Abstract
With the development of 5G communication technology, the construction of the electric power Internet of Things relying on new technologies such as cloud computing, big data, and artificial intelligence has promoted the data integration of various electric power systems to achieve resource sharing services. With the continuous access of mass terminals to the Internet of Things, the attendant security authentication issues are becoming increasingly prominent. The traditional password based or digital certificate based authentication methods can no longer meet the access control of mass power terminals to power servers. In order to solve this problem, this paper proposes a strong identity authentication scheme based on SM9 cryptographic algorithm for the power Internet of Things without digital certificates and passwords, providing an effective solution for using intelligent terminals to achieve identity authentication for power Internet of Things systems in the Internet environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhang, F., Wang, Q., Song, L.: Research on unified identity authentication system based on biometrics. Netinfo Secur. 19(9), 86–90 (2019)
Zhang, X., Liu, J.: Multi-factor authentication protocol based on hardware finger print and biometrics. Netinfo Secur. 20(8), 9–15 (2020)
Digi CertInc. Patent Application, Dynamic certificate generation on a certificate authority cloud, Published on line (USPTO20190356651). Medical Patent Business Week (2019)
Yin, R., Gao, Y., Li, K.: Application of identity authentication technology in mobile applications in power industry. China New Commun. 22(10), 116 (2020)
Huang, D., Zhang, Z., Liu, J.: Improvement and analysis of kerberos identity authentication protocol based on SM algorithms. J. Jinling Inst. Technol. 38(2), 1–8 (2022)
Liao, H., Yu, G., Ban, G.: Research on identity authentication technology in power internet of things based on SM9 algorithm. Shang Dong Electr. Power 47(275), 1–4 (2020)
Zhang, Y., Sun, G., Li, Y.: Research on mobile internet authentication scheme based on SM9 algorithm. NeTinfo Secur. 4(1), 1–8 (2021)
Wang, M.-D., He, W.-G., Li, J., Mei, R.: Optimal design of R-ate pair in SM9 algorithm. Commun. Technol. 9(53), 2241–2244 (2020)
Dong, Y.-X., Quan, J.-B., Wang, M.-R., Luo, M., Yang, Y.: Research on the application of SM9 algorithm in the security field of Internet of things. China Acad. J. Electron. Publishing House 9(35), 22–27 (2022)
Lai, J., Huang, X., He, D.: Security analysis of SM9 digital signature and key encapsulation. Sci. Sin. Inform. 51, 1900–1913 (2021). (in Chinese)
Zhang, C., Peng, C.: Searchable encryption scheme based on china state cryptography standard SM9. Comput. Eng. 7(48), 159–166 (2022)
Tang, F., Gan, N.: Anti malicious KGC certificate less signature scheme based on block-chain and domestic cryptographic SM9. Chin. J. Netw. Inform. Secur. 8(6), 9–18 (2022)
An, T., Ma, W., Liu, X.: Aggregate signature scheme based on SM9 cryptographic algorithm in VANET. Comput. Appl. Softw. 37(12), 280–284 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Deng, J., Zhang, L., Jiao, L., Ren, Y., Lin, Q. (2023). A Strong Identity Authentication Scheme for Electric Power Internet of Things Based on SM9 Algorithm. In: Barolli, L. (eds) Complex, Intelligent and Software Intensive Systems. CISIS 2023. Lecture Notes on Data Engineering and Communications Technologies, vol 176. Springer, Cham. https://doi.org/10.1007/978-3-031-35734-3_20
Download citation
DOI: https://doi.org/10.1007/978-3-031-35734-3_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-35733-6
Online ISBN: 978-3-031-35734-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)