基于Hyperledger的电力物联网分布式认证研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Research on distributed authentication of power IoT based on Hyperledger blockchain
  • 作者:陈孝莲 ; 徐晓海 ; 过烽 ; 李洋 ; 蔡世龙 ; 高雪
  • 英文作者:Chen Xiaolian;Xu Xiaohai;Guo Feng;Li Yang;Cai Shilong;Gao Xue;Wuxi Power Supply Company;Zhenjiang Power Supply Company;NARI Group Corporation(State Grid Electric Power Research Institute);NARI Group Corporation( State Grid Electric Power Research Institute);
  • 关键词:物联网 ; 区块链 ; 链码 ; 接入认证 ; 超级账本
  • 英文关键词:IoT;;block chain;;chaincode;;authentication;;Hyperledger
  • 中文刊名:DZJY
  • 英文刊名:Application of Electronic Technique
  • 机构:国网无锡供电公司;国网镇江供电公司;南瑞集团有限公司(国网电力科学研究院);
  • 出版日期:2019-05-06
  • 出版单位:电子技术应用
  • 年:2019
  • 期:v.45;No.491
  • 基金:国网江苏省电力有限公司科技项目(J2018-91719-XTKJ)
  • 语种:中文;
  • 页:DZJY201905015
  • 页数:5
  • CN:05
  • ISSN:11-2305/TN
  • 分类号:63-66+71
摘要
随着能源互联网的发展和"云、大、物、移"战略的实施,传统的电力物联网终端集中式接入认证方式难以应对泛在普适的应用需求。基于联盟区块链的超级账本技术,研究了电力物联网终端分布式接入认证技术,将安全多方计算中密钥共享和分配协议与超级账本共识算法相结合,提出了一种有效的电力物联网终端接入认证方案。仿真结果表明,所提方案在认证时间和资源消耗等方面具有优势。
        With the development of energy Internet and the implementation of "cloud, big, material and mobile" strategy, the traditional centralized access authentication mode of power Internet of Things terminal is difficult to meet the ubiquitous application needs. Based on the super-ledger technology of alliance blockchain, this paper studies the distributed access authentication technol-ogy of power Internet of Things terminal, combines the key sharing and distribution protocol in secure multi-party computing with the super-ledger consensus algorithm, and proposes an effective access authentication scheme for power Internet of Things terminal.The simulation results show that the proposed scheme has advantages in authentication time and resource consumption.
引文
[1]CHANG Q,ZHANG Y G,QIN L L.A node authentication protocol based on ECC in WSN[C].International Conference on Computer Design And Appliations(ICCDA 2010),NJUnited States:IEEE Computer Society,2010,2:606-609.
    [2]邹长忠.线传感器网络中基于节点ID验证的防御DOS攻击策略[J].小型微型计算机系统,2012,33(3):486-491.
    [3]HAIMABATI D,RAJA D.Monitoring threshold cryptography based wireless sensor networks with projective plane[C].5th International Conference on Computers and Devices for Communication(CO-DEC),Kanyakumari,India,Washington DC United States:IEEE Computer Society,2012:1-4.
    [4]SUN Y,YU Y,LI X,et al.Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations[C].Proceedings of the 21st Australasian Conference on Information Security and Privacy:Part I,LNCS 9722.Cham:Springer,2016:293-309.
    [5]张昕伟,张华,郭肖旺,等.基于区块链的电子投票选举系统研究分析[J].电子技术应用,2017,43(11):132-135.
    [6]GARG S,GENTRY C,HALEVI S.Candidate multilinear maps from ideal lattices[C].EUROCRYPT 2013:Proceedings of the2013 Annual International Conference on the Theory and Applications of Cryptographic Techniques,LNCS 7881.Berlin:Springer,2012:1-17.
    [7]佘维,胡跃,杨晓宇,等.基于能源区块链网络的虚拟电厂运行与调度模型[J].中国电机工程学报,2017,37(13):3729-3736.
    [8]徐琳,温蜜,李晋国.智能配电网中具有隐私保护的数据安全认证方案[J].电子技术应用,2015,41(12):98-101.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700