Method and device for detecting security of internet of things data of market transaction, and electronic apparatus
12547738 ยท 2026-02-10
Assignee
Inventors
- Xiangfeng ZHOU (Zhongshan, CN)
- Chunyuan CAI (Zhongshan, CN)
- Yongjian LI (Zhongshan, CN)
- Lifei LI (Zhongshan, CN)
- Weixia JIAN (Zhongshan, CN)
- Huibin ZHOU (Zhongshan, CN)
- Hua LI (Zhongshan, CN)
- Zhenjiang CHEN (Zhongshan, CN)
- Ying Zhang (Zhongshan, CN)
- Yufeng Chen (Zhongshan, CN)
- Junfeng Wei (Zhongshan, CN)
Cpc classification
G06F21/64
PHYSICS
H04L67/12
ELECTRICITY
H04L9/002
ELECTRICITY
International classification
G06F21/00
PHYSICS
Abstract
A method and device for detecting security of Internet of Things data of market transaction, and an electronic apparatus are provided. The method includes: calculating at least one first trapezoidal fuzzy set having a number of attacks of data; calculating at least one second trapezoidal fuzzy set of an error rate of the data; calculating at least one third trapezoidal fuzzy set of a repetition rate of the data; calculating at least one fourth trapezoidal fuzzy set of miss rate of the data; determining a security detection value according to the first trapezoidal fuzzy set; determining a false detection value according to the second trapezoidal fuzzy set, the third trapezoidal fuzzy set and the fourth trapezoidal fuzzy set; and determining security of the Internet of Things data of the market transaction according to the security detection value and the false detection value.
Claims
1. A method for detecting security of Internet of Things data of market transaction, comprising: calculating at least one first trapezoidal fuzzy set having a number of attacks of data, the data being sent by a market transaction main body within a target time period to Internet of Things; calculating at least one second trapezoidal fuzzy set of an error rate of the data; calculating at least one third trapezoidal fuzzy set of a repetition rate of the data; calculating at least one fourth trapezoidal fuzzy set of miss rate of the data; determining a security detection value according to the first trapezoidal fuzzy set; determining a false detection value according to the second trapezoidal fuzzy set, the third trapezoidal fuzzy set and the fourth trapezoidal fuzzy set; and determining security of the Internet of Things data of the market transaction according to the security detection value and the false detection value.
2. The method for detecting security according to claim 1, wherein calculating the first trapezoidal fuzzy set having the number of attacks of data, comprises: calculating nine first trapezoidal fuzzy sets, the number of attacks of the nine first trapezoidal fuzzy set to low to high, of the number of attacks of the data sent by a marketing transaction entity to the Internet of Things within the target time period as N.sub.ADi=(N.sub.ADi1, N.sub.ADi2, N.sub.ADi3, N.sub.ADi4; k.sub.DAi), wherein i=1, 2, . . . 9, N.sub.ADi is an ith first trapezoidal fuzzy set having the number of attacks in the data sent by the market transaction main body to the Internet of Things, N.sub.ADi1 is a power generation power and first offer data of the i.sup.th first trapezoidal fuzzy set, and N.sub.ADi2 is a frequency modulation power and second offer data of the ith first trapezoidal fuzzy set, N.sub.ADi3 is a peak modulation power and third offer data of the i.sup.th first trapezoidal fuzzy set, and N.sub.ADi4 is a voltage regulation power and fourth offer data of the i.sup.th first trapezoidal fuzzy set, k.sub.DAi is a membership coefficient of the i.sup.th first trapezoidal fuzzy set.
3. The method for detecting security according to claim 1, wherein calculating the second trapezoidal fuzzy set of error rates of the data comprises: calculating the second trapezoidal fuzzy setting to low to high error rates of the data sent by a marketing transaction entity to the Internet of things within the target time period as k.sub.ei=(k.sub.ei1, k.sub.ei2, k.sub.ei3, k.sub.ei4; k.sub.eki), wherein i=1, 2, . . . 9, k.sub.ei is an ith second trapezoidal fuzzy set of an error rate in the data sent by the market transaction main body to the Internet of Things, k.sub.ei1 is a power generation power and fifth offer data in the ith second trapezoidal fuzzy set, and k.sub.ei2 is a frequency modulation power and sixth offer data in the ith second trapezoidal fuzzy set, k.sub.ei3 is a peak tuning power and seventh offer data in the ith second trapezoidal fuzzy set, and k.sub.ei4 is a peak tuning power and eighth offer data in the ith second trapezoidal fuzzy set, k.sub.eki is a membership coefficient of the ith second trapezoidal fuzzy set.
4. The method for detecting security according to claim 1, wherein calculating the third trapezoidal fuzzy set of the repetition rate of the data comprises: calculating the third trapezoidal fuzzy set with nine fuzzy uncertainties setting to low to high repetition rates of the data sent by a marketing transaction entity during the target time period to the Internet of things, as k.sub.Ri=(k.sub.Ri1, k.sub.Ri2, k.sub.Ri3, k.sub.Ri4; k.sub.Rki), wherein i=1, 2, . . . , 9, k.sub.Ri is an ith third trapezoidal fuzzy set of a repetition rate in the data sent by the market transaction main body to the Internet of Things, k.sub.Ri1 is a power generation power and ninth offer data in the ith third trapezoidal fuzzy set, and k.sub.Ri2 is a frequency modulation power and tenth offer data in the ith third trapezoidal fuzzy set, k.sub.Ri3 peak modulation power and eleventh offer data in the ith said third trapezoidal fuzzy set, k.sub.Ri4 is a peak modulation power and twelfth offer data in the ith said third trapezoidal fuzzy set, k.sub.Rki is a membership coefficient of the ith third trapezoidal fuzzy set.
5. The method for detecting security according to claim 1, wherein calculating the fourth trapezoidal fuzzy set of miss rates of the data comprises: calculating the fourth trapezoidal fuzzy set with a miss rate setting to low to high miss rates of the data sent by a marketing transaction entity during the target time period to the Internet of things as k.sub.Li=(k.sub.Li1, k.sub.Li2, k.sub.Li3, k.sub.Li4; k.sub.Lki), wherein i=1, 2, . . . , 9, k.sub.Li1 is a power generation power and offer data of a ith fourth trapezoidal fuzzy set, k.sub.Li2 is a frequency modulation power and offer data in a ith fourth trapezoidal fuzzy set, and k.sub.Li3 is a peak modulation power and offer data in the ith fourth trapezoidal fuzzy set, k.sub.Li4 is a regulated power and offer data in the ith fourth trapezoidal fuzzy set, and k.sub.Lki is a membership coefficient of the ith fourth trapezoidal fuzzy set.
6. The method for detecting security according to claim 1, wherein determining the security detection value according to a first trapezoid ambiguity set, and determining the false detection value according to a second trapezoid ambiguity set, a third trapezoid ambiguity set, and a fourth trapezoid ambiguity set comprises: determining the security detection value according to trapezoidal fuzzy formula
7. The method for detecting security according to claim 1, wherein determining the security of the Internet of Things data of the market transaction according to the security detection value and the false detection value comprises: in a case that both the security detection value and the false detection value are 0, determining that the Internet of Things data of the market transaction is secure; in a case that the security detection value is greater than 0 and the false detection value is 0, determining that there is a data attack in the Internet of Things data of the market transaction and there is no false data; and in a case that the security detection value is zero and the false detection value is greater than zero, determining that no data attack exists in the Internet of Things data of the market transaction and false data exists in the Internet of Things data of the market transaction.
8. A computer readable storage medium, wherein the computer readable storage medium comprises a stored program, wherein when the program runs, on a computer, a device where the computer readable storage medium is located is controlled to execute a method for detecting security of Internet of Things data of market transaction comprises: calculating at least one first trapezoidal fuzzy set having a number of attacks of data, the data being sent by a market transaction main body within a target time period to Internet of Things; calculating at least one second trapezoidal fuzzy set of an error rate of the data; calculating at least one third trapezoidal fuzzy set of a repetition rate of the data; calculating at least one fourth trapezoidal fuzzy set of miss rate of the data; determining a security detection value according to the first trapezoidal fuzzy set; determining a false detection value according to the second trapezoidal fuzzy set, the third trapezoidal fuzzy set and the fourth trapezoidal fuzzy set; and determining security of the Internet of Things data of the market transaction according to the security detection value and the false detection value.
9. The computer readable storage medium according to claim 8, wherein calculating the first trapezoidal fuzzy set having the number of attacks of data, comprises: calculating nine first trapezoidal fuzzy sets, the number of attacks of the nine first trapezoidal fuzzy set to low to high, of the number of attacks of the data sent by a marketing transaction entity to the Internet of things within the target time period as
N.sub.ADi=(N.sub.ADi1,N.sub.ADi2,N.sub.ADi3,N.sub.ADi4;k.sub.DAi), wherein i=1, 2, . . . , 9, N.sub.ADi is an ith first trapezoidal fuzzy set having the number of attacks in the data sent by the market transaction main body to the Internet of Things, N.sub.ADi1 is a power generation power and first offer data of the ith first trapezoidal fuzzy set, and N.sub.ADi2 is a frequency modulation power and second offer data of the ith first trapezoidal fuzzy set, N.sub.ADi3 is a peak modulation power and third offer data of the ith first trapezoidal fuzzy set, and N.sub.ADi4 is a voltage regulation power and fourth offer data of the ith first trapezoidal fuzzy set, k.sub.DAi is a membership coefficient of the ith first trapezoidal fuzzy set.
10. The computer readable storage medium according to claim 8, wherein calculating the second trapezoidal fuzzy set of error rates of the data comprises: calculating the second trapezoidal fuzzy setting to low to high error rates of the data sent by a marketing transaction entity to the Internet of things within the target time period as
k.sub.ei=(k.sub.ei1,k.sub.ei2,k.sub.ei3,k.sub.ei4;k.sub.eki), wherein i=1, 2, . . . 9, k.sub.ei is an ith second trapezoidal fuzzy set of an error rate of the data sent by the market transaction main body to the Internet of Things, k.sub.ei1 is a power generation power and offer data in the ith second trapezoidal fuzzy set, and k.sub.ei2 is a frequency modulation power and offer data in the ith second trapezoidal fuzzy set, k.sub.ei3 is a peak tuning power and offer data in the ith second trapezoidal fuzzy set, and k.sub.ei4 is the peak tuning power and offer data in the ith second trapezoidal fuzzy set, k.sub.eki is a membership coefficient of the ith second trapezoidal fuzzy set.
11. The computer readable storage medium according to claim 8, wherein calculating the third trapezoidal fuzzy set of the repetition rate of the data comprises: calculating the third trapezoidal fuzzy set with nine fuzzy uncertainties setting to low to high repetition rates of the data sent by a marketing transaction entity during the target time period to the Internet of things, as
k.sub.Ri=(k.sub.Ri1,k.sub.Ri2,k.sub.Ri3,k.sub.Ri4;k.sub.Rki), wherein i=1, 2 . . . , 9, k.sub.Ri is an ith third trapezoidal fuzzy set of a repetition rate of the data sent by the market transaction main body to the Internet of Things, k.sub.Ri1 is a power generation power and ninth offer data in the ith third trapezoidal fuzzy set, and k.sub.Ri2 is a frequency modulation power and tenth offer data in the ith third trapezoidal fuzzy set, k.sub.Ri3 peak modulation power and eleventh offer data in the ith said third trapezoidal fuzzy set, k.sub.Ri4 is a peak modulation power and twelfth offer data in the ith said third trapezoidal fuzzy set, k.sub.Rki is a membership coefficient of the ith third trapezoidal fuzzy set.
12. The computer readable storage medium according to claim 8, wherein calculating the fourth trapezoidal fuzzy set of miss rates of the data comprises: calculating the fourth trapezoidal fuzzy setting to low to high miss rates of the data sent by a marketing transaction entity during the target time period to the Internet of things as
k.sub.Li=(k.sub.Li1,k.sub.Li2,k.sub.Li3,k.sub.Li4;k.sub.Lki), wherein i=1, 2, . . . 9, k.sub.Li1 is a power generation power and thirteenth offer data of an ith fourth trapezoidal fuzzy set, k.sub.Li2 is a frequency modulation power and fourteenth offer data in the ith fourth trapezoidal fuzzy set, and k.sub.Li3 is a peak modulation power and fifteenth offer data in the ith fourth trapezoidal fuzzy set, k.sub.Li4 is a regulated power and sixteenth offer data in the ith fourth trapezoidal fuzzy set, and k.sub.Lki is a membership coefficient of the ith fourth trapezoidal fuzzy set.
13. The computer readable storage medium according to claim 8, wherein determining the security detection value according to a first trapezoid ambiguity set, and determining the false detection value according to a second trapezoid ambiguity set, a third trapezoid ambiguity set, and a fourth trapezoid ambiguity set comprises: determining the security detection value according to trapezoidal a fuzzy formula
14. The computer readable storage medium according to claim 8, wherein determining the security of the Internet of Things data of the market transaction according to the security detection value and the false detection value comprises: in a case that both the security detection value and the false detection value are 0, determining that the Internet of Things data of the market transaction is secure; in a case that the security detection value is greater than 0 and the false detection value is 0, determining that there is a data attack in the Internet of Things data of the market transaction and there is no false data; and in a case that the security detection value is zero and the false detection value is greater than zero, determining that no data attack exists in the Internet of Things data of the market transaction and false data exists in the Internet of Things data of the market transaction.
15. An electronic apparatus comprising: one or more processors, a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, and the one or more programs comprise instructions for executing a method for detecting security of Internet of Things data of market transaction comprises: calculating at least one first trapezoidal fuzzy set having a number of attacks of data, the data being sent by a market transaction main body within a target time period to Internet of Things; calculating at least one second trapezoidal fuzzy set of an error rate of the data; calculating at least one third trapezoidal fuzzy set of a repetition rate of the data; calculating at least one fourth trapezoidal fuzzy set of miss rate of the data; determining a security detection value according to the first trapezoidal fuzzy set; determining a false detection value according to the second trapezoidal fuzzy set, the third trapezoidal fuzzy set and the fourth trapezoidal fuzzy set; and determining security of the Internet of Things data of the market transaction according to the security detection value and the false detection value.
16. The electronic apparatus according to claim 15, wherein calculating the first trapezoidal fuzzy set having the number of attacks of data, comprises: calculating nine first trapezoidal fuzzy sets, the number of attacks of the nine first trapezoidal fuzzy set to low to high, of the number of attacks of the data sent by a marketing transaction entity to the Internet of things within the target time period as
N.sub.ADi=(N.sub.ADi1,N.sub.ADi2,N.sub.ADi3,N.sub.ADi4;k.sub.DAi), wherein i=1, 2, . . . , 9, N.sub.ADi is an ith first trapezoidal fuzzy set having the number of attacks in the data sent by the market transaction main body to the Internet of Things, N.sub.ADi1 is a power generation power and first offer data of the i.sup.th first trapezoidal fuzzy set, and N.sub.ADi2 is a frequency modulation power and second offer data of the i.sup.th first trapezoidal fuzzy set, N.sub.ADi3 is a peak modulation power and third offer data of the i.sup.th first trapezoidal fuzzy set, and N.sub.ADi4 is a voltage regulation power and fourth offer data of the i.sup.th first trapezoidal fuzzy set, k.sub.DAi is a membership coefficient of the ith first trapezoidal fuzzy set.
17. The electronic apparatus according to claim 14, wherein calculating the second trapezoidal fuzzy set of error rates of the data comprises: using a statistical analysis method to calculate the second trapezoidal fuzzy setting to low to high error rates of the data sent by a marketing transaction entity to the Internet of things within the target time period as
k.sub.ei=(k.sub.ei1,k.sub.ei2,k.sub.ei3,k.sub.ei4;k.sub.eki), wherein i=1, 2, . . . , 9, k.sub.ei is an ith second trapezoidal fuzzy set of an error rate of the data sent by the market transaction main body to the Internet of Things, k.sub.ei1 is a power generation power and fifth offer data in the ith second trapezoidal fuzzy set, and k.sub.ei2 is a frequency modulation power and sixth offer data in the ith second trapezoidal fuzzy set, k.sub.ei3 is a peak tuning power and seventh offer data in the ith second trapezoidal fuzzy set, and k.sub.ei4 is the peak tuning power and eighth offer data in the ith second trapezoidal fuzzy set, k.sub.eki is a membership coefficient of the ith second trapezoidal fuzzy set.
18. The electronic apparatus according to claim 15, wherein calculating the third trapezoidal fuzzy set of the repetition rate of the data comprises: calculating the third trapezoidal fuzzy set with nine fuzzy uncertainties setting to low to high repetition rates of the data sent by a marketing transaction entity during the target time period to the Internet of things, as
k.sub.Ri=(k.sub.Ri1,k.sub.Ri2,k.sub.Ri3,k.sub.Ri4;k.sub.Rki), wherein i=1, 2, . . . , 9, k.sub.Ri is an ith third trapezoidal fuzzy set of a repetition rate of the data sent by the market transaction main body to the Internet of Things, k.sub.Ri1 is a power generation power and ninth offer data in the ith third trapezoidal fuzzy set, and k.sub.Ri2 is a frequency modulation power and tenth offer data in the ith third trapezoidal fuzzy set, k.sub.Ri3 peak modulation power and eleventh offer data in the ith said third trapezoidal fuzzy set, k.sub.Ri4 is a peak modulation power and twelfth offer data in the ith said third trapezoidal fuzzy set, k.sub.Rki is a membership coefficient of the ith third trapezoidal fuzzy set.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5) The figures include the following reference signs: 102: processor; 104: storage; 106: transmission equipment; 108: an input/output device.
DETAILED DESCRIPTION OF THE EMBODIMENTS
(6) It is important to note that the embodiments of the present disclosure and the characteristics in the embodiments can be combined under the condition of no conflicts. The present disclosure will be described below with reference to the drawings and embodiments in detail.
(7) To make persons skilled in the art better understand the solutions of the present application, the following clearly and completely describes the technical solutions in the embodiments of the present application with reference to the accompanying drawings in the embodiments of the present application. Apparently, the described embodiments are merely a part rather than all of the embodiments of the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present application without creative efforts shall belong to the scope of protection of the present application.
(8) It should be noted that the terms first and second in the specification, claims, and accompanying drawings of the present application are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or order. It should be understood that the data so used may be interchanged where appropriate for the embodiments of the present application described herein. In addition, the terms include and have, and any variations thereof, are intended to cover a non-exclusive inclusion, for example, a process, method, system, product, or apparatus that includes a series of steps or units is not necessarily limited to those steps or units that are expressly listed, but may include other steps or units that are not expressly listed or inherent to such process, method, product, or apparatus.
