咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >A CPK-Based Identity Authentic... 收藏

A CPK-Based Identity Authentication Scheme for IoT

作     者:Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao 

作者机构:State Grid Jiangsu Electric Power Co.Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network SecurityInstitute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.LtdSGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu ProvinceResearch and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer ScienceCleveland State UniversityCleveland44115USA 

出 版 物:《Computer Systems Science & Engineering》 (计算机系统科学与工程(英文))

年 卷 期:2022年第40卷第3期

页      面:1217-1231页

核心收录:

学科分类:12[管理学] 1201[管理学-管理科学与工程(可授管理学、工学学位)] 08[工学] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:the Science and Technology Project of State Grid Jiangsu Electric Power Co. Ltd.under Grant No.J2020068 

主  题:Power Internet of Things terminal equipment identity authentication CPK PUF 

摘      要:As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing public key infrastructure(PKI)-based security authentication scheme is currently difficult to apply in many terminals in *** key distribution and management costs are high,which hinders the development of power IoT security *** Public Key(CPK)technology uses a small number of seeds to generate unlimited public *** is very suitable for identity authentication in the power Internet of *** this paper,we propose a novel identity authentication scheme for power *** scheme combines the physical unclonable function(PUF)with improved CPK technology to achieve mutual identity authentication between power IoT terminals and *** proposed scheme does not require third-party authentication and improves the security of identity authentication for power ***,the scheme reduces the resource consumption of power IoT *** improved CPK algorithm solves the key collision problem,and the third party only needs to save the private key and the public key *** results show that the amount of storage resources occupied in our scheme is *** proposed scheme is more suitable for the power IoT.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分