Application and Optimization of Multi-Factor Authentication and Biometric Technology in Power Grid Energy Network Access Control

被引:0
|
作者
Meng, Jiaxiao [1 ,2 ]
Du, Jinyan [1 ,2 ]
Liang, Zhihong [1 ,2 ]
Yang, Chunyan [1 ,2 ]
Jiang, Yixin [1 ,2 ]
机构
[1] Electric Power Research Institute CSG, Guangdong, Guangzhou, China
[2] Guangdong Provincial Key Laboratory of Power System Network Security, Guangdong, Guangzhou, China
来源
关键词
With the sudden development in electronic and network technology; the power grid has emerged in several evolved nations and other areas with faster development. Energy storage can enhance the stability; resiliency and efficiency of the electric smart grid. The power grid transfers energy via bidirectional control of energy and information flow. In the power grid; a smart meter is an important component that is deployed on the user side to determine the consumption of energy regularly. However; the data about the usage of electricity leads to the leakage of the private information of the user; which threatens the privacy of the user. The attackers can change the in-transit message induce wrong information and sometimes cause disastrous action. Hence; it is important to assure data security and privacy of users by conducting authentication in power grid communication. An optimization technique named Puzzle Optimization Algorithm (POA) is designed for the efficient privacy-preserving aggregation approach with multi-factor authentication and a biometric scheme. Also; optimal key-based Elliptic Curve Cryptography (ECC) is used to encrypt the sensitive data that are securely stored. Authentication offers high security and texture analysis. In the registration phase; the privacy information of the person with their biometrics is the important feature point of the individual unique identification. Additionally; the designed approach is compared with other existing optimizations to analyse the functionality of the implemented technique. The simulation outcome defined that the suggested technique enhances user privacy and information security than other standard approaches. © 2024; European Association for the Development of Renewable Energy; Environment and Power Quality (EA4EPQ). All rights reserved;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:118 / 131
相关论文
共 50 条
  • [41] MAKA: Multi-Factor Authentication and Key Agreement Scheme for LoRa-Based Smart Grid Communication Services
    Mehta, Prarthana J.
    Parne, Balu L.
    Patel, Sankita J.
    IETE JOURNAL OF RESEARCH, 2024, 70 (05) : 4989 - 5005
  • [42] Study on Multi-Factor Optimization and Application for Water Mist of a Wetting Dust Suppressant
    Li, Ming
    Tang, Jiao
    Song, Xinzhu
    Qiu, Linling
    Yang, Huaizhen
    Li, Zhi
    ACS OMEGA, 2022, 7 (51): : 47861 - 47868
  • [43] Energy Coupling Control of Telecommunication Network and Power Grid
    Lehmann, Heiko
    Lange, Christoph
    Gladisch, Andreas
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON SMART GRIDS, GREEN COMMUNICATIONS AND IT ENERGY-AWARE TECHNOLOGIES (ENERGY 2011), 2011, : 87 - 92
  • [44] Multi-Factor Load Classification Method considering Clean Energy Power Generation
    Zang, Yuxiu
    Ge, Weichun
    Wang, Shunjiang
    Zhao, Yan
    Chu, Tianfeng
    INTERNATIONAL TRANSACTIONS ON ELECTRICAL ENERGY SYSTEMS, 2023, 2023
  • [45] Application of FACTS technology for power flow control in the Polish power grid
    Adapa, R
    Madajewski, K
    Jankowski, R
    Kula, M
    Maciejewski, Z
    2000 IEEE POWER ENGINEERING SOCIETY WINTER MEETING - VOLS 1-4, CONFERENCE PROCEEDINGS, 2000, : 1733 - 1738
  • [46] Proxy re-encryption based multi-factor access control scheme in cloud
    Su M.
    Shi G.
    Fu A.
    Yu Y.
    Jin W.
    Tongxin Xuebao/Journal on Communications, 2018, 39 (02): : 93 - 101
  • [47] Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs
    Wang, Ding
    Wang, Ping
    Wang, Chenyu
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2020, 4 (03)
  • [48] Multi-factor identity authentication protocol and indoor physical exercise identity recognition in wireless sensor network
    Zhang, Jie
    Mao, Huaqing
    ENVIRONMENTAL TECHNOLOGY & INNOVATION, 2021, 23
  • [49] DMZtore: A dispersed data storage system with decentralized multi-factor access control (demo)
    Esiner, Ertem
    Hanley, Shun Hanli
    Datta, Anwitaman
    PROCEEDINGS 2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS ICDCS 2016, 2016, : 757 - 758
  • [50] Proxy Re-Encryption Based Multi-Factor Access Control for Ciphertext in Cloud
    Su M.
    Wang L.
    Fu A.
    Yu Y.
    Journal of Shanghai Jiaotong University (Science), 2018, 23 (5) : 666 - 670