure communication network0.2095Communication network architecture D30.0825 0.0402 0.0613 5−1
Communication transmission D40.0315 0.0402 0.0358 14−2
Trusted verification D50.0721 0.1527 0.1124 32
Safe area boundary0.1416Access and protection policy D60.0504 0.0433 0.0469 11−2
Network attack prevention0.0555 0.0512 0.0533 7−1
Auditing and trusted verification D80.0153 0.0675 0.0414 133
Secure computing environment0.3003Authentication and access policy D90.0551 0.0410 0.0480 9−2
Device intrusion prevention D100.1142 0.0520 0.0831 4−1
Device trust verification D110.0465 0.0560 0.0512 82
Data security D120.1916 0.0444 0.1180 2−1
Security management center0.2688System management D130.0539 0.0617 0.0578 62
Audit management D140.0189 0.0402 0.0295 16−1
Safety management D150.1143 0.1527 0.1335 11
Centralized control0.0442 0.0519 0.0480 101
Table 6. Best and worst protection scheme.
Table 6. Best and worst protection scheme.
Index Number12345678910111213141516
Best plan11111110.920.9310.8750.8751111
Worst
plan
0.870.90.80.500.810.60.570.630.670.70.3750.750.750.50.5
Table 7. TOPSIS calculation results.
Table 7. TOPSIS calculation results.
Evaluation ObjectEuclidean Distance of Optimal Solution Euclidean Distance for Worst Case ClosenessSort Results
system 10.2160.4080.6543
system 20.2050.4120.6682
system 30.440.1220.2176
system 40.3530.3140.4714
system 50.3960.2720.4085
system 60.1510.4490.7481
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Gong, G.; Yuan, Q.; Yang, J.; Zhou, B.; Lv, Z.; Yang, H.; Xu, M. Safety Index, Evaluation Model, and Comprehensive Evaluation Method of Power Information System under Classified Protection 2.0. Energies 2023, 16, 6566. https://doi.org/10.3390/en16186566

AMA Style

Gong G, Yuan Q, Yang J, Zhou B, Lv Z, Yang H, Xu M. Safety Index, Evaluation Model, and Comprehensive Evaluation Method of Power Information System under Classified Protection 2.0. Energies. 2023; 16(18):6566. https://doi.org/10.3390/en16186566

Chicago/Turabian Style

Gong, Gangjun, Qinglin Yuan, Jiaxuan Yang, Bo Zhou, Zeming Lv, Haixia Yang, and Mingfeng Xu. 2023. "Safety Index, Evaluation Model, and Comprehensive Evaluation Method of Power Information System under Classified Protection 2.0" Energies 16, no. 18: 6566. https://doi.org/10.3390/en16186566

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop