Security Authentication Scheme for Power Internet of Things

被引:0
|
作者
Dang, Fang Fang [1 ]
Li, Shuai [1 ]
Yan, Li Jing [1 ]
Li, Ding Ding [1 ]
机构
[1] State Grid Henan Informat & Telecommun Co, Data Ctr, Zhengzhou, Henan, Peoples R China
关键词
Power Internet of Things; identity authentication; data encryption;
D O I
10.1109/ICCSN55126.2022.9817598
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The development of new technologies such as "Big Data, Cloud computing, The Internet of things, Mobile Internet, artificial intelligence" has also driven the rapid development of the Power Internet of Things. They have broken the barriers of each link of the power system, but also highlighted the security issues of the power Internet of Things terminals and the many shortcomings of the terminal authentication mechanism. In order to solve these problems, this paper proposed a new security authentication scheme for the power Internet of Things. This scheme mainly used hash function and RSA algorithm, Using the terminal's global identity, timestamp, large random number and fuzzy identity to encrypt data transmission, it can effectively resist various attacks, and achieving the integrity and reliability of information transmission.
引用
收藏
页码:94 / 97
页数:4
相关论文
共 50 条
  • [1] Multidomain security authentication for the Internet of things
    Zhang, Qikun
    Zhao, Kunyuan
    Kuang, Xiaohui
    Li, Yongjiao
    Zheng, Yuanpan
    Yuan, Junling
    Wang, Ruifang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (16):
  • [2] Lightweight Authentication Scheme for Internet of Things
    Haenel, Arie
    Haddad, Yoram
    Zhang, Zonghua
    [J]. 2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [3] A secure authentication scheme for Internet of Things
    Wang, King-Hang
    Chen, Chien-Ming
    Fang, Weicheng
    Wu, Tsu-Yang
    [J]. PERVASIVE AND MOBILE COMPUTING, 2017, 42 : 15 - 26
  • [4] An Authentication Scheme with Attribute-Based Encryption for Power Internet of Things
    Duan, Xiangjun
    Li, Yunshuo
    Xu, Yuanyuan
    Liu, Wei
    Zhang, Zhengkai
    Liu, Lei
    Li, Ying
    Xu, Mengyu
    [J]. PROCEEDINGS OF THE 2024 3RD INTERNATIONAL CONFERENCE ON NETWORKS, COMMUNICATIONS AND INFORMATION TECHNOLOGY, CNCIT 2024, 2024, : 161 - 165
  • [5] Review on Security of Internet of Things Authentication Mechanism
    Nandy, Tarak
    Bin Idris, Mohd Yamani Idna
    Noor, Rafidah Md
    Kiah, Miss Laiha Mat
    Lun, Lau Sian
    Juma'at, Nor Badrul Annuar
    Ahmedy, Ismail
    Ghani, Norjihan Abdul
    Bhattacharyya, Sananda
    [J]. IEEE ACCESS, 2019, 7 : 151054 - 151089
  • [6] Exploring Security and Authentication Issues in Internet of Things
    Prathibha, L.
    Fatima, Kaleem
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 673 - 678
  • [7] An Efficient Mutual Authentication Scheme for Internet of Things
    Mbarek, Bacem
    Ge, Mouzhi
    Pitner, Tomas
    [J]. INTERNET OF THINGS, 2020, 9
  • [8] A lightweight hierarchical authentication scheme for internet of things
    Aida Akbarzadeh
    Majid Bayat
    Behnam Zahednejad
    Ali Payandeh
    Mohammad Reza Aref
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 2607 - 2619
  • [9] A lightweight hierarchical authentication scheme for internet of things
    Akbarzadeh, Aida
    Bayat, Majid
    Zahednejad, Behnam
    Payandeh, Ali
    Aref, Mohammad Reza
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (07) : 2607 - 2619
  • [10] Improvement of a User Authentication Scheme for Wireless Sensor Networks Based on Internet of Things Security
    Jabbari, A.
    Mohasefi, J. B.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 2565 - 2591