A method for lightweight identity authentication of power Internet of Things sensing terminals

A technology of power Internet of Things and IoT terminals, applied in the field of identity authentication, can solve problems such as the inapplicability of PKI, or public key infrastructure authentication system, so as to make up for its own low efficiency, facilitate large-scale popularization, and reduce the interaction between communication parties. link effect

Active Publication Date: 2022-02-15
NANJING NARI GROUP CORP +3
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The technical problem to be solved by the present invention is to overcome the defect that the traditional PKI or public key infrastructure authentication system is not applicable due to counterfeit access of the power Internet of Things sensing terminal in the prior art, and to combine the sensing terminal access in the power Internet of Things business scenario According to the actual application situation, a method suitable for secure access of power-aware terminals is designed, and a method for lightweight identity authentication of power-IoT-aware terminals is provided.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for lightweight identity authentication of power Internet of Things sensing terminals
  • A method for lightweight identity authentication of power Internet of Things sensing terminals
  • A method for lightweight identity authentication of power Internet of Things sensing terminals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0067] There are two application scenarios of the IBC logo authentication system, one is encryption-decryption, and the other is signature-verification. The following two application scenarios are analyzed and explained.

[0068] (1) Encryption-decryption

[0069] In the encryption-decryption application scenario, user B uses the system parameters of the key generation center KGC and the public key of user A to encrypt the data, and user A enters the private key matching the public key obtained from the key generation center KGC and system parameters, the ciphertext data sent by user B can be decrypted, that is, the ciphertext data can be decrypted, so as to ensure the security of data transmission. The specific process is as follows: figure 1 shown. Different from the traditional PKI authent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for light-weight identity authentication of electric power Internet of Things sensing terminals. In step 1, the IoT terminal sends ciphertext data and signature values ​​to the edge IoT agent, and enters into step 2; in step 2, the edge IoT The agent decrypts the ciphertext data and verifies the signature value, and enters step 3; step 3, judges whether the edge IoT agent decrypts the ciphertext data is correct, and judges whether the edge IoT agent verifies the signature value is correct: if the edge IoT agent decrypts the ciphertext data correctly and the edge object If the conditions for the correct signature value of the joint agent verification signature are met at the same time, then enter step 4; if the edge IoT agent decrypts the ciphertext data is incorrect or the edge IoT agent verifies the signature value is incorrect, the edge IoT agent sends an alarm to the terminal and enters step 5, define Number of alarms N, N is an integer, N=N+L, L is a constant not equal to 0.

Description

technical field [0001] The invention relates to a method for lightweight identity authentication of electric power Internet of Things sensing terminals, and belongs to the technical field of identity authentication. Background technique [0002] The Ubiquitous Power Internet of Things refers to the information connection and interaction between any time, any place, anyone, and anything. It connects power users and their equipment, power grid companies and their equipment, power generation companies and their equipment, suppliers and their Devices as well as people and things are connected to generate shared data to serve users, grids, power generation, suppliers and government society. [0003] With the construction and development of the ubiquitous power Internet of Things, edge computing is gradually applied to various businesses, and the horizontal interaction requirements of businesses are highlighted. The scope of security boundaries continues to expand and is difficult...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32H04L67/56H04L67/12
CPCH04L63/0869H04L63/12H04L9/3247H04L67/12H04L67/56
Inventor 韦小刚练永兵孙歆韩嘉佳李沁园
Owner NANJING NARI GROUP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products