Design of Dynamic Password Authentication Scheme Based on SM Algorithm

被引:0
|
作者
Xiaoqi Liang [1 ]
Yong Wang [1 ]
Xichao Yue [1 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai, Peoples R China
基金
上海市自然科学基金;
关键词
distribution network; SM algorithm; dynamic password; identity authentication; KEY; INTERNET;
D O I
10.1109/ICPES56491.2022.10073381
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
At present, some identity authentication schemes of intelligent terminals in distribution networks need to install additional hardware or issue digital certificates, and are vulnerable to replay attacks, impersonation attacks and other malicious attacks. To solve the above problems, this paper proposes a dynamic password authentication scheme based on SM2, SM3, SM4 algorithm combined with terminal ID, hardware address MAC, and shared password value PW. This scheme can realize the two-way identity authentication between the power distribution master station and the intelligent power distribution terminal. Experiment simulation and security analysis show that this scheme can resist the common malicious attacks such as replay attack, man in the middle attack and impersonation attack. Compared with other schemes, this scheme has more security features and improves the security of identity authentication while reducing the hardware cost of authentication schemes and avoiding the difficulty of digital certificate management and maintenance.
引用
收藏
页码:57 / 61
页数:5
相关论文
共 50 条
  • [1] Under the Cloud-Based ECC Dynamic Password Authentication Scheme Design
    Gan, Hong
    Pan, Dan
    [J]. COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 399 - 405
  • [2] An Identity Authentication Scheme based on Dynamic Password Technology
    Jia Shizhun
    Lin Jun
    Feng Xiaorong
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 166 - 171
  • [3] DYNAMIC PASSWORD TOKEN BASED ON SM3 ALGORITHM
    Kong, Deke
    Wang, Xuzhi
    Zhong, Linxia
    Sha, Yangyang
    Li, Zhongbin
    [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON AUDIO, LANGUAGE AND IMAGE PROCESSING (ICALIP), 2016, : 180 - 184
  • [4] Design of Identity Authentication Scheme for Dynamic Service Command System Based on SM2 Algorithm and Blockchain Technology
    Deng, Jie
    Jiao, Lili
    Zhang, Lili
    Ren, Yongjin
    Yin, Wengang
    [J]. ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES (EIDWT-2022), 2022, 118 : 31 - 37
  • [5] Design on an Improved Kerberos Scheme Based on Dynamic Password
    Lei, Wen
    Liang, Xing-jian
    Zhang, Hong
    [J]. 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 503 - 505
  • [6] Password Authentication Based on Fractal Coding Scheme
    Al-Saidi, Nadia M. G.
    Said, Mohamad Rushdan Md
    Othman, Wan Ainun M.
    [J]. JOURNAL OF APPLIED MATHEMATICS, 2012,
  • [7] User Define Time Based Change Pattern Dynamic Password Authentication Scheme
    Yusuf, Salisu Ibrahim
    Boukar, Moussa Mahamat
    Muhammad, Aminu Mukhtar
    Yusuf, Ahmed Dalhatu
    [J]. 2018 14TH INTERNATIONAL CONFERENCE ON ELECTRONICS COMPUTER AND COMPUTATION (ICECCO), 2018,
  • [8] A PASSWORD AUTHENTICATION SCHEME BASED ON DISCRETE LOGARITHMS
    WU, TC
    CHANG, CC
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1991, 41 (1-2) : 31 - 38
  • [9] Timestamp-based Password Authentication Scheme
    Ismail, E. S.
    Syed-Musa, S. M. S.
    [J]. PROCEEDING OF THE 25TH NATIONAL SYMPOSIUM ON MATHEMATICAL SCIENCES (SKSM25): MATHEMATICAL SCIENCES AS THE CORE OF INTELLECTUAL EXCELLENCE, 2018, 1974
  • [10] Design of a Time and Location Based One-Time Password Authentication Scheme
    Hsieh, Wen-Bin
    Leu, Jenq-Shiou
    [J]. 2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 201 - 206