4.6 Article

A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system

期刊

PLOS ONE
卷 17, 期 3, 页码 -

出版社

PUBLIC LIBRARY SCIENCE
DOI: 10.1371/journal.pone.0265937

关键词

-

资金

  1. science and technology project of State Grid Corporation of China (Online diagnosis technology of state and strategy parameters supporting the safe operation of large-scale security and stability control system) [5100-202140027A-0-0-00]

向作者/读者索取更多资源

In this paper, a blockchain-based identity authentication scheme for Intelligent Electronic Devices (IEDs) of Security and Stability Control System (SSCS) is proposed. The scheme uses a consortium chain to store credentials and combines IP address, port number, and physical ID for unique identification of IEDs. It also introduces a lightweight identity authentication method using renewable hash chains.
As an important part of the second defense line of the power system, the Security and Stability Control System (SSCS) is of great significance to ensure the reliable operation of the power system. However, SSCS still lacks an effective security mechanism and is easily accessed by attackers, thus posing a threat to the stable and reliable operation of the power system. To tackle this issue, we propose a blockchain-based identity authentication scheme for Intelligent Electronic Devices (IEDs) of SSCS. We first propose an identity authentication system model for IEDs and design the deployment of consortium chain nodes on IEDs, with architectural characteristics of SSCS and the working scenario of IEDs taken into consideration. The consortium chain is used to store credentials required for authentication, ensuring that they are tamper-proof. We combine IP address, port number and physical ID, and propose the unique identification of IEDs, with a data structure designed for the identification. We also propose a lightweight identity authentication method based on renewable hash chains, with hash chains used as one-time authentication passwords, and introduce a renewal mechanism of hash chains. Further, the detailed processes of registration and authentication phase are designed. Finally, the security analysis shows that our identity authentication scheme can resist various attacks, and the feasibility of our scheme is verified by experiments.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据