[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Strong Identity Authentication Scheme for Electric Power Internet of Things Based on SM9 Algorithm

  • Conference paper
  • First Online:
Complex, Intelligent and Software Intensive Systems (CISIS 2023)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 176))

Included in the following conference series:

  • 362 Accesses

Abstract

With the development of 5G communication technology, the construction of the electric power Internet of Things relying on new technologies such as cloud computing, big data, and artificial intelligence has promoted the data integration of various electric power systems to achieve resource sharing services. With the continuous access of mass terminals to the Internet of Things, the attendant security authentication issues are becoming increasingly prominent. The traditional password based or digital certificate based authentication methods can no longer meet the access control of mass power terminals to power servers. In order to solve this problem, this paper proposes a strong identity authentication scheme based on SM9 cryptographic algorithm for the power Internet of Things without digital certificates and passwords, providing an effective solution for using intelligent terminals to achieve identity authentication for power Internet of Things systems in the Internet environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 199.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 249.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, F., Wang, Q., Song, L.: Research on unified identity authentication system based on biometrics. Netinfo Secur. 19(9), 86–90 (2019)

    Google Scholar 

  2. Zhang, X., Liu, J.: Multi-factor authentication protocol based on hardware finger print and biometrics. Netinfo Secur. 20(8), 9–15 (2020)

    Google Scholar 

  3. Digi CertInc. Patent Application, Dynamic certificate generation on a certificate authority cloud, Published on line (USPTO20190356651). Medical Patent Business Week (2019)

    Google Scholar 

  4. Yin, R., Gao, Y., Li, K.: Application of identity authentication technology in mobile applications in power industry. China New Commun. 22(10), 116 (2020)

    Google Scholar 

  5. Huang, D., Zhang, Z., Liu, J.: Improvement and analysis of kerberos identity authentication protocol based on SM algorithms. J. Jinling Inst. Technol. 38(2), 1–8 (2022)

    Google Scholar 

  6. Liao, H., Yu, G., Ban, G.: Research on identity authentication technology in power internet of things based on SM9 algorithm. Shang Dong Electr. Power 47(275), 1–4 (2020)

    Google Scholar 

  7. Zhang, Y., Sun, G., Li, Y.: Research on mobile internet authentication scheme based on SM9 algorithm. NeTinfo Secur. 4(1), 1–8 (2021)

    Google Scholar 

  8. Wang, M.-D., He, W.-G., Li, J., Mei, R.: Optimal design of R-ate pair in SM9 algorithm. Commun. Technol. 9(53), 2241–2244 (2020)

    Google Scholar 

  9. Dong, Y.-X., Quan, J.-B., Wang, M.-R., Luo, M., Yang, Y.: Research on the application of SM9 algorithm in the security field of Internet of things. China Acad. J. Electron. Publishing House 9(35), 22–27 (2022)

    Google Scholar 

  10. Lai, J., Huang, X., He, D.: Security analysis of SM9 digital signature and key encapsulation. Sci. Sin. Inform. 51, 1900–1913 (2021). (in Chinese)

    Article  Google Scholar 

  11. Zhang, C., Peng, C.: Searchable encryption scheme based on china state cryptography standard SM9. Comput. Eng. 7(48), 159–166 (2022)

    Google Scholar 

  12. Tang, F., Gan, N.: Anti malicious KGC certificate less signature scheme based on block-chain and domestic cryptographic SM9. Chin. J. Netw. Inform. Secur. 8(6), 9–18 (2022)

    Google Scholar 

  13. An, T., Ma, W., Liu, X.: Aggregate signature scheme based on SM9 cryptographic algorithm in VANET. Comput. Appl. Softw. 37(12), 280–284 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ji Deng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Deng, J., Zhang, L., Jiao, L., Ren, Y., Lin, Q. (2023). A Strong Identity Authentication Scheme for Electric Power Internet of Things Based on SM9 Algorithm. In: Barolli, L. (eds) Complex, Intelligent and Software Intensive Systems. CISIS 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 176. Springer, Cham. https://doi.org/10.1007/978-3-031-35734-3_20

Download citation

Publish with us

Policies and ethics