(9) A power Internet of Things around various links of a power system, and fully applies advanced communication technologies, such as artificial intelligence and mobile interconnection, and modern information technologies, so as to achieve universal interconnection among various links of the power system and human-computer interaction. The intelligent service system thereof is convenient and flexible in application, highly efficient in information processing and comprehensive in feature state sensing. With the continuous development of intelligent power grid construction, the automation degree of an electric power system is generally at a relatively high level, and the number of sensors, the scale of an information network and the number of decision units are greatly increased. Compared with current power systems, a prominent advantage of the ubiquitous power Internet of Things lies in using a large number of sensors and a new generation of power communication network, so as to realize full-process panoramic holographic perception.
(10) Nowadays, the electric power industry has gradually entered into a new digitalized and comprehensive interconnection era, and an electric power information network plays an important role in the entire electric power system, which, like modern network technology, is also developing towards diversification, complicating and comprehensiveness. Analyzing network attacks in the ubiquitous power Internet of Things has been significantly helpful in enhancing stable operation of a power grid, improving a fault emergency response capability, and predicting a trend of development of a security situation.
(11) The three protection lines of the electric power system that are safe and stable and the safety protection principles of secure partition, network professional, horizontal isolation, and longitudinal authentication have gradually failed to adapt to the new attack mode of network attack, and the inherent grid N1 standard also cannot satisfy many scenarios of information attack. The development of the Internet of Things greatly depends on the solving of a security problem. The present application sets forth relevant concepts of the ubiquitous power Internet of Things and builds an architecture. A malicious network attack process is analyzed by means of a power-on and power-off event, and classification, application scenarios, a protection system and a future researchable direction of a network attack are summarized in the environment of the ubiquitous power Internet of Things, so as to open a new route for a more secure operation of a power grid, more exquisite management, more accurate investment, and a higher quality service. With the development of the universal interconnect, according to the prediction of the global cloud index of Cisco, as the Internet of Things generates 45% of data by the year 2019, the edge calculation will become a support platform of the emerging universal interconnect application. Because the software and hardware resources of the device are limited, the problem of large-data security sharing oriented to the edge calculation becomes a key problem to be solved urgently. In this regard, some research efforts have been made, for example, development of an open environment such as cloud computing has been proposed, which brings a security problem of a cloud terminal, thereby increasing unreliability of user data access behavior in the cloud. In the research of a user behavior trust mechanism, a trust negotiation mechanism based on a similar trust degree in a cloud environment, an access control model based on a plurality of trusted features of a user, an access control model based on a trust calculation, an access control model based on role and trust, and a design of a cloud security access control model based on user behavior trust have been proposed in the literature. The proposed model introduces a fuzzily uniform matrix-based hierarchical analysis method as a user behavior evaluation method to evaluate the user behavior confidence degree. In research of data access control strategies, role-based security access control models have been applied to data access control of agricultural information systems. However, it is considered that a conventional role-based access control system has problems such as a static access control management mode, a high overhead for maintaining permission information, and low efficiency for querying permission information. Therefore, a concept of using an attribute-based access control policy to solve a system security problem is proposed. Currently, the ABAC policy has been studied in different aspects in the existing literature, for example, the entity attribute discovery mechanism of the ABAC may be implemented by a perturbation algorithm based on the neighborhood concealment and an improved privacy preserving classification mining method based on singular value decomposition data perturbation; the multi-domain collaboration mechanism of the ABAC may be implemented by an attribute-based policy synthesis algebraic model and a binary sequence set-based policy synthesis algebraic framework; the permission update and revocation mechanism of the ABAC may be implemented by a ciphertext policy attribute-based encryption scheme with a constant ciphertext length and a directly revocable attribute, and an attribute-based encryption scheme that supports attribute revocation and a constant ciphertext length.
(12) Despite the research on the data security access control and trust mechanism at present, there are few research on applying the data security access control mechanism based on the combination of the trust mechanism and the ABAC policy concept to the data sharing system in the Farmland Installment of the Internet of Things to realize secure sharing of data in the Internet of Things. Therefore, an Internet of Things farmland environmental data sharing system is used as an application, and user identity authentication and data security access control of the farmland environmental data sharing system are realized by using a model, thereby solving the problem of farmland environmental data security sharing in the Internet of Things.
(13) As introduced in the background art, there is a security problem in Internet of Things data of market transaction in the prior art. In order to solve the security problem in Internet of Things data of market transaction, embodiments of the present application provide a method and device for detecting security of Internet of Things data of market transaction, a computer-readable storage medium and an electronic apparatus.
(14) The following clearly and completely describes the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention.
(15) The method embodiments provided in the embodiments of the present application may be implemented in a mobile terminal, a computer terminal, or a similar computing device. Taking the operation on a mobile terminal as an example,
(16) The memory 104 may be used for storing a computer program, for example, a software program and module of application software, such as a computer program corresponding to the method for detecting security of market transaction Internet of Things data in the embodiments of the present invention; and the processor 102 runs the computer program stored in the memory 104, so as to execute various functional applications and data processing, i.e. to realize the described method. Memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some instances, memory 104 may further include memory remotely located with respect to processor 102, which may be connected to mobile terminals over a network. Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof. The transmitting device 106 is used to receive or transmit data via a network. Specific examples of the described network may include a wireless network provided by a communication provider of the mobile terminal. In one example, the transfer device 106 may comprise a network interface controller (NIC) that may be coupled to other network devices via a base station to communicate with the Internet. In one example, the transmission device 106 may be a radio frequency (RF) module for communicating wirelessly with the Internet.
(17) The present embodiment provides a security detection method for market transaction Internet of Things data running on a mobile terminal, computer terminal or similar computing device. It should be noted that the steps shown in the flowchart of the figure can be executed in a computer system such as a group of computer executable instructions. Although the logic order is shown in the flowchart, in some cases, the shown or described steps can be executed in an order different from that described here.
(18)
(19) Step S201, calculating at least one first trapezoidal fuzzy set having a number of attacks of data, the data being sent by a market transaction main body within a target time period to Internet of Things;
(20) Specifically, first, the number of times that data sent by a market transaction main body to an Internet of Things has an attack is evaluated, and data information about the generated power and the quote thereof, the frequency modulation power and the quote thereof for bidding, the peak modulation power and the quote thereof for bidding, and the voltage modulation power and the quote thereof for bidding sent by the market transaction main body to the Internet of Things can be monitored on a network layer by using an Internet of Things perception system. Using a statistical analysis method to calculate a first trapezoidal fuzzy set having the number of attacks in data sent by a market transaction main body within a target time period to the Internet of Things.
(21) Step S202, calculating at least one second trapezoidal fuzzy set of an error rate of the data; Specifically, the data error rate sent by the market transaction main body to the Internet of Things is evaluated, and data information about the generated power and the quotes thereof, the frequency modulation power and the quotes thereof for bidding, the peak modulation power and the quotes thereof for bidding, and the voltage modulation power and the quotes thereof for bidding sent by the market transaction main body to the Internet of Things can be monitored by using the Internet of Things perception system on the network layer as well. Using a statistical analysis method to calculate a second trapezoidal fuzzy setting of a data error rate sent by a market transaction main body within a target time period to Internet of Things.
(22) Step S203, calculating at least one third trapezoidal fuzzy set of a repetition rate of the data;
(23) Specifically, a data repetition rate sent by a market transaction main body to an Internet of things is evaluated; and data information about a generated power and a quote thereof, a frequency modulation power and a quote thereof for bidding, a peak modulation power and a quote thereof for bidding, and a voltage modulation power and a quote thereof for bidding sent by the market transaction main body to the Internet of things can be monitored on a network layer by using an Internet of things perception system. Using a statistical analysis method to calculate a third trapezoidal fuzzy setting of a repetition rate in the described data sent by the market transaction main body of the target time period to the described Internet of things.
(24) Step S204, calculating at least one fourth trapezoidal fuzzy set of miss rate of the data; determining a security detection value according to the first trapezoidal fuzzy set;
(25) Specifically, a data loss rate sent by a market transaction main body to an Internet of Things is evaluated; and data information about a generated power and a quote thereof, a frequency modulation power and a quote thereof for bidding, a peak modulation power and a quote thereof for bidding, and a voltage modulation power and a quote thereof for bidding sent by the market transaction main body to the Internet of Things can be monitored on a network layer by using an Internet of Things perception system. Using a statistical analysis method to calculate a fourth trapezoidal fuzzy setting of a deletion rate in the described data sent by the market transaction entity of the target time period to the described Internet of things.
(26) Step S205: determining a false detection value according to the second trapezoidal fuzzy set, the third trapezoidal fuzzy set and the fourth trapezoidal fuzzy set; and determining security of the Internet of Things data of the market transaction according to the security detection value and the false detection value.
(27) Specifically, a security detection value is determined according to whether there is an attack, i.e., a first trapezoidal fuzzy set; a false detection value is determined according to whether there are errors, repetitions, and deletions, i.e., second, third and fourth trapezoidal fuzzy values; and finally, the security of market transaction data is determined according to the security detection value and the false detection value.
(28) By means of the embodiment, a statistical analysis method is used to calculate a first trapezoid fuzzy set having the number of attacks, a second trapezoid fuzzy set having an error rate, a third trapezoid fuzzy set having a repetition rate and a fourth trapezoid fuzzy set having a deletion rate in data sent by a market transaction main body in a target time period to Internet of things; a security detection value is determined according to the first trapezoid fuzzy set; a false detection value is determined according to the second trapezoid fuzzy set, the third trapezoid fuzzy set and the fourth trapezoid fuzzy set; and the security of market transaction Internet of things data is determined according to the security detection value and the false detection value. In the prior art, there may be a security problem in market transaction data. In the present application, security detection is performed on market transaction Internet of Things data by calculating uncertain ambiguous sets, which can reflect the number of attacks on transmission data, a data error rate, a data repetition rate, a data deletion rate, etc., and accurately determine the security of market transaction Internet of Things data. Therefore, the problem of security of market transaction data in the prior art can be alleviated.
