Application and Optimization of Multi-Factor Authentication and Biometric Technology in Power Grid Energy Network Access Control

被引:0
|
作者
Meng, Jiaxiao [1 ,2 ]
Du, Jinyan [1 ,2 ]
Liang, Zhihong [1 ,2 ]
Yang, Chunyan [1 ,2 ]
Jiang, Yixin [1 ,2 ]
机构
[1] Electric Power Research Institute CSG, Guangdong, Guangzhou, China
[2] Guangdong Provincial Key Laboratory of Power System Network Security, Guangdong, Guangzhou, China
来源
关键词
With the sudden development in electronic and network technology; the power grid has emerged in several evolved nations and other areas with faster development. Energy storage can enhance the stability; resiliency and efficiency of the electric smart grid. The power grid transfers energy via bidirectional control of energy and information flow. In the power grid; a smart meter is an important component that is deployed on the user side to determine the consumption of energy regularly. However; the data about the usage of electricity leads to the leakage of the private information of the user; which threatens the privacy of the user. The attackers can change the in-transit message induce wrong information and sometimes cause disastrous action. Hence; it is important to assure data security and privacy of users by conducting authentication in power grid communication. An optimization technique named Puzzle Optimization Algorithm (POA) is designed for the efficient privacy-preserving aggregation approach with multi-factor authentication and a biometric scheme. Also; optimal key-based Elliptic Curve Cryptography (ECC) is used to encrypt the sensitive data that are securely stored. Authentication offers high security and texture analysis. In the registration phase; the privacy information of the person with their biometrics is the important feature point of the individual unique identification. Additionally; the designed approach is compared with other existing optimizations to analyse the functionality of the implemented technique. The simulation outcome defined that the suggested technique enhances user privacy and information security than other standard approaches. © 2024; European Association for the Development of Renewable Energy; Environment and Power Quality (EA4EPQ). All rights reserved;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:118 / 131
相关论文
共 50 条
  • [1] Biometric multi-factor authentication: On the usability of the FingerPIN scheme
    Marasco, Emanuela
    Albanese, Massimiliano
    Patibandla, Venkata Vamsi Ram
    Vurity, Anudeep
    Sriram, Sumanth Sai
    SECURITY AND PRIVACY, 2023, 6 (01)
  • [2] Secure biometric template generation for multi-factor authentication
    Khan, Salman H.
    Akbar, M. Ali
    Shahzad, Farrukh
    Farooq, Mudassar
    Khan, Zeashan
    PATTERN RECOGNITION, 2015, 48 (02) : 458 - 472
  • [3] Analysis and improvement of a multi-factor biometric authentication scheme
    Cao, Liling
    Ge, Wancheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 617 - 625
  • [4] Using Bayes Factors For Multi-factor, Biometric Authentication
    Giffin, A.
    Skuka, J. D.
    Lao, P. A.
    BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING (MAXENT 2014), 2015, 1641 : 611 - 615
  • [5] Implementing multi-factor authentication (MFA) for robust network access security
    De, Indrajit
    Agarwal, Ambuj Kumar
    Bhushan, Bharat
    Kalnawat, Aarti
    Mathurkar, Piyush
    Garg, Amit
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 821 - 832
  • [6] Implementing Open Source Biometric Face Authentication for Multi-factor Authentication Procedures
    Minakova, Natalya
    Mansurov, Alexander
    HIGH-PERFORMANCE COMPUTING SYSTEMS AND TECHNOLOGIES IN SCIENTIFIC RESEARCH, AUTOMATION OF CONTROL AND PRODUCTION, 2022, 1526 : 371 - 379
  • [7] Symmetric-Key Multi-factor Biometric Authentication Scheme
    Iftikhar, Jawad
    Hussain, Sajid
    Mansoor, Khwaja
    Ali, Zeeshan
    Chaudhry, Shehzad Ashraf
    2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2019, : 288 - 292
  • [8] Ensuring privacy of biometric factors in multi-factor authentication systems
    Apampa, Kikelomo Maria
    Zhang, Tian
    Wills, Gary B.
    Argles, David
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 44 - 49
  • [9] Security analysis and enhancements of a multi-factor biometric authentication scheme
    Wu, Min
    Chen, Jianhua
    Zhu, Wenxia
    Yuan, Zhenyang
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (04) : 352 - 365
  • [10] Biometric Knowledge Extraction for Multi-Factor Authentication and Key Exchange
    Griffin, Phillip H.
    COMPLEX ADAPTIVE SYSTEMS, 2015, 2015, 61 : 66 - 71