Research Article
Data Security Storage Method for Power Distribution Internet of Things in Cyber-Physical Energy Systems
Pseudocode of edge node oriented security defense algorithm | Input: number of nodes | Begin | 1. The security defense model of stochastic differential game is established: | 2. Set parameters according to network conditions , , , , , , , , | 3. For to | 4. Nash equilibrium method is used to calculate the game model, and the optimal strategy is obtained: | | | 5. End for | 6. According to the equilibrium solution structure, the number of intruders is analyzed. | End |
|
Algorithm 1: |