(29) In a specific implementation process, the step S201 may be implemented by the following steps: the number of attacks of the nine first trapezoidal fuzzy set being extremely low, very low, low, lower, middle, higher, high, very high and extremely high, of the number of attacks of the data sent by the marketing transaction entity to the Internet of things within the described target time period as N.sub.ADi=(N.sub.ADi1, N.sub.ADi2, N.sub.ADi3, N.sub.ADi4; k.sub.DAi), wherein i=1, 2, . . . , 9, N.sub.ADi being the i.sup.th first trapezoidal fuzzy set having the number of attacks in the data sent by the market transaction main body to the Internet of things, N.sub.ADi1 is the power generation power and offer data of the i.sup.th first trapezoidal fuzzy set, and N.sub.ADi2 is the frequency modulation power and offer data of the i.sup.th first trapezoidal fuzzy set, N.sub.ADi3 is peak modulation power and offer data of the i.sup.th first trapezoidal blur set, and N.sub.ADi4 is regulated power and offer data in the i.sup.th first trapezoidal blur set, k.sub.DAi is a membership coefficient of the i.sup.th first-trapezoidal fuzzy set. In the method, a first trapezoidal fuzzy set is calculated by means of the described steps, so that the first trapezoidal fuzzy set can be accurately calculated.
(30) Specifically, t=1, 2, . . . , N.sub.RP there are a plurality of target time periods t; the number of attacks in data sent to the Internet of Things by a marketing transaction agent in each target time period is counted; and nine blurred trapezoidal blurred sets, i.e. first trapezoidal blurred sets corresponding to extremely low, very low, low, low, medium, high, high, very high, and extremely high, are obtained respectively, which represent the number of attacks in the data.
(31) In some optional implementations, in the above step S202, a second trapezoidal fuzzy set of error rates in the above data transmitted to the Internet of things by the market transaction subject in the above target time period is calculated using a statistical analysis method, The method can be realized by the following steps: using the described statistical analysis method to calculate the described second trapezoidal fuzzy set with a very low, very low, low, low, medium, high, high, very high and very high ambiguity of the error rate in the data sent by the marketing transaction entity to the Internet of things in the described target time period as k.sub.ei=(k.sub.ei1, k.sub.ei2; k.sub.ei3, k.sub.ei4; k.sub.eki), wherein i=1, 2, . . . , 9, k.sub.ei being the ith second trapezoidal fuzzy set of an error rate in the described data sent by the market transaction main body to the described Internet of Things, k.sub.ei1 is the power generation power and offer data in said ith second trapezoidal fuzzy set, and k.sub.ei2 is the frequency modulation power and offer data in said ith second trapezoidal fuzzy set, k.sub.ei3 is peak modulation power and offer data in the ith second trapezoidal blur set, and k.sub.ei4 is regulated power and offer data in the ith second trapezoidal blur set, k eki is a membership coefficient of the ith second trapezoidal blur set. In the method, a second trapezoid fuzzy set representing an error rate is obtained by means of calculation in the described steps, so that an error rate can be accurately analyzed.
(32) In a specific implementation process, a target time period t is the same as the above, an error rate of data in each target time period is counted, and a fuzzy set of nine fuzzy uncertainties with an extremely low error rate, a very low error rate, a very low error rate, a very low error rate, a medium error rate, a very high error rate, a very high error rate, and an extremely high error rate is obtained, so as to represent the magnitude of the data error rate.
(33) In order to accurately calculate and obtain a third trapezoidal fuzzy set, step S203 uses a statistical analysis method to calculate a third trapezoidal fuzzy set of a repetition rate in the data sent to the Internet of things by the market transaction main body within the target time period, The method can be realized by the following steps: using a statistical analysis method to calculate the third trapezoidal fuzzy set with extremely low, very low, low, low, medium, high, high, very high and extremely high ambiguity of the repetition rate in the data sent by the marketing transaction entity during the target time period to the Internet of things as k.sub.Ri=(k.sub.Ri1, k.sub.Ri2, k.sub.Ri3, k.sub.Ri4; k.sub.Rki), wherein i=1, 2, . . . , 9, k.sub.Ri being the ith third trapezoidal fuzzy set of the repetition rate in the described data sent by the market transaction main body to the described Internet of things, k.sub.Ri1 is the power generation power and offer data in the ith said third trapezoidal fuzzy set, and k.sub.Ri2 is the frequency modulation power and offer data in the ith said third trapezoidal fuzzy set, k.sub.Ri3 is peak modulation power and offer data in the ith third trapezoids cloud set, k.sub.Ri4 is the surge power and offer data in the ith third trapezoids cloud set, k.sub.Rki is a membership coefficient of the ith third-trapezoidal fuzzy set. In the method, an uncertain fuzzy set of repetition rates in transmitted data is calculated through the described steps, so that a third trapezoid fuzzy set can be accurately determined.
(34) Specifically, the target time period is t. The repetition rate of the data in each target time period is counted, and nine fuzzy ambiguity ambiguous sets with extremely low, very low, low, low, medium, high, high, very high and extremely high repetition rates are obtained, so as to represent the size of the repetition rate in the data.
(35) In some optional implementations, in the step S204, a fourth trapezoidal fuzzy set of miss rates in the data sent to the Internet of things by the marketing transaction entity during the target time period is calculated by using a statistical analysis method, The method can be realized by the following steps: using a statistical analysis method to calculate the fourth trapezoidal fuzzy set with the uncertainties of very low, very low, low, low, medium, high, high, very high and very high fuzziness of the missing rate in the data sent by the marketing transaction entity during the target time period to the Internet of things k.sub.Li=(k.sub.Li1, k.sub.Li2, k.sub.Li3, k.sub.Li4; k.sub.Lki), where i=1, 2, . . . , 9, k.sub.Li1 is the power generation power and offer data of the ith fourth trapezoidal blur set, k.sub.Li2 is the frequency modulation power and offer data in the ith fourth trapezoidal fuzzy set mentioned above, and k.sub.Li3 is the peak modulation power and offer data in the ith fourth trapezoidal fuzzy set mentioned above, k.sub.Li4 is the power and offer data in the ith fourth-trapezoidal fuzzy set, and k.sub.Lki is the membership coefficient of the ith fourth-trapezoidal fuzzy set. In the method, an uncertain ambiguity set of deletion rates is calculated through the above steps, so that the absence of data can be analyzed accurately.
(36) In a specific implementation process, a target time period, such as t1, is counted as a missing condition, i.e., a missing rate, in data of each target time period, and a fuzzy set of nine fuzzy uncertainties, i.e., extremely low, very low, low, low, medium, high, high, very high, and extremely high, is generated, so as to represent a missing condition of the data.
(37) In order to further quantify the security and the false nature of the data, the described step S205 determines security detection values according to the described first trapezoidal fuzzy set, and determining a false detection value according to the second trapezoidal fuzzy set, the third trapezoidal fuzzy set and the fourth trapezoidal fuzzy set, This can be achieved by determining the security measure from the first set of trapezoidal blur values by a formula
(38)
where k.sub.A denotes the security detection value and k.sub.A0, N.sub.TD denotes the number of real data transmitted to the Internet of things by the marketing transaction entity, NAD stands for the first trapezium ambiguous set described above; determining a false detection fuzzy set by means of a formula
(39)
and determining the false detection value according to the formula
(40)
by means of the false detection fuzzy set, wherein N.sub.FD represents the false detection fuzzy set, N.sub.D represents the amount of data sent by the market transaction entity to the Internet of Things, k.sub.eC.sup.t is a first membership factor of the second ladder fuzzy set, and k.sub.eL.sup.t is a second membership factor of the second ladder fuzzy set, E(k.sub.ei) is the mathematical expectation of the second ladder fuzzy set, k.sub.RC.sup.t is the first membership coefficient of the third ladder fuzzy set, k.sub.RL.sup.t is the second membership coefficient being the third set of trapezoidal ambiguous sets and E(k.sub.Ri) being the mathematical expectation of the third set of trapezoidal ambiguous sets, k.sub.LC.sup.t is a first membership factor of the fourth set of trapezoidal ambiguous sets and k.sub.LL.sup.t is a second membership factor of the fourth set of trapezoidal ambiguous sets E(k.sub.Li), t is the t-th target time period and t=1, 2, . . . , N.sub.RP, k.sub.F indicates the false detection value and k.sub.F0, N.sub.FD indicates the number of false data sent to the Internet of things by the market trading entity.
(41) Specifically, in the platform layer, the marketing business subject sends data to the Internet of Things, and if there is a situation such as a momentary attack, this indicates that the sent data greatly affects the security of the Internet of Things. The security of the data sent by the marketing business subject to the Internet of Things is evaluated according to the following criteria:
(42)
In the platform layer, the marketing business subject sends data to the Internet of Things, and if there are errors, duplicate, or missing, this indicates that the sent data is spurious. The spuriousness of the data sent by the market transaction entity to the Internet of Things is evaluated according to the following index
(43)
in which the number N.sub.FD of the spuriousness data in the data sent by the market transaction entity to the Internet of Things is represented by the following formula
(44)
(45) In some optional implementations, the step S205 of determining, according to the security detection value and the false detection value, the security of Internet of Things data of a market transaction may be implemented by the following steps: in a case in which both the security detection value and the false detection value are 0, determining that the Internet of Things data of the market transaction is secure; in the case where the security detection value is greater than 0 and the false detection value is 0, determining that data attack exists in the market transaction Internet of Things data and false data does not exist; and in a case that the security detection value is 0 and the false detection value is greater than 0, determining that no data attack exists in the market transaction Internet of Things data and false data exists in the market transaction Internet of Things data. According to the method, a security or false problem existing in market transaction Internet of Things data is determined according to a security detection value and a false detection value obtained by means of calculation, so that a problem existing in data can be accurately determined.
