期刊文献+

一种基于身份的智能电网认证模式 被引量:3

An identity-based authentication mode for smart grid
在线阅读 下载PDF
导出
摘要 提出了一个移动用户智能电网(Mobile User Smart Grid,MUSG)概念,给出了MUSG场景下的用电模式描述,并利用基于身份的密码技术给出了一种基于身份的MUSG认证方案。分析表明,利用该认证方案不仅可以有效解决智能电网中移动用户的认证问题,满足移动用户即时用电和户外用电的需求,并且在保障系统安全性的同时有效降低了系统的计算和通信开销,减轻了系统的负载压力,提高了系统的使用效率。这为智能电网业务由固定用户向移动用户过渡奠定了基础。 A new concept of mobile user smart grid(MUSG) is introduced and the mode of consuming electricity in this MUSG application scene is described.Then an identity-based authentication scheme for MUSG is proposed by using the identity-based cryptographic techniques.Analysis shows that using this scheme can effectively solve the problem of mobile user authentication to meet the demands of the real-time and outdoor electricity consumption.It also ensures the system security while reducing the system cost in computation and communication.It contributes to help the smart grid services conversing from fixed users to mobile users since it really reduces the system loads and improves the system efficiency.
作者 郭非 曹珍富
出处 《黑龙江大学自然科学学报》 CAS 北大核心 2012年第2期152-159,共8页 Journal of Natural Science of Heilongjiang University
基金 国家自然科学基金A3前瞻计划资助项目(61161140320) 国家自然科学基金重点资助项目(61033014) 国家自然科学基金资助项目(60970110)
关键词 智能电网 移动用户 身份认证 安全高效 smart grid mobile users identity authentication secure and efficient
  • 相关文献

参考文献13

  • 1GELLINGS C W.The smart grid:enabling eenergy efficiency and demand response[M].Lilburn:Fairmont Press,2009.
  • 2FADLULLAH Z M,FOUDA M M,KATO N,et al.Toward intelligent machine-to-machine communications in smart grid[J].Communi-cat-ions Magazine,IEEE,2011,49(4):60-65.
  • 3MCLAUGHLIN S,PODKUIKO D,MCDANIEL P.Energy theft in the advanced metering infrastructure[C].4th International Workshop on Criti-cal Information Infrastructure Security.Berlin/Heidelberg:Springer-Verlag,2010:176-187.
  • 4KHURANA H,HADLEY M,LU N,et al.Smart-grid security issues[J].IEEE Security and Privacy,2010,8(1):81-85.
  • 5CLEMENTS S,KIRKHAM H.Cyber security considerations for the smart grid[C].Power and Energy Society General Meeting.IEEE,2010:1-5.
  • 6HAMLYN A,CHEUNG H,MANDER T,et al.Network security management and authentication of actions for smart grids operations[C].Elec-trical Power Conference.IEEE,2007:31-36.
  • 7FOUDA M M,FADLULLAH Z M,KATO N,et al.A light-weight message authentication scheme for smart grid communications[J].IEEETransactions on Smart Grid,2011,2(4):675-685.
  • 8MAO W B.An identity-based non-interactive authentication framework for computational grids[R].Hewlett-Packard Laboratories,TechnicalReport HPL-2004-96.
  • 9SO H K-H,KWOK S H M,LAM E Y,et al.Zero-configuration identity-based signcryption scheme for smart grid[C].2010 First IEEE In-ternational Conference on Smart Grid Communications.IEEE,2010:321-326.
  • 10CHA J C,CHEON J H.An identity-based signature from gap diffie-Hellman groups[C].6th International Workshop on Theory and Practicein Public Key Cryptography,London:Springer-Verlag,2003:18-30.

同被引文献29

  • 1Vaquero L M,Rodero-Merino L,Caceres J,et al.A Break in the Clouds:Towards a Cloud Definition[J].ACM SIGCOMM Computer Communication Review,2008,39(1):50-55.
  • 2Costanzo A,Assuncao M D,Buyya R.Harnessing Cloud Technologies for a Virtualized Distributed Computing Infrastructure[J].Internet Computing,2009,13(5):24-33.
  • 3Kim Y J,Thottan M,Kolesnikov V,et al.A Secure Decentralized Data-centric Information Infrastructure for Smart Grid[J].Communications Magazine,2010,48(11):58-65.
  • 4Rajagopalan S R,Sankar L,Mohajer S,et al.Smart Meter Privacy:A Utility-privacy Framework[C]//Proceedings of IEEE International Conference on Smart Grid Communications.[S.l.]:IEEE Press,2011:190-195.
  • 5Sankar L,Kar S,Tandon R,et al.Competitive Privacy in the Smart Grid:An Information-theoretic Approach[C]//Proceedings of IEEE International Conference on Smart Grid Communications.[S.l.]:IEEE Press,2011:220-225.
  • 6Li Qinghua,Cao Guohong.Multicast Authentication in the Smart Grid with One-time Signature[J].IEEE Transactions on Smart Grid,2011,2(4):686-696.
  • 7Fouda M M,Fadlullah Z M,Kato N,et al.A Lightweight Message Authentication Scheme for Smart Grid Communications[J].IEEE Transactions on Smart Grid,2011,2(4):675-685.
  • 8Li Depeng,Aung Z,Williams J R,et al.Efficient Authentication Scheme for Data Aggregation in Smart Grid with Fault Tolerance and Fault Diagnosis[C]//Proceedings of ISGT’12.[S.l.]:IEEE Press,2012:1-8.
  • 9Bobba R,Khurana H,Al Turki M,et al.PBES:A Policy Based Encryption System with Application to Data Sharing in the Power Grid[C]//Proceedings of the4th International Symposium on Information,Computer,and Communications Security.[S.l.]:ACM Press,2009:262-275.
  • 10Ruj S,Nayak A,Stojmenovic I.A Security Architecture for Data Aggregation and Access Control in Smart Grids[EB/OL].(2011-11-10).http://arxiv.org/abs/1111.2619.

引证文献3

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部