Computer Science ›› 2022, Vol. 49 ›› Issue (11A): 210900218-6.doi: 10.11896/jsjkx.210900218

• Information Security • Previous Articles     Next Articles

Power Internet of Things Device Access Management Based on Cryptographic Accumulator

CHEN Bin1, XU Huan1, XI Jian-fei2, LEI Mei-lian2, ZHANG Rui3, QIN Shi-han3   

  1. 1 China Southern Power Grid,Guangzhou 510663,China
    2 China Southern Power Grid Digital Power Grid Research Institute,Guangzhou 510663,China
    3 Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
  • Online:2022-11-10 Published:2022-11-21
  • About author:CHEN Bin,born in 1983,Ph.D.His main research interests include power grid big data security and so on.
    QIN Shi-han,born in 1997,master.Her main research interests include cryptography technology and application,security certification agreement.
  • Supported by:
    National Natural Science Foundation of China(61772520,61802392,61972094).

Abstract: Device access is the first line of defense for the security protection of the power Internet of Things,and it is the pre-mise for realizing security mechanisms such as access control and intrusion detection.Complete device access management covers two key links:trusted authentication and secure revocation.Most existing systems rely on PKI to establish trusted infrastructure,and realize access management through the issuance,verification and revocation of public key certificates.However,in the scenario of power Internet of Things,this scheme brings extra overhead burden and efficiency problems to a large number of devices with limited resources.The lightweight authentication scheme has realized the optimization of overhead and efficiency,but it is not functional enough to realize the key link of safe revocation.In view of the above shortcomings,this paper proposes an access ma-nagement scheme for power Internet of Things devices based on cryptography accumulator and Bloom filter,which simultaneously realizes trusted authentication and security revocation of devices,and effectively considers both functions and efficiency.Through security analysis,this scheme realizes anonymous authentication of gateway,unforgeability of identity certificate and security of forced revocation.Experimental results show that,compared with the mainstream PKI-based device access management scheme,this scheme greatly reduces the communication overhead and storage overhead in the process of device authentication and revocation,and has higher practicability in the power Internet of Things scene.

Key words: Cryptographic accumulator, Power Internet of things, Access authentication, Secure revocation, Anonymous

CLC Number: 