(46) In a specific implementation process, a data security detection criterion for the market transaction Internet of Things sending data can be obtained by using the calculated data loss value sent by the Internet of Things of the market transaction and the vacationality and security evaluation index for the market transaction master sending data to the Internet of Things; and when k.sub.F=0 and k.sub.A=0 exist, there is no problem in data security. When k.sub.F=0, k.sub.A>0, there is no false data, but there is a data attack problem. When k.sub.F>0, k.sub.A=0, there is false data, but no data attack. The above criteria may also be subdivided: Data Security Level 1 alerts, on 0<k.sub.F0.1 or 0<k.sub.A0.1 at the time. Data Security Level 2 alerts, when 0.2<k.sub.F0.3 or 0.2<k.sub.A0.3 Data security Level 3 alerts, when 0.3<k.sub.F0.4 or 0.3<k.sub.A0.4 Data security level 4 alerts, when 0.4<k.sub.F0.5 or 0.4<k.sub.A0.5. Data security level 5 alerts, when 0.5<k.sub.F0.6 or 0.5<k.sub.A0.6. Data security level 6 alerts, when 0.6<k.sub.F0.7 or 0.6<k.sub.A0.7. Data security level 7 alerts, when 0.7<k.sub.F0.8 or 0.7<k.sub.A0.8 Data security level 8 alerts, when 0.8<k.sub.F0.9 or 0.8<k.sub.A0.9. Data security level 9 alerts, when 0.9<k.sub.F1.0 or 0.9<k.sub.A1.0.
(47) In some optional embodiments, the method further comprises calculating a channel blocking rate of data sent by the market transaction entity to the Internet of Things. In a network layer, by means of an Internet of Things perception system, data information about a generated power and an offer thereof, a frequency modulation power and an offer thereof for bidding, a peak modulation power and an offer thereof for bidding, and a voltage modulation power and an offer thereof for bidding sent by a market trading entity to the Internet of Things can be monitored. The statistical analysis method is used to calculate a trapezoidal fuzzy set k.sub.Zi (i=1, 2, . . . , 9), k.sub.Zi=(k.sub.Zi1, k.sub.Zi2, k.sub.Zi3, k.sub.Zi4; k.sub.Zki) of nine fuzzy uncertainties, i. e. very low, very low, low, low, medium, high, high, very high and very high, of a block rate of a data channel sent by a market transaction main body during the described target time period t (t=1, 2, . . . , N.sub.RP) to Internet of Things, where k.sub.Zi is the i-th trapezoidal fuzzy set of the blocking rate of the channel where market trading entities send data to the Internet of Things, and k.sub.Zi1, k.sub.Zi2, k.sub.Zi3 are the fuzzy set k.sub.Zi4 and k.sub.Zki membership coefficients of the i-th trapezoidal fuzzy set of the blocking rate of the channel where market trading entities send data to the Internet of Things, respectively.
(48) In order to enable those skilled in the art to understand the technical solutions of the present application more clearly, the implementation process of the method for detecting the security of the market transaction Internet of Things data of the present application will be described in detail below in conjunction with specific embodiments.
(49) The present embodiment relates to a specific security detection method for Internet of Things data of market transactions. As shown in
(50) Step S1: data sent by a market transaction owner to an Internet of Things;
(51) Step S2: the data sent by the market transaction owner to the Internet of Things has an evaluation of the number of attacks;
(52) Step S3: evaluating the data error rate sent by the market transaction owner to the Internet of Things;
(53) Step S4: evaluating a data repetition rate sent by a market transaction owner to the Internet of Things;
(54) Step S5: evaluating a data loss rate sent by the market transaction owner to the Internet of Things;
(55) Step S6: evaluating a data channel blocking rate sent by the market transaction owner to the Internet of Things;
(56) Step S7: a vacation evaluation of data sent by the market transaction entity to the Internet of Things;
(57) Step S8: the market transaction owner sends a security evaluation of the data to the Internet of Things;
(58) Step S9: a market transaction Internet of Things data security detection criterion.
(59) An embodiment of the present application also provides a security detection device for Internet of Things data of a market transaction. It should be noted that the security detection device for Internet of Things data of a market transaction of the embodiment of the present application can be used for executing the security detection method for Internet of Things data of a market transaction provided by the embodiment of the present application. The device is configured to implement the described embodiment and example implementation mode, and what has been described will not be elaborated. The term module, as used hereinafter, is a combination of software and/or hardware capable of realizing a predetermined function. Although the apparatus described in the following embodiment is preferably implemented by software, implementation of hardware or a combination of software and hardware is also possible and conceived.
(60) The following introduces a security detection device for Internet of Things data of a market transaction provided by an embodiment of the present application.
(61)
(62) A first calculation unit 10 for calculating, by using a statistical analysis method, a first trapezoidal fuzzy set having the number of attacks in data sent by a market transaction main body of a target time period to the Internet of things;
(63) Specifically, first, the number of times that data sent by a market transaction main body to an Internet of Things has an attack is evaluated, and data information about the generated power and the quote thereof, the frequency modulation power and the quote thereof for bidding, the peak modulation power and the quote thereof for bidding, and the voltage modulation power and the quote thereof for bidding sent by the market transaction main body to the Internet of Things can be monitored on a network layer by using an Internet of Things perception system. Using a statistical analysis method to calculate a first trapezoidal fuzzy set having the number of attacks in data sent by a market transaction main body within a target time period to the Internet of Things.
(64) A second calculation unit 20 for calculating a second trapezoidal fuzzy set of an error rate in the data sent to the Internet of things by the market transaction main body within the target time period using a statistical analysis method;
(65) Specifically, the data error rate sent by the market transaction main body to the Internet of Things is evaluated, and data information about the generated power and the quotes thereof, the frequency modulation power and the quotes thereof for bidding, the peak modulation power and the quotes thereof for bidding, and the voltage modulation power and the quotes thereof for bidding sent by the market transaction main body to the Internet of Things can be monitored by using the Internet of Things perception system on the network layer as well. Using a statistical analysis method to calculate a second trapezoidal fuzzy setting of a data error rate sent by a market transaction main body within a target time period to Internet of Things.
(66) A third calculation unit 30 for calculating a third trapezoidal fuzzy set of a repetition rate in the data sent to the Internet of things by the market transaction main body during the target time period using a statistical analysis method;
(67) Specifically, a data repetition rate sent by a market transaction main body to an Internet of things is evaluated; and data information about a generated power and a quote thereof, a frequency modulation power and a quote thereof for bidding, a peak modulation power and a quote thereof for bidding, and a voltage modulation power and a quote thereof for bidding sent by the market transaction main body to the Internet of things can be monitored on a network layer by using an Internet of things perception system. Using a statistical analysis method to calculate a third trapezoidal fuzzy set of a repetition rate in the described data sent by the market transaction main body of the target time period to the described Internet of things.
(68) A fourth calculation unit 40 for calculating, by using a statistical analysis method, a fourth trapezoidal fuzzy set of miss rate in the data sent to the Internet of things by the market transaction body within the target time period;
(69) Specifically, a data loss rate sent by a market transaction main body to an Internet of Things is evaluated; and data information about a generated power and a quote thereof, a frequency modulation power and a quote thereof for bidding, a peak modulation power and a quote thereof for bidding, and a voltage modulation power and a quote thereof for bidding sent by the market transaction main body to the Internet of Things can be monitored on a network layer by using an Internet of Things perception system. Using a statistical analysis method to calculate a fourth trapezoidal fuzzy set of a deletion rate in the described data sent by the market transaction entity of the target time period to the described Internet of things.
(70) A determination unit 50 for determining a security detection value according to the first trapezoidal fuzzy set, determining a false detection value according to the second trapezoidal fuzzy set, the third trapezoidal fuzzy set and the fourth trapezoidal fuzzy set, and determining the security of Internet of Things data of a market transaction according to the security detection value and the false detection value.
(71) Specifically, a security detection value is determined according to whether there is an attack, i.e., a first trapezoidal fuzzy set; a false detection value is determined according to whether there are errors, repetitions, and deletions, i.e., second, third and fourth trapezoidal fuzzy values; and finally, the security of market transaction data is determined according to the security detection value and the false detection value.
(72) By means of the embodiment, a statistical analysis method is used to calculate a first trapezoid fuzzy set having the number of attacks, a second trapezoid fuzzy set having an error rate, a third trapezoid fuzzy set having a repetition rate and a fourth trapezoid fuzzy set having a deletion rate in data sent by a market transaction main body in a target time period to Internet of things; a security detection value is determined according to the first trapezoid fuzzy set; a false detection value is determined according to the second trapezoid fuzzy set, the third trapezoid fuzzy set and the fourth trapezoid fuzzy set; and the security of market transaction Internet of things data is determined according to the security detection value and the false detection value. In the prior art, there may be a security problem in market transaction data. In the present application, security detection is performed on market transaction Internet of Things data by calculating uncertain ambiguous sets, which can reflect the number of attacks on transmission data, a data error rate, a data repetition rate, a data deletion rate, etc., and accurately determine the security of market transaction Internet of Things data. Therefore, the problem of security of market transaction data in the prior art can be alleviated.
