Power terminal cloud edge-end cooperative security access authentication method based on edge computing

A power terminal and secure access technology, applied in the field of information security, can solve the problems of high communication bandwidth requirements, high computing consumption, and large computing requirements of deep learning methods

Active Publication Date: 2021-09-14
ZHEJIANG UNIV +1
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the above-mentioned technologies still have deficiencies in feasibility, safety, simplicity, etc.
For example, in the face of the new situation of heterogeneous access authentication requirements for massive terminals in the edge computing environment, the method based on hardware features needs to complete a lot of complicated preliminary work, and is easily restricted by environmental conditions; simple asymmetric encryption means authentication in security The blockchain technology is still in the development stage, and the application cannot be deployed immediately; the trusted computing cannot meet the requirements in terms of simplicity; the calculation requirements of the deep learning method are too large, and the current identification accuracy is insufficient; the secret sharing scheme is High requirements on communication bandwidth, and the calculation consumption is not small

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power terminal cloud edge-end cooperative security access authentication method based on edge computing
  • Power terminal cloud edge-end cooperative security access authentication method based on edge computing
  • Power terminal cloud edge-end cooperative security access authentication method based on edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The present invention will be further described below in conjunction with the accompanying drawings.

[0058] The traditional power distribution Internet of Things power terminal access is based on the "cloud-end" architecture, and with the access of massive terminals, the computing pressure on the cloud platform increases sharply, so edge devices are introduced to share the pressure on the cloud platform. The introduction of edge devices has changed the original communication architecture and evolved into a new "cloud-edge-end" architecture, while the traditional authentication mechanism is based on the "cloud-end" architecture design, so it is not suitable for the introduction of edge computing scenarios. The present invention aims at This situation proposes a new authentication mechanism, which fully considers the challenges and opportunities brought by edge devices, in order to overcome the difficulties brought by edge computing and give full play to its advantages. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to access authentication of power terminal equipment, and aims to provide a power terminal cloud edge-end cooperative security access authentication method based on edge computing. The method comprises one-time authentication when the power terminal is accessed and continuous authentication after the power terminal is accessed, wherein the one-time authentication is jointly participated by the power terminal, the edge device and the cloud platform, and the continuous authentication is only participated by the power terminal and the edge device. According to the invention, a continuous authentication link is introduced to enhance security, and a lightweight identity authentication mechanism is realized by a password and non-password means. According to the method, mechanism design is carried out by using the white list, the digital signature and the challenge response, so that feasibility is guaranteed; in terms of security, one-time complex authentication is considered to fully ensure access security during access, and continuous simple authentication after access is used as a supplement to improve the security; and the advantages of edge calculation are fully played in conciseness, and a simple authentication mechanism is selected to reduce calculation pressure.

Description

technical field [0001] The invention relates to access authentication of power terminal equipment, belongs to the field of information security, and aims to provide a method for secure access authentication of power terminal cloud-edge-terminal collaboration based on edge computing. Background technique [0002] With the continuous development of the power distribution Internet of Things, a large number of power distribution terminals are connected, and it is imperative to deploy edge computing devices. By deploying edge nodes on the data source side, edge computing can process data in a timely manner, effectively relieving the computing pressure brought by centralized data processing, and speeding up data processing efficiency while reducing network transmission bandwidth consumption. With the addition of edge nodes, the traditional "cloud-end" access authentication architecture has gradually evolved into a "cloud-edge-end" collaborative architecture. This new architecture ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/06H04L29/06H04L29/08G06Q50/06
CPCH04L9/3236H04L9/3247H04L9/3297H04L9/3271H04L9/0656H04L63/08H04L63/101H04L67/10H04L67/12G06Q50/06
Inventor 杨晋祥彭勇刚胡丹尔韦巍蔡田田习伟邓清唐李肖博陈波
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products