Supercharge Your Innovation With Domain-Expert AI Agents!

Lightweight access authentication method and system for power Internet of Things equipment based on IBC system

A power Internet of Things and access authentication technology, applied in the field of information security, can solve problems such as certificate issuance, revocation, verification and storage of multiple resources, private key custody, and complex PKI certificate management

Pending Publication Date: 2021-11-26
CHINA ELECTRIC POWER RES INST +2
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the management of PKI certificates is relatively complicated, and a multi-level CA system needs to be built, and certificate issuance, revocation, verification, and storage require a lot of resources.
The device access authentication technology based on the IBC identity authentication system can effectively avoid complex certificate management problems. However, the traditional IBC cryptographic system has problems such as private key custody and relatively complex cryptographic operations.
The above technologies are not suitable for access authentication of massive power IoT devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight access authentication method and system for power Internet of Things equipment based on IBC system
  • Lightweight access authentication method and system for power Internet of Things equipment based on IBC system
  • Lightweight access authentication method and system for power Internet of Things equipment based on IBC system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Exemplary embodiments of the present invention will now be described with reference to the drawings; however, the present invention may be embodied in many different forms and are not limited to the embodiments described herein, which are provided for the purpose of exhaustively and completely disclosing the present invention. invention and fully convey the scope of the invention to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings do not limit the present invention. In the figures, the same units / elements are given the same reference numerals.

[0056] Unless otherwise specified, the terms (including scientific and technical terms) used herein have the commonly understood meanings to those skilled in the art. In addition, it can be understood that terms defined by commonly used dictionaries should be understood to have consistent meanings in the context of their related fields, and should not be understood as idealized or over...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a lightweight access authentication method and system for power Internet of Things equipment based on an IBC system, and belongs to the technical field of information security. The method provided by the invention comprises the following steps: application of a target equipment public and private key to a ciphertext: after the target equipment generates a key application parameter, a key generation center KGC generates a target equipment identity public and private key pair according to a unique identifier ID of the target equipment, and after a symmetric key is used for encryption, the public and private key pair ciphertext is transmitted to the target equipment; the encryption key negotiation between the target device and other devices comprises the following steps: when the target device performs information interaction with other devices, based on identity public and private key pairs of the target device and other devices, introducing a random number to negotiate a master key, and generating a data encryption key after calculation by adopting a key derivation algorithm, that is, access authentication is passed through the data encryption key. According to the method provided by the invention, efficient and safe access authentication of the power Internet of Things equipment can be realized, and the safety and intelligent management level of the Internet of Things equipment are enhanced.

Description

technical field [0001] The present invention relates to the technical field of information security, and more specifically, to an IBC system-based lightweight access authentication method and system for power Internet of Things devices. Background technique [0002] With the development of new technologies such as mobile Internet and artificial intelligence, the two-way interaction between power users and smart grids is becoming more and more frequent, and users have higher and higher requirements for the service form and service quality of the grid. In order to meet the application needs of power users and enhance power users' awareness and participation in smart grids, the Internet of Things for Power comes into being. The network environment of the power Internet of Things is open and complex, with flexible and changeable access control, a wide variety of connected devices, a huge number, and uneven security performance. These devices will generate a large amount of data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44H04L9/08H04L9/32
CPCG06F21/44H04L9/0863H04L9/0838H04L9/0869H04L9/3226H04L9/3247
Inventor 付义伦许海清孙炜赵兵岑炜翟峰梁晓兵曹永峰刘鹰李保丰王晖南刘佳易许进武文萍徐萌许斌孔令达冯云冯占成
Owner CHINA ELECTRIC POWER RES INST
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More