(73) In a specific implementation process, the first calculation unit comprises a first calculation module used for calculating, by using the described statistical analysis method, a first trapezoidal fuzzy set N.sub.ADi=(N.sub.ADi1, N.sub.ADi2, N.sub.ADi3, N.sub.ADi4; k.sub.DAi) having nine fuzzy uncertainties, the number of attacks being very low, very low, low, relatively low, medium, relatively high, high, very high and very high, in the data sent by the marketing transaction entity to the Internet of things in the described target time period, wherein i=1, 2, . . . , 9, N.sub.ADi is the i.sup.th first trapezoidal fuzzy set of the number of attacks in the data sent by the market transaction main body to the Internet of Things, N.sub.ADi1 is the power generation power and offer data of the i.sup.th first trapezoidal fuzzy set, and N.sub.ADi2 is the frequency modulation power and offer data of the i.sup.th first trapezoidal fuzzy set, N.sub.ADi3 is the peak tuning power and offer data of the i.sup.th first trapezoidal fuzzy set, and N.sub.ADi4 is the peak tuning power and offer data of the i.sup.th first trapezoidal fuzzy set, k.sub.DAi is a membership coefficient of the i.sup.th first-trapezoidal fuzzy set. In the method, a first trapezoidal fuzzy set is calculated by means of the described steps, so that the first trapezoidal fuzzy set can be accurately calculated.
(74) Specifically, t=1, 2, . . . , N.sub.RP there are a plurality of target time periods t; the number of attacks in data sent to the Internet of Things by a marketing transaction agent in each target time period is counted; and nine blurred trapezoidal blurred sets, i.e. first trapezoidal blurred sets corresponding to extremely low, very low, low, low, medium, high, high, very high, and extremely high, are obtained respectively, which represent the number of attacks in the data.
(75) In some optional implementations, the second calculation unit comprises a second calculation module configured to calculate, by using the statistical analysis method, a second trapezoidal fuzzy set k.sub.ei=(k.sub.ei1, k.sub.ei2, k.sub.ei3, k.sub.ei4; k.sub.eki) with a minimum, very low, low, low, medium, high, high, very high ambiguity in the data sent to the Internet of things by the marketing transaction subject within the target time period, wherein i=1, 2, . . . , 9, k.sub.ei is the ith second trapezoidal fuzzy set of an error rate in the described data sent by the market transaction main body to the described Internet of Things, k.sub.ei1 is the power generation power and offer data of the ith second trapezoidal blur set, and k.sub.ei2 is the frequency modulation power and offer data of the ith second trapezoidal blur set, k.sub.ei3 is the peak modulation power and offer data in the ith second trapezoidal blur set, and k.sub.eki is the peak modulation power and offer data in the ith second trapezoidal blur set, k.sub.eki is a membership coefficient of the ith second-trapezoidal fuzzy set. In the method, a second trapezoid fuzzy set representing an error rate is obtained by means of calculation in the described steps, so that an error rate can be accurately analyzed.
(76) In a specific implementation process, a target time period t is the same as the above, an error rate of data in each target time period is counted, and a fuzzy set of nine fuzzy uncertainties with an extremely low error rate, a very low error rate, a very low error rate, a very low error rate, a medium error rate, a very high error rate, a very high error rate, and an extremely high error rate is obtained, so as to represent the magnitude of the data error rate.
(77) In order to accurately calculate and obtain a third trapezoidal fuzzy set, the described third calculation unit comprises a third calculation module, the third trapezoidal fuzzy set k.sub.Ri=(k.sub.Ri1, k.sub.Ri2, k.sub.Ri3, k.sub.Ri4; k.sub.Rki) for calculating nine ambiguous uncertainties of extremely low, very low, low, low, middle, high, high, very high and extremely high repetition rates of the data sent by the marketing transaction entity during the target time period to the Internet of things by using a statistical analysis method, wherein i=1, 2, . . . , 9, k.sub.Ri is the ith third trapezoidal fuzzy set of the repetition rate in the described data sent by the market transaction main body to the described Internet of things, k.sub.Ri1 is the power generation power and offer data of the ith said third trapezoidal blur set, k.sub.Ri2 is the frequency modulation power and offer data of the ith said third trapezoidal blur set, k.sub.Ri3 is the peak modulation power and offer data in the ith above-mentioned third trapezoidal fuzzy set, and k.sub.Ri4 is the peak modulation power and offer data in the ith above-mentioned third trapezoidal fuzzy set, k.sub.Rki is a membership coefficient of the ith foregoing third trapezoidal blur set. In the method, an uncertain fuzzy set of repetition rates in transmitted data is calculated through the described steps, so that a third trapezoid fuzzy set can be accurately determined.
(78) Specifically, the target time period is t. The repetition rate of the data in each target time period is counted, and nine fuzzy ambiguity ambiguous sets with extremely low, very low, low, low, medium, high, high, very high and extremely high repetition rates are obtained, so as to represent the size of the repetition rate in the data.
(79) In some optional implementations, the fourth calculation unit comprises a fourth calculation module configured to calculate, by using a statistical analysis method, a fourth trapezoidal ambiguity set k.sub.Li=(k.sub.Li1, k.sub.Li2, k.sub.Li3, k.sub.Li4; k.sub.Lki) having nine ambiguity values, that is, an extremely low ambiguity, a very low ambiguity, a very low ambiguity, a very low ambiguity, a very low ambiguity, a middle ambiguity, a relatively high ambiguity, a very high ambiguity, and a very high ambiguity in the data sent by the marketing transaction entity within the target time period to the Internet of things, where i=1, 2, . . . , 9, k.sub.Li1 is the power generation power and offer data of the ith fourth trapezoidal blur set, k.sub.Li2 is the frequency modulation power and offer data in the ith fourth trapezoidal blur set, and k.sub.Li3 is the peak modulation power and offer data in the ith fourth trapezoidal blur set, k.sub.Li4 is the regulated power and offer data in the ith fourth-trapezoidal fuzzy set, and k.sub.Lki is the membership coefficient of the ith fourth-trapezoidal fuzzy set. In the method, an uncertain ambiguity set of deletion rates is calculated through the above steps, so that the absence of data can be analyzed accurately.
(80) In a specific implementation process, a target time period, such as t1, is counted as a missing condition, i.e., a missing rate, in data of each target time period, and a fuzzy set of nine fuzzy uncertainties, i.e., extremely low, very low, low, low, medium, high, high, very high, and extremely high, is generated, so as to represent a missing condition of the data.
(81) In order to further quantify the security and the false nature of the data, the described determination unit comprises a first determination module and a second determination module, a first determination module is used for determining a security detection value according to the described first trapezoidal fuzzy set via a formula
(82)
where k.sub.A denotes the security detection value and k.sub.A0, N.sub.TD denotes the number of real data transmitted to the Internet of things by the marketing transaction entity, N.sub.AD stands for the first trapezium ambiguous set described above; the second determination module is used for determining a false detection fuzzy set a formula via
(83)
and determining the false detection value via the false detection fuzzy set according to the formula
(84)
wherein N.sub.FD represents the false detection fuzzy set, N.sub.D represents the amount of data sent by the market transaction entity to the Internet of Things, k.sub.eC.sup.t is a first membership factor of the second ladder fuzzy set, and a second membership factor of the second ladder fuzzy set, k.sub.eL.sup.t is the mathematical expectation of the second ladder fuzzy set, E(k.sub.ei) is the first membership coefficient of the third ladder fuzzy set, k.sub.RC.sup.t is the second membership coefficient k.sub.RL.sup.t being the third set of trapezoidal ambiguous sets and E(k.sub.Ri) being the mathematical expectation of the third set of trapezoidal ambiguous sets, k.sub.LC.sup.t is a first membership factor of the fourth set of trapezoidal ambiguous sets and k.sub.LL.sup.t is a second membership factor of the fourth set of trapezoidal ambiguous sets E(k.sub.Li), t is the t-th target time period and t=1, 2, . . . , N.sub.RP, K.sub.F indicates the false detection value and K.sub.F>0, N.sub.FD indicates the number of false data sent to the Internet of things by the market trading entity.
(85) Specifically, in the platform layer, the marketing business subject sends data to the Internet of Things, and if there is a situation such as a momentary attack, this indicates that the sent data greatly affects the security of the Internet of Things. The security of the data sent by the marketing business subject to the Internet of Things is evaluated according to the following criteria
(86)
in the platform layer, the marketing business subject sends data to the Internet of Things, and if there are errors, duplicate, or missing, this indicates that the sent data is spurious. The spuriousness of the data sent by the market transaction entity to the Internet of Things is evaluated according to the following indexes
(87)
wherein the amount N.sub.FD of the false data in the data sent by the market transaction entity to the Internet of Things is represented by the following formula
(88)
(89) In some optional implementations, the determination unit further comprises a third determination module, a fourth determination module and a fifth determination module, wherein the third determination module is used for determining that the market transaction Internet of Things data is secure when both the security detection value and the false detection value are 0; a fourth determination module for determining that there is a data attack on the market transaction Internet of Things data and there is no false data in the case where the security detection value is greater than 0 and the false detection value is 0; the fifth determination module is configured to, when the security detection value is 0 and the false detection value is greater than 0, determine that no data attack exists in the market transaction Internet of Things data and false data exists in the market transaction Internet of Things data. According to the method, a security or false problem existing in market transaction Internet of Things data is determined according to a security detection value and a false detection value obtained by means of calculation, so that a problem existing in data can be accurately determined.
