Research Article

Data Security Storage Method for Power Distribution Internet of Things in Cyber-Physical Energy Systems

Algorithm 1:

Pseudocode of edge node oriented security defense algorithm
Input: number of nodes
Begin
1. The security defense model of stochastic differential game is established:
2. Set parameters according to network conditions , , , , , , , ,
3. For to
4. Nash equilibrium method is used to calculate the game model, and the optimal strategy is obtained:
5. End for
6. According to the equilibrium solution structure, the number of intruders is analyzed.
End
Algorithm 1: