• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于区块链的安全稳定控制系统 IED 轻量级身份认证方案。

A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system.

机构信息

Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China.

State Grid Electric Power Research Institute, Nanjing, China.

出版信息

PLoS One. 2022 Mar 24;17(3):e0265937. doi: 10.1371/journal.pone.0265937. eCollection 2022.

DOI:10.1371/journal.pone.0265937
PMID:35324985
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8947118/
Abstract

As an important part of the second defense line of the power system, the Security and Stability Control System (SSCS) is of great significance to ensure the reliable operation of the power system. However, SSCS still lacks an effective security mechanism and is easily accessed by attackers, thus posing a threat to the stable and reliable operation of the power system. To tackle this issue, we propose a blockchain-based identity authentication scheme for Intelligent Electronic Devices (IEDs) of SSCS. We first propose an identity authentication system model for IEDs and design the deployment of consortium chain nodes on IEDs, with architectural characteristics of SSCS and the working scenario of IEDs taken into consideration. The consortium chain is used to store credentials required for authentication, ensuring that they are tamper-proof. We combine IP address, port number and physical ID, and propose the unique identification of IEDs, with a data structure designed for the identification. We also propose a lightweight identity authentication method based on renewable hash chains, with hash chains used as one-time authentication passwords, and introduce a renewal mechanism of hash chains. Further, the detailed processes of registration and authentication phase are designed. Finally, the security analysis shows that our identity authentication scheme can resist various attacks, and the feasibility of our scheme is verified by experiments.

摘要

作为电力系统第二道防线的重要组成部分,安全稳定控制系统(SSCS)对于确保电力系统的可靠运行具有重要意义。然而,SSCS 仍然缺乏有效的安全机制,容易被攻击者访问,从而对电力系统的稳定可靠运行构成威胁。针对这一问题,我们提出了一种基于区块链的 SSCS 智能电子设备(IED)身份认证方案。我们首先为 IED 提出了一个身份认证系统模型,并设计了联盟链节点在 IED 上的部署,考虑了 SSCS 的体系结构特点和 IED 的工作场景。联盟链用于存储身份验证所需的凭据,以确保其防篡改。我们结合 IP 地址、端口号和物理 ID,并提出了 IED 的唯一标识,设计了标识的数据结构。我们还提出了一种基于可再生哈希链的轻量级身份认证方法,使用哈希链作为一次性认证密码,并引入了哈希链的更新机制。进一步设计了注册和认证阶段的详细流程。最后,安全性分析表明,我们的身份认证方案可以抵御各种攻击,实验验证了我们方案的可行性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/67e265e515c8/pone.0265937.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/408e8954b33e/pone.0265937.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/99ed7bd9a707/pone.0265937.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/ac9ebbb7b3dd/pone.0265937.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/b6923807c3cf/pone.0265937.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/265bcc30de23/pone.0265937.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/7a3e608f15d8/pone.0265937.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/f653b5778479/pone.0265937.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/23df1a05c65b/pone.0265937.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/dfc44a525885/pone.0265937.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/053f0bbdd7d6/pone.0265937.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/9e86d03a3fd7/pone.0265937.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/b2c40c8484e8/pone.0265937.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/67e265e515c8/pone.0265937.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/408e8954b33e/pone.0265937.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/99ed7bd9a707/pone.0265937.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/ac9ebbb7b3dd/pone.0265937.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/b6923807c3cf/pone.0265937.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/265bcc30de23/pone.0265937.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/7a3e608f15d8/pone.0265937.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/f653b5778479/pone.0265937.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/23df1a05c65b/pone.0265937.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/dfc44a525885/pone.0265937.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/053f0bbdd7d6/pone.0265937.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/9e86d03a3fd7/pone.0265937.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/b2c40c8484e8/pone.0265937.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c663/8947118/67e265e515c8/pone.0265937.g013.jpg

相似文献

1
A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system.基于区块链的安全稳定控制系统 IED 轻量级身份认证方案。
PLoS One. 2022 Mar 24;17(3):e0265937. doi: 10.1371/journal.pone.0265937. eCollection 2022.
2
Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge.哈希链雾/边缘:一种基于模式的哈希链,用于在雾/边缘中使用零知识证明的安全相互认证协议。
Sensors (Basel). 2022 Jan 13;22(2):607. doi: 10.3390/s22020607.
3
An efficient blockchain-based authentication scheme with transferability.具有可转移性的高效区块链认证方案。
PLoS One. 2024 Sep 12;19(9):e0310094. doi: 10.1371/journal.pone.0310094. eCollection 2024.
4
A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks.基于区块链的安全认证和密钥协商方案用于 3GPP5G 网络。
Sensors (Basel). 2022 Jun 15;22(12):4525. doi: 10.3390/s22124525.
5
A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.基于哈希的远程用户认证和认证密钥协商方案用于集成电子病历信息系统。
J Med Syst. 2015 Nov;39(11):144. doi: 10.1007/s10916-015-0322-3. Epub 2015 Sep 9.
6
Secure and privacy improved cloud user authentication in biometric multimodal multi fusion using blockchain-based lightweight deep instance-based DetectNet.在基于区块链的轻量级深度实例检测网络DetectNet的生物特征多模态多融合中,实现安全与隐私性提升的云用户认证。
Network. 2024 Aug;35(3):300-318. doi: 10.1080/0954898X.2024.2304707. Epub 2024 Jan 31.
7
A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme.基于联盟区块链的安全可信电子档案管理方案。
Sensors (Basel). 2022 Feb 8;22(3):1271. doi: 10.3390/s22031271.
8
Design of a Secure Medical Data Sharing Scheme Based on Blockchain.基于区块链的安全医疗数据共享方案设计。
J Med Syst. 2020 Jan 8;44(2):52. doi: 10.1007/s10916-019-1468-1.
9
A secure cross-domain interaction scheme for blockchain-based intelligent transportation systems.一种用于基于区块链的智能交通系统的安全跨域交互方案。
PeerJ Comput Sci. 2023 Nov 15;9:e1678. doi: 10.7717/peerj-cs.1678. eCollection 2023.
10
Blockchain Based Authentication and Cluster Head Selection Using DDR-LEACH in Internet of Sensor Things.基于区块链的认证和使用 DDR-LEACH 的传感器事物互联网中的簇头选择。
Sensors (Basel). 2022 Mar 2;22(5):1972. doi: 10.3390/s22051972.

引用本文的文献

1
Blockchain for Future Wireless Networks: A Decade Survey.区块链在未来无线网络中的应用:十年综述。
Sensors (Basel). 2022 May 31;22(11):4182. doi: 10.3390/s22114182.