  • TP309
[1]FU Z X,LI X Y,YUAN Y.Research on Key Technologies of Ubiquitous Power Internet of Things [J].Electric Power Construction,2019,40(5):1-12.
[2]REN T Y,WANG X H,GUO G X,et al.Design of power Internet of Things data security system based on multiple authentication and lightweight password[J].Journal of Nanjing University of Posts and Telecommunications,2020,40(6):12-19.
[3]ZHANG L,ZHAO L,YIN S,et al.A lightweight authentication scheme with privacy protection for smart grid communications[J].Future Generation Computer Systems,2019,100(Nov.):770-778.
[4]ZUO J Y.A privacy-preserving data aggregation algorithm inSmart Grid networks[J].Journal of Terahertz Science and Electronic Information Technology,2021,19(3):485-489.
[5]HOUSLEY R,POLK W,FORD W,et al.RFC,3280.InternetX.509 Public Key Infrastructure Certificate and Certificate Revocation List(CRL) Profile[J].Rfc,2002.
[6]SHAMIR A.Identity Based Cryptosystems and SignatureScheme[M].Blakley G R,Chaum D,eds.,1984.
[7]TAN C,CHEN M J,AMUAH E A.Research on distributedidentity authentication mechanism of IoT device based on blockchain[J].Chinese Journal on Internet of Things,2020,4(2):70-77.
[8]LI H,LU R,LIANG Z,et al.An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid[J].IEEE Systems Journal,2014,8(2):655-663.
[9]CHIM T,YIU S,HUI L,et al.PASS:Privacy-preserving au-thentication scheme for smart grid network[C]//Proceedings of the 2011 IEEE International Conference on Smart Grid Communications.IEEE,2011.
[10]FOUDA M M,FADLULLAH Z M,et al.A Lightweight Message Authentication Scheme for Smart Grid Communications[J].IEEE Transactions on Smart Grid,2011,2(4):675-685.
[11]KHALI D,MAHMOO D,SHEHZA D,et al.An elliptic curve cryptography based lightweight authentication scheme for smart grid communication[J].Future Generations Computer Systems:FGCS,2018,81:557-565.
[12]LIAO H M,YU G,BAN G M,et al.Research on Identity Authentication Technology in Power Internet of Things Based on SM9 Algorithm[J].Shandong Electric Power,2020,47(10):1-5.
[13]SHEN H P,CHEN Y C.Study of Authentication Mechanism in Federated Internet of Things[J].Computer Engineering,2016,42(9):110-115.
[14]YAN H Q,WANG L J.Research of authentication techniques for the Internet of things[J].Journal on Communications,2020,41(7):213-222.
[15]MAHMOUD M M E A,MIŠIĆ J, AKKAYA K, et al. Investigating public-key certificate revocation in smart grid[J]. IEEE Internet of Things Journal, 2015, 2(6): 490-503.
[16]MC A,KA B.Communication-efficient certificate revocationmanagement for Advanced Metering Infrastructure and IoT Integration[J].Future Generation Computer Systems,2021,115:267-278.
[17]BLOOLM B H.Space/time trade-offs in hash coding with allowable errors[J].Communications of the ACM,1970,13(7):422-426.
[18]BENALOH J,MARE M D.One-Way Accumulators:A Decentralized Alternative to Digital Signatures[C]//Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology.1995.
[19]CAMENISCH J,LYSYANSKAYA A.Dynamic Accumulatorsand Application to Efficient Revocation of Anonymous Credentials[C]//22nd Annual International Cryptology Conference(CRYPTO 2002).Santa Barbara,California,USA,2002:18-22.
[20]BARIC N,PFITZMANN B.Collision-free accumulators and fail-stop signature schemes without trees[C]//The 16th Annual International Conference on Theory and Application of Cryptographic Techniques.Konstanz,Germany,1997:480-494.
[21]TRIANDOPOULOS N,PAPAMANTHOU C,TAMASSIA R.Authenticated hash tables[C]//Proceedings of the 15th ACM Conference on Computer and communications security.ACM Conference on Computer & Communications Security.DBLP,2008.
[1] FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327.
[2] WANG Xiang-yu, YANG Ting. Routing Directory Server Defined by Smart Contract [J]. Computer Science, 2021, 48(6A): 504-508.
[3] WANG Xi-long, LI Xin, QIN Xiao-lin. Collaborative Scheduling of Source-Grid-Load-Storage with Distributed State Awareness UnderPower Internet of Things [J]. Computer Science, 2021, 48(2): 23-32.
[4] ZHANG Wang-ce, FAN Jing, WANG Bo-ru and NI Min. (α,k)-anonymized Model for Missing Data [J]. Computer Science, 2020, 47(6A): 395-399.
[5] LUO Peng-yu, WU Le, LYU Yang, YUAN Kun-ping, HONG Ri-chang. Temporal Reasoning Based Hierarchical Session Perception Recommendation Model [J]. Computer Science, 2020, 47(11): 73-79.
[6] WANG Qing-long, QIAO Rui, DUAN Zong-tao. Security Analysis on VANETs Authentication Schemes:CPAV and ABV [J]. Computer Science, 2019, 46(4): 177-182.
[7] CHEN Hong-yun, WANG Jie-hua, HU Zhao-peng, JIA Lu, YU Ji-wen. Privacy Preserving Algorithm Based on Dynamic Update in Medical Data Publishing [J]. Computer Science, 2019, 46(1): 206-211.
[8] YUE Xiao-han, HUI Ming-heng, WANG Xi-bo. Forward Security Anonymous Authentication Protocol Based on Group Signature for Vehicular Ad Hoc Network [J]. Computer Science, 2018, 45(11A): 382-388.
[9] XIONG Wan-zhu, LI Xiao-yu. Mobile Location Privacy Protection Based on Anonymous Routing [J]. Computer Science, 2018, 45(10): 142-149.
[10] YANG Yue-ping, WANG Jian and XUE Ming-fu. Hierarchical Privacy Protection of Multi-source Data Fusion for Sensitive Value [J]. Computer Science, 2017, 44(9): 156-161.
[11] LIAO Jun, JIANG Chao-hui, GUO Chun and PING Yuan. Classification Anonymity Algorithm Based on Weight Attributes Entropy [J]. Computer Science, 2017, 44(7): 42-46.
[12] LIU Yan and ZHANG Lin. Improved Location Anonymous Technology for Big Data Based on Bloom Filter [J]. Computer Science, 2017, 44(6): 144-149.
[13] LU Jie, SONG Xiang-mei, HAN Mou and ZHOU Cong-hua. Batch Verification Scheme Defensing Collusive Attack in VANET [J]. Computer Science, 2016, 43(6): 135-140.
[14] DAI Jia-zhu and HUA Liang. Method of Anonymous Area Generation for Sensitive Location Protection under Road Networks [J]. Computer Science, 2016, 43(3): 137-144.
[15] WANG Hai-ping and ZHAO Jing-jing. Ciphertext-policy Attribute-based Encryption with Anonymous Access Structure [J]. Computer Science, 2016, 43(2): 175-178.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!