Distributed authentication method for electric power internet of things

A technology of electric power Internet of things and authentication method, which is applied in the field of distributed authentication of electric power Internet of things, can solve problems such as node replication, single point failure, limited computing, storage and communication capabilities, and achieve the effect of improving security and effectiveness

Active Publication Date: 2019-12-31
JIANGSU HENGBAO INTELLIGENT SYST TECH CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, the terminal nodes of the electric power Internet of Things have a large number and a wide deployment range, and the physical environment of the nodes is uncontrollable, so they are vulnerable to threats such as physical hijacking, node duplication, signal interception, stealing and replay, and man-in-the-middle attacks; on the other hand, the terminals of the electric power Internet of Things are and power constraints, its computing, storage and communication capabilities are limited, and it is impossible to deploy a complete cryptographic algorithm
In addition, information transmission and interaction are mostly implemented by centralized broadcast and multicast, which is prone to single point failure problems
[0005] At present, most Internet of Things access authentication schemes are based on public blockchain platforms, which realize the simulation of distributed PKI, but fail to effectively integrate alliance chains and lightweight distributed authentication protocols for power Internet of Things services, which is difficult to meet the requirements of intelligent Demand for decentralization, ubiquitous access, and wide-area interconnection of power grid and energy Internet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed authentication method for electric power internet of things
  • Distributed authentication method for electric power internet of things
  • Distributed authentication method for electric power internet of things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Examples of the present disclosure will now be described more fully with reference to the accompanying drawings. The following description is merely exemplary in nature and is not intended to limit the disclosure, application or uses.

[0044] Example embodiments are provided so that this disclosure will be thorough, and will fully convey the scope to those who are skilled in the art. Numerous specific details are set forth such as examples of specific components, devices and methods, to provide a thorough understanding of embodiments of the present disclosure. To those skilled in the art, specific details need not be employed, example embodiments may be embodied in many different forms, and neither should be construed to limit the scope of the disclosure. In some example embodiments, well-known processes, well-known structures, and well-known technologies are not described in detail.

[0045] The technical problems raised by the present disclosure will be described i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a distributed authentication method for the electric power Internet of Things. The method specifically comprises a registration stage, a key negotiation stage and an authentication stage. In the registration stage, a public key and a private key are generated, and a sorting node publishes system parameters; in the key negotiation stage, a group key is calculated and returned to the corresponding sorting node, and key negotiation is completed; and the sorting node can form authentication permission after obtaining signatures of more than a threshold number, and sends the authentication permission to the power Internet of Things access gateway as an authentication basis. The invention also provides a system for executing the distributed authentication method for thepower Internet of Things, and the system is characterized in that the system specifically comprises the to-be-authenticated terminal, the sorting node, the authentication node and the gateway. The method is suitable for a distributed access authentication system of the power Internet of Things, and the safety and effectiveness of the power Internet of Things system can be improved. And the requirements of decentralization, ubiquitous access and wide-area interconnection of an intelligent power grid and an energy internet are met.

Description

technical field [0001] The invention relates to the field of authentication of the Internet of Things, in particular to a distributed authentication method of the Internet of Things for electric power. Background technique [0002] With the development of smart grid and energy Internet, the power Internet of Things has played an increasingly important role in all aspects of power production. Especially in the distribution network, which is the last 10 kilometers of power transmission, in application scenarios such as electricity metering, electricity sales service, distributed power generation, new energy grid connection, and smart charging piles, the application of the power Internet of Things is more common. [0003] Most of the existing power business systems adopt a centralized architecture. With the continuous development of distributed power sources, controllable loads, incremental distribution networks, and material services, the frequency and complexity of informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04L9/08
CPCH04L67/12H04L9/0861H04L63/062H04L63/08H04L63/061H04L9/0841
Inventor 钱京崔可
Owner JIANGSU HENGBAO INTELLIGENT SYST TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products