期刊
PLOS ONE
卷 17, 期 3, 页码 -出版社
PUBLIC LIBRARY SCIENCE
DOI: 10.1371/journal.pone.0265937
关键词
-
资金
- science and technology project of State Grid Corporation of China (Online diagnosis technology of state and strategy parameters supporting the safe operation of large-scale security and stability control system) [5100-202140027A-0-0-00]
In this paper, a blockchain-based identity authentication scheme for Intelligent Electronic Devices (IEDs) of Security and Stability Control System (SSCS) is proposed. The scheme uses a consortium chain to store credentials and combines IP address, port number, and physical ID for unique identification of IEDs. It also introduces a lightweight identity authentication method using renewable hash chains.
As an important part of the second defense line of the power system, the Security and Stability Control System (SSCS) is of great significance to ensure the reliable operation of the power system. However, SSCS still lacks an effective security mechanism and is easily accessed by attackers, thus posing a threat to the stable and reliable operation of the power system. To tackle this issue, we propose a blockchain-based identity authentication scheme for Intelligent Electronic Devices (IEDs) of SSCS. We first propose an identity authentication system model for IEDs and design the deployment of consortium chain nodes on IEDs, with architectural characteristics of SSCS and the working scenario of IEDs taken into consideration. The consortium chain is used to store credentials required for authentication, ensuring that they are tamper-proof. We combine IP address, port number and physical ID, and propose the unique identification of IEDs, with a data structure designed for the identification. We also propose a lightweight identity authentication method based on renewable hash chains, with hash chains used as one-time authentication passwords, and introduce a renewal mechanism of hash chains. Further, the detailed processes of registration and authentication phase are designed. Finally, the security analysis shows that our identity authentication scheme can resist various attacks, and the feasibility of our scheme is verified by experiments.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据