首页 | 官方网站   微博 | 高级检索  
     

泛在电力物联网可信安全接入方案
引用本文:吴金宇,张丽娟,孙宏棣,赖宇阳.泛在电力物联网可信安全接入方案[J].计算机与现代化,2020,0(4):52-59.
作者姓名:吴金宇  张丽娟  孙宏棣  赖宇阳
作者单位:中国南方电网有限责任公司电力调度控制中心,广东广州510000;鼎信信息科技有限责任公司创新孵化事业部,广东广州510623
摘    要:为全面提高全业务泛在电力物联网安全综合防御能力,解决目前全业务泛在电力物联网安全防护指导和终端认证机制的缺失和不足,本文提出一种泛在电力物联网可信安全接入方案。首先给电力物联网终端层设备确定一个唯一标识的指纹信息;然后结合该指纹信息,采用身份标识密码技术实现终端层设备的接入认证,阻断非法终端的接入;最后设计合法终端的身份信息安全传递机制,根据身份信息对合法终端的异常行为进行溯源。

关 键 词:泛在电力物联网  可信安全接入  终端身份认证  
收稿时间:2020-04-24

Trusted Secure Access Scheme of Ubiquitous Power IoT
WU Jin-yu,ZHANG Li-juan,SUN Hong-di,LAI Yu-yang.Trusted Secure Access Scheme of Ubiquitous Power IoT[J].Computer and Modernization,2020,0(4):52-59.
Authors:WU Jin-yu  ZHANG Li-juan  SUN Hong-di  LAI Yu-yang
Abstract:In order to comprehensively improve the comprehensive security defense capability of all-service ubiquitous power Internet of Things(IoT), and solve the lack and deficiency of the security protection guidance and terminal authentication mechanism of all-service ubiquitous power IoT, this  paper proposes a trusted secure access scheme of ubiquitous power IoT. Firstly, a unique fingerprint information is determined for the power IoT terminal layer equipment. Then, combined with the fingerprint information, the identification and password technology is used to realize the access authentication of terminal layer equipment and block the access of illegal terminals. Finally, the security transfer mechanism of legal terminal identity information is designed to trace the abnormal behavior of legal terminal according to the identity information.
Keywords:ubiquitous power IoT  trusted secure access  terminal authentication
  
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机与现代化》浏览原始摘要信息
点击此处可从《计算机与现代化》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号