(90) In a specific implementation process, a data security detection criterion for the market transaction Internet of Things sending data can be obtained by using the calculated data loss value sent by the Internet of Things of the market transaction and the vacationality and security evaluation index for the market transaction body sending data to the Internet of Things. When k.sub.F=0 k.sub.A=0, the data security is correct, there is no problem in the data security. When k.sub.F=0, k.sub.A>0, there is no false data, but there is a data attack problem. When k.sub.F>0 k.sub.A=0, there is false data, but no data attack. The above criteria may also be subdivided: Data Security Level 1 alerts, on 0<k.sub.F0.1 or 0<k.sub.A0.1 at the time. Data Security Level 2 alerts, when 0.2<k.sub.F0.3 or 0.2<k.sub.A0.3. Data security Level 3 alerts, when 0.3<k.sub.F0.4 or 0.3<k.sub.A0.4. Data security level 4 alerts, when 0.4<k.sub.F0.5 or 0.4<k.sub.A0.5. Data security level 5 alerts, when 0.5<k.sub.F0.6 or 0.5<k.sub.A0.6. Data security level 6 alerts, when 0.6<k.sub.F0.7 or 0.6<k.sub.A0.7, data security level 7 alerts, when 0.7<k.sub.F0.8 or 0.7<k.sub.A0.8, data security level 8 alerts, when or 0.8<k.sub.F0.9 or 0.8<k.sub.A0.9 Data security level 9 alerts, when 0.9<k.sub.F1.0 or 0.9<k.sub.A1.0.
(91) In some optional embodiments, the method further comprises calculating a channel blocking rate of data sent by the market transaction entity to the Internet of Things. In a network layer, by means of an Internet of Things perception system, data information about a generated power and an offer thereof, a frequency modulation power and an offer thereof for bidding, a peak modulation power and an offer thereof for bidding, and a voltage modulation power and an offer thereof for bidding sent by a market trading entity to the Internet of Things can be monitored. using a statistical analysis method to calculate a trapezoidal fuzzy set k.sub.Zi (i=1, 2, . . . , 9) k.sub.Zi=(k.sub.Zi1, k.sub.Zi2, k.sub.Zi3, k.sub.Zi4; k.sub.Zki) of nine fuzzy uncertainties, i.e. very low, very low, low, low, medium, high, high, very high and very high, of a block rate of a data channel sent by a market transaction entity of the described target time period t (t=1, 2, . . . , N.sub.RP) to Internet of Things, k.sub.Zi, wherein an ith trapezoidal fuzzy set of a data channel blocking rate is sent to Internet of Things for a market transaction subject, k.sub.Zi1, k.sub.Zi2, k.sub.Zi3, k.sub.Zi4 and k.sub.Zki respectively are a fuzzy set and a membership coefficient of an ith trapezoidal fuzzy set of a data channel blocking rate, which are sent by a market transaction main body to the Internet of things.
(92) The above-mentioned security detection device for market transaction Internet of Things data comprises a processor and a memory; the described first calculation unit, second calculation unit, third calculation unit, fourth calculation unit and determination unit, etc. are all stored in the memory as program units; and the processor executes the described program units stored in the memory to realize corresponding functions. All the described modules are located in the same processor; alternatively, the modules are located in different processors in an arbitrary combination.
(93) The processor includes a kernel, and the kernel calls a corresponding program unit from a memory. One or more cores can be provided, and the security of market transaction data can be improved by adjusting the parameters of the cores.
(94) The memory may include a non-permanent memory in a computer readable medium, a random access memory (RAM), and/or a non-volatile memory, such as a read-only memory (ROM) or a flash RAM, and the memory includes at least one memory chip.
(95) Embodiments of the present invention provide a computer readable storage medium. The computer readable storage medium comprises a stored program. The program, when running, controls a device where the computer readable storage medium is located to execute the method for detecting security of market transaction Internet of Things data.
(96) Specifically, the method for detecting the security of market transaction Internet of Things data comprises:
(97) Step S201, calculating at least one first trapezoidal fuzzy set having a number of attacks of data, the data being sent by a market transaction main body within a target time period to Internet of Things;
(98) Step S202, calculating at least one second trapezoidal fuzzy set of an error rate of the data; Specifically, the data error rate sent by the market transaction main body to the Internet of Things is evaluated, and data information about the generated power and the quotes thereof, the frequency modulation power and the quotes thereof for bidding, the peak modulation power and the quotes thereof for bidding, and the voltage modulation power and the quotes thereof for bidding sent by the market transaction main body to the Internet of Things can be monitored by using the Internet of Things perception system on the network layer as well. Using a statistical analysis method to calculate a second trapezoidal fuzzy setting of a error rate sent by a market transaction main body within a target time period to Internet of Things.
(99) Step S203, calculating at least one third trapezoidal fuzzy set of a repetition rate of the data;
(100) Step S204, calculating at least one fourth trapezoidal fuzzy set of miss rate of the data; determining a security detection value according to the first trapezoidal fuzzy set;
(101) Step S205: determining a false detection value according to the second trapezoidal fuzzy set, the third trapezoidal fuzzy set and the fourth trapezoidal fuzzy set; and determining security of the Internet of Things data of the market transaction according to the security detection value and the false detection value.
(102) Provided is an electronic apparatus, comprising a processor, a memory and a program stored in the memory and capable of running on the processor, wherein when the processor executes the program, at least the following steps are achieved:
(103) Step S201, calculating at least one first trapezoidal fuzzy set having a number of attacks of data, the data being sent by a market transaction main body within a target time period to Internet of Things;
(104) Step S202, calculating at least one second trapezoidal fuzzy set of an error rate of the data; Specifically, the data error rate sent by the market transaction main body to the Internet of Things is evaluated, and data information about the generated power and the quotes thereof, the frequency modulation power and the quotes thereof for bidding, the peak modulation power and the quotes thereof for bidding, and the voltage modulation power and the quotes thereof for bidding sent by the market transaction main body to the Internet of Things can be monitored by using the Internet of Things perception system on the network layer as well. Using a statistical analysis method to calculate a second trapezoidal fuzzy setting of a data error rate sent by a market transaction main body within a target time period to Internet of Things.
(105) Step S203, calculating at least one third trapezoidal fuzzy set of a repetition rate of the data;
(106) Step S204, calculating at least one fourth trapezoidal fuzzy set of miss rate of the data; determining a security detection value according to the first trapezoidal fuzzy set;
(107) Step S205: determining a false detection value according to the second trapezoidal fuzzy set, the third trapezoidal fuzzy set and the fourth trapezoidal fuzzy set; and determining security of the Internet of Things data of the market transaction according to the security detection value and the false detection value.
(108) The device herein may be a server, a PC, a PAD, a mobile phone, etc.
(109) Optionally, a first trapezoidal fuzzy set N.sub.ADi=(N.sub.ADi1, N.sub.ADi2, N.sub.ADi3, N.sub.ADi4; k.sub.DAi) with nine ambiguous uncertainties of very low, very low, low, low, medium, high, high, very high and very high ambiguous uncertainties in the data sent by the marketing transaction entity to the Internet of things within the target time period is calculated by using the statistical analysis method, wherein i=1, 2, . . . , 9, N.sub.ADi is the i.sup.th first trapezoidal fuzzy set having the number of attacks in the data sent by the market transaction main body to the Internet of Things, NADA is the power generation power and offer data in the i.sup.th first trapezoidal fuzzy set, N.sub.ADi2 is the frequency modulation power and offer data in the i.sup.th first trapezoidal fuzzy set, N.sub.ADi3 is the peak tuning power and offer data of the i.sup.th first trapezoidal fuzzy set, and N.sub.ADi4 is the peak tuning power and offer data of the i.sup.th first trapezoidal fuzzy set, k.sub.DAi is a membership coefficient of the i.sup.th first trapezoidal blur set.
(110) Optionally, a statistical analysis method is used to calculate a second trapezoidal fuzzy set of an error rate in the data sent to the Internet of things by the marketing transaction subject in the target time period, comprising: using the statistical analysis method to calculate the second trapezoidal fuzzy set with a very low, very low, low, low, medium, high, high, very high and very high ambiguity in the data sent by the marketing transaction entity to the Internet of things in the target time period as k.sub.ei=(k.sub.ei1, k.sub.ei2, k.sub.ei3, k.sub.ei4; k.sub.eki), wherein i=1, 2, . . . , 9, k.sub.ei is the ith second trapezoidal fuzzy set of error rates in the data sent by the market transaction agent to the Internet of Things, k.sub.ei1 is the power generation power and offer data in the ith second trapezoidal fuzzy set, and k.sub.ei2 is the frequency modulation power and offer data in the ith second trapezoidal fuzzy set, k.sub.ei3 is the peak tuning power and offer data of the ith second trapezoidal fuzzy set, and k.sub.ei4 is the peak tuning power and offer data of the ith second trapezoidal fuzzy set, k.sub.eki is a membership coefficient of the ith second trapezoidal blur set.
(111) Optionally, a statistical analysis method is used to calculate a third trapezoidal fuzzy set of a repetition rate in the data sent to the Internet of things by the market trading entity during the target time period, comprising: using a statistical analysis method to calculate the third trapezoidal fuzzy set k.sub.Ri=(k.sub.Ri1, k.sub.Ri2, k.sub.Ri3, k.sub.Ri4; k.sub.Rki) with extremely low, very low, low, low, medium, high, high, very high and extremely high ambiguity of the repetition rate of the data sent by the marketing transaction entity in the target time period to the Internet of things, wherein i=1, 2, . . . , 9, k.sub.Ri is the ith third trapezoidal fuzzy set of the repetition rate in the data sent by the market transaction agent to the Internet of Things, k.sub.Ri1 is the power generation power and offer data of the ith said third trapezoidal fuzzy set, and k.sub.Ri2 is the frequency modulation power and offer data of the ith said third trapezoidal fuzzy set, k.sub.Ri3 is modus power and offer data in the ith third trapezoidal blur set, and k.sub.Ri4 is the power and offer data in the ith third trapezoidal blur set, k.sub.Rki is a membership coefficient of the ith third-trapezoidal fuzzy set.
