Identity authentication method for power system security and stability control terminal based on block chain

A technology for safe and stable control and terminal identity, applied in the field of smart grid information security, can solve the problems of heavy burden on research and certification centers, high frequency of occurrence, etc., reduce time consumption and computing power requirements, defend against man-in-the-middle attacks, and improve robustness Effect

Inactive Publication Date: 2021-08-10
NARI TECH CO LTD +3
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) Existing terminal identity authentication methods require a centralized management center to maintain the characteristic data of all terminals. When a large number of terminals participate in authentication and the authentication granularity is refined, the burden on the authentication center is heavy, and the demand for computing resources is increasing. Many, the terminal computing power is insufficient, and the frequency of single point failure is high. With the access of more and more distributed power plants, the demand for computing resources is increasing
[0008] (2) Most of the existing block chain-based identity authentication methods are improved digital certificate identity authentication mechanisms, which only replace traditional CAs with block chains in the original scheme, and still have certificate management, key management, and public key distribution. Problems such as delay, signature and signature verification delay cannot be solved, and cannot fully match the characteristics of the power security and stability control system
[0009] (3) The blockchain technology is still in the early stages of development. Most of the existing blockchain applications in the power system are only for power transactions and energy. There is no research on customized blockchain technology for stability control terminals, especially Combining specific applications can better solve the confidentiality, security, performance and other issues in terminal communication, meet the rapid development needs of the communication network of the safe and stable control system, and ensure the safe and stable operation of the power grid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method for power system security and stability control terminal based on block chain
  • Identity authentication method for power system security and stability control terminal based on block chain
  • Identity authentication method for power system security and stability control terminal based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0069] Existing terminal identity authentication methods all require a centralized management center to maintain the feature data of all terminals. When a large number of terminals participate in authentication and the authentication granularity is refined, the authentication center has a heavy burden and the demand for computing resources is increasing. Insufficient computing power. Most of the existing blockchain-based identity authentication methods are improved digital certificate authentication mechanisms, which only replace the traditional CA with blockchain in the original scheme, and there are still certificate mana...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of smart grid information security, and discloses a block chain-based power system security and stability control terminal identity authentication method, in which nodes on the chain of the authentication block chain vote for a new device A applying for network access based on user identity information ;New device A sends a communication authentication request to device B according to the identity of device B, and sends the last item of its own authentication key sequence to device B at the same time; after the authentication is passed, device B sends an authentication pass confirmation message to new device A, allowing Keep up the correspondence. The present invention realizes identity authentication between safe and stable control terminals in the power system, conforms to the inherent distributed characteristics of the safe and stable control system, and avoids problems such as the fragility of the authentication center caused by centralized management; reduces time consumption and computing power requirements, and is more efficient Conform to the operating characteristics of the safe and stable control terminal. The invention can defend against man-in-the-middle attacks, and ensures that the safe and stable control terminal is not illegally accessed.

Description

technical field [0001] The invention belongs to the technical field of smart grid information security, and in particular relates to a block chain-based identity authentication method for a security and stability control terminal of a power system. Background technique [0002] Currently, the closest prior art: [0003] As the second line of defense of the power system, the power grid security and stability control system undertakes the important responsibility of ensuring the safe and reliable operation of the power grid. The traditional vertical tree topology security and stability control system architecture is based on single-point to multi-point centralized control, and there is a lack of a complete identity authentication mechanism between security and stability control terminals. In scenarios such as extensive interconnection of terminals and distributed access to new energy sources, attackers can use attack devices or zombie hosts connected to the intranet to intera...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32G06Q50/06
CPCH04L63/08H04L67/10H04L67/12H04L9/3236H04L9/3239G06Q50/06H04L9/50
Inventor 陈汹朱钰宋长坡于同伟朱开阳刘爱民李籽良徐海波钱海曲晓蕾许士光唐冠军封科黄玲王旺
Owner NARI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products