(112) Optionally, a statistical analysis method is used to calculate a fourth trapezoidal fuzzy set of miss rates in the data sent to the Internet of Things by the marketing transaction entity during the target time period, comprising: using a statistical analysis method to calculate the fourth trapezoidal fuzzy set k.sub.Li=(k.sub.Li1, k.sub.Li2, k.sub.Li3, k.sub.Li4; k.sub.Lki) with nine fuzzy uncertainties, i.e. a very low ambiguity, a very low ambiguity, a low ambiguity, a very low ambiguity, a medium ambiguity, a relatively high ambiguity, a very high ambiguity and a very high ambiguity in the data sent by the marketing transaction entity in the target time period to the Internet of things, wherein i=1, 2, . . . , 9, k.sub.Li1 is the power generation power and offer data of the ith fourth trapezoidal fuzzy set, k.sub.Li2 is the frequency modulation power and offer data in the ith fourth trapezoidal fuzzy set, and k.sub.Li3 is the peak modulation power and offer data in the ith fourth trapezoidal fuzzy set, k.sub.Li4 is the adjusted power and offer data in the ith fourth-trapezoidal fuzzy set, k.sub.Lki is the membership coefficient of the ith fourth-trapezoidal fuzzy set.
(113) Optionally, determining a security detection value according to the first trapezoidal fuzzy set, and determining a false detection value according to the second trapezoidal fuzzy set, the third trapezoidal fuzzy set and the fourth trapezoidal fuzzy set comprises: determining a security detection value according to the first trapezoidal fuzzy set by means of a formula
(114)
wherein k.sub.A represents the security detection value and k.sub.A0, N.sub.TD represents the quantity of real data sent by the marketing transaction agent to the Internet of Things, and N.sub.AD represents the first trapezoidal fuzzy set; determining a false detection fuzzy set by means of a formula
(115)
and determining a false detection value according to the formula
(116)
by means of the false detection fuzzy set, in which N.sub.FD represents the false detection fuzzy set, N.sub.D represents the quantity of data sent by the market transaction main body to the Internet of things, k.sub.eC.sup.t is a first membership coefficient of the second trapezoid fuzzy set, k.sub.eL.sup.t is a second membership coefficient of the second trapezoid fuzzy set, E(k.sub.ei) is a mathematical expectation of the second trapezoid fuzzy set, k.sub.RC.sup.t is a first membership coefficient of the third trapezoid fuzzy set, k.sub.RL.sup.t is a second membership coefficient of the third trapezoid fuzzy set, E(k.sub.Ri) is a mathematical expectation of the third trapezoid fuzzy set, k.sub.LC.sup.t is a first membership coefficient of the fourth trapezoid fuzzy set, k.sub.LL.sup.t is a second membership coefficient of the fourth trapezoid fuzzy set, E(k.sub.Li) is a mathematical expectation of the fourth trapezoid fuzzy set, t is a t-th target time period, and t=1, 2, . . . , N.sub.RP, K.sub.F represents the false detection value, and k.sub.F0, N.sub.FD represents the quantity of false transaction data sent by the market deduction main body to the Internet of things.
(117) Optionally, determining the security of market transaction Internet of Things data according to the security detection value and the false detection value comprises: in the case where both the security detection value and the false detection value are 0, determining that the market transaction Internet of Things data is secure; in the case where the security detection value is greater than 0 and the false detection value is 0, determining that there is a data attack on the market transaction Internet of Things data and there is no false data; and in the case where the security detection value is zero and the false detection value is greater than zero, determining that no data attack exists in the market transaction Internet of Things data and false data exists in the market transaction Internet of Things data.
(118) Obviously, those skilled in the art should understand that the described modules and steps of the present invention can be realized by a universal computing device, They may be centralized on a single computing device or distributed on a network composed of a plurality of computing devices, They can be implemented by program codes executable by a computing device, and thus can be stored in a storage apparatus and executed by the computing device, Furthermore, in some cases, the shown or described steps may be executed in an order different from that described here, or they are made into integrated circuit modules respectively, or a plurality of modules or steps therein are made into a single integrated circuit module for implementation. Thus, the present invention is not limited to any specific combination of hardware and software.
(119) Those skilled in the art shall understand that the embodiments of the present application can be provided as a method, a system or a computer program product. Therefore, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware. Furthermore, the present application may take the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to a disk memory, a CD-ROM, an optical memory, etc.) containing computer-usable program codes.
(120) The present application is described with reference to the flowcharts and/or block diagrams of the method, device (system), and computer program product according to the embodiments of the present application. It should be understood that each flow and/or block in the flowcharts and/or block diagrams and combinations of flows and/or blocks in the flowcharts and/or block diagrams can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, a special purpose computer, an embedded processor or other programmable data processing apparatus to produce a machine, An apparatus that enables instructions executed by a processor of a computer or other programmable data processing devices to generate the functions specified in one or more processes in the flowcharts and/or one or more blocks in the block diagrams.
(121) These computer program instructions may also be stored in a computer-readable memory capable of guiding a computer or other programmable data processing apparatuses to work in a specific manner, so that the instructions stored in the computer-readable memory generate a manufactured product comprising an instruction device, and the instruction device implements functions specified in one or more flows in the flowchart and/or one or more blocks in the block diagram.
(122) These computer program instructions may also be loaded onto a computer or another programmable data processing device, causing a series of operational steps to be performed on a computer or other programmable apparatus to produce a computer implemented process, Thus, the instructions executed on the computer or other programmable devices provide steps for implementing the functions specified in one or more processes in the flowcharts and/or one or more blocks in the block diagrams.
(123) In a typical configuration, the computing device includes one or more processors (CPUs), an input/output interface, a network interface, and memory.
(124) The memory may include a non-permanent storage in a computer readable medium, a random access memory (RAM), and/or a non-volatile memory, such as a read-only memory (ROM) or a flash RAM. A memory is an example of a computer-readable medium.
(125) Computer-readable media, including both persistent and non-persistent, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random-access memory (SRAM), dynamic random-access memory (DRAM), other types of random-access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, compact disc read-only memory (CD-ROM), digital versatile discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission media, which may be used to store information that may be accessed by a computing device. As defined herein, computer-readable media does not include transitory computer-readable media, such as modulated data signals and carrier waves.
(126) It should also be noted that the terms include, include, or any other variation thereof are intended to cover a non-exclusive inclusion, so that a process, a method, a commodity, or a device that includes a series of elements not only includes those elements, but also includes other elements that are not explicitly listed, or further includes inherent elements of the process, the method, the commodity, or the device. Without further limitation, an element limited by include a . . . does not exclude other same elements existing in a process, a method, a commodity, or a device that includes the element.
(127) From the above description, it can be seen that the above embodiments of the present application achieve the following technical effects:
(128) 1) In the security detection method for market transaction Internet of Things data of the present application, a statistical analysis method is used to calculate a first trapezoidal fuzzy set having the number of attacks, a second trapezoidal fuzzy set having an error rate, a third trapezoidal fuzzy set having a repetition rate and a fourth trapezoidal fuzzy set having a deletion rate in data sent by a market transaction main body to an Internet of Things in a target time period; a security detection value is determined according to the first trapezoidal fuzzy set; a false detection value is determined according to the second trapezoidal fuzzy set, the third trapezoidal fuzzy set and the fourth trapezoidal fuzzy set; and the. In the prior art, there may be a security problem in market transaction data. In the present application, security detection is performed on market transaction Internet of Things data by calculating uncertain ambiguous sets, which can reflect the number of attacks on transmission data, a data error rate, a data repetition rate, a data deletion rate, etc., and accurately determine the security of market transaction Internet of Things data. Therefore, the problem of security of market transaction data in the prior art can be alleviated.
(129) 2) In the security detection device for market transaction Internet of Things data of the present application, a statistical analysis method is used to calculate a first trapezoid fuzzy set having the number of attacks, a second trapezoid fuzzy set having an error rate, a third trapezoid fuzzy set having a repetition rate and a fourth trapezoid fuzzy set having a deletion rate in data sent by a market transaction main body to an Internet of Things in a target time period; a security detection value is determined according to the first trapezoid fuzzy set; a false detection value is determined according to the second trapezoid fuzzy set, the third trapezoid fuzzy set and the fourth trapezoid fuzzy set; and the security of market transaction Internet of Things data is determined according to the security detection value and the false detection value. In the prior art, there may be a security problem in market transaction data. In the present application, security detection is performed on market transaction Internet of Things data by calculating uncertain ambiguous sets, which can reflect the number of attacks on transmission data, a data error rate, a data repetition rate, a data deletion rate, etc., and accurately determine the security of market transaction Internet of Things data. Therefore, the problem of security of market transaction data in the prior art can be alleviated.
(130) The foregoing descriptions are merely exemplary embodiments of the present application, but are not intended to limit the present application. For those skilled in the art, the present application may have various modifications and variations. Any modifications, equivalent replacements, improvements and the like made within the spirit and principle of the present application shall belong to the scope of protection of the present application.