收稿日期:
2019-07-18
出版日期:
2020-04-22
发布日期:
2020-04-24
作者简介:
吴金宇(1984-),男,广东广州人,高级工程师,博士,研究方向:网络安全,计算机安全,E-mail: 981578497@qq.com; 张丽娟(1980-),女,高级工程师,硕士,研究方向:加密芯片,E-mail: zhanglj1@csg.cn; 孙宏棣(1993-),男,工程师,硕士,研究方向:通信与信息系统,E-mail: ahchengrui@126.com; 赖宇阳(1987-),男,高级工程师,硕士,研究方向:模式识别与智能系统,E-mail: askye0407@163.com。
Received:
2019-07-18
Online:
2020-04-22
Published:
2020-04-24
摘要: 为全面提高全业务泛在电力物联网安全综合防御能力,解决目前全业务泛在电力物联网安全防护指导和终端认证机制的缺失和不足,本文提出一种泛在电力物联网可信安全接入方案。首先给电力物联网终端层设备确定一个唯一标识的指纹信息;然后结合该指纹信息,采用身份标识密码技术实现终端层设备的接入认证,阻断非法终端的接入;最后设计合法终端的身份信息安全传递机制,根据身份信息对合法终端的异常行为进行溯源。
中图分类号:
吴金宇1,张丽娟2,孙宏棣2,赖宇阳2. 泛在电力物联网可信安全接入方案[J]. 计算机与现代化, doi: 10.3969/j.issn.1006-2475.2020.04.010.
WU Jin-yu1, ZHANG Li-juan2, SUN Hong-di2, LAI Yu-yang2. Trusted Secure Access Scheme of Ubiquitous Power IoT[J]. Computer and Modernization, doi: 10.3969/j.issn.1006-2475.2020.04.010.
[1] NOUAILHAT A. European parliament resolution on nanosciences and nanotechnologies: An action plan for Europe 2005-2009[M]// An Introduction to Nanoscience and Nanotechnology. ISTE, 2010. [2] 国家标准化委员会. GB/T 36468-2018,物联网系统评价指标体系编制通则[S]. [3] 国家标准化委员会. GB/T 36478.1-2018,物联网信息交换和共享第1部分:总体架构[S]. [4] 国家标准化委员会. GB/T 36478.2-2018,物联网信息交换和共享第2部分:通用技术要求[S]. [5] 王澎. 基于可信计算的终端安全防护系统[J]. 信息安全与通信保密, 2010,1(1):119-121. [6] HAHN A, ASHOK A, SRIDHAR S, et al. Cyber-physical security test beds: Architecture, application, and evaluation for smart grid[J]. IEEE Transactions on Smart Grid, 2015,4(2):1-6. [7] HALL J, BARBEAU M, KRANAKIS E. Detection of transient in radio frequency fingerprinting using signal phase[C]// The IASTED International Conference on Wireless & Optical Communications. 2003:13-18. [8] HALL J, BARBEAU M, KRANAKIS E. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting (Extended Abstract)[C]// Communications, Internet and Information Technology (CIIT). 2004:103-108. [9] PORAMBAGE P, SCHMITT C, KUMAR P, et al. Two-phase authentication protocol for wireless sensor networks in distributed IoT applications[C]// Wireless Communications and Networking Conference. 2014:2728-2733. [10]MOOSAVI S R, GIA T N, RAHMANI A, et al. SEA: A secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways[J]. Procedia Computer Science, 2015,52(1):452-459. [11]AMIN R, KUMAR N, BISWAS G P, et al. A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment[J]. Future Generation Computer Systems, 2018,78(3):1005-1019. [12]王春东,白仪,莫秀良,等. 基于物联网的身份双向认证机制研究[J]. 南开大学学报(自然科学版), 2016,49(2):22-28. [13]冯福伟,李瑛,徐冠宁,等. 基于集群架构的物联网身份认证系统[J]. 计算机应用, 2013,33(S1):126-129. [14]戚湧,徐阳,李千目. 一种物联网密钥管理和认证方案[J]. 计算机与现代化, 2014(12):91-96. [15]SCIANCALEPORE S, CAPOSSELE A, PIRO G, et al. Key management protocol with implicit certificates for IoT systems[C]// Proceedings of 2015 Workshop on IoT Challenges in Mobile and Industrial Systems. 2015:37-42. [16]WAZID M, DAS A K, ODELU V, et al. Design of secure user authenticated key management protocol for generic IoT networks[J]. IEEE Internet of Things Journal, 2018,5(1):269-282. [17]KUNG Y H, HSIAO H C. GroupIt: Lightweight group key management for dynamic IoT environments[J]. IEEE Internet of Things Journal, 2019,5(6):5155-5165. [18]SCIANCALEPORE S, PIRO G, BOGGIA G, et al. Public key authentication and key agreement in IoT devices with minimal airtime consumption[J]. IEEE Embedded Systems Letters, 2017,9(1):1-4. [19]ROMAN R, ALCARAZ C, LOPEZ J, et al. Key management systems for sensor networks in the context of the Internet of Things[J]. Computers & Electrical Engineering, 2011,37(2):147-159. [20]ESPOSITO C, FICCO M, CASTIGLIONE A, et al. Distributed group key management for event notification confidentiality among sensors[J]. IEEE Transactions on Dependable & Secure Computing, 2018(99):1. [21]LAVANYA S, USHA D M. A survey on key management in Internet of Things[C]// Proceedings of the International Conference on Intelligent Computing Systems (ICICS). 2017:572-580. [22]YE C, MATHUR S, REZNIK A, et al. Information-theoretically secret key generation for fading wireless channels[J]. IEEE Transactions on Information Forensics & Security, 2009,5(2):240-254. [23]SCIANCALEPORE S, PILC M, SCHRDER S, et al. Attribute-based access control scheme in federated IoT platforms[C]// 2017 International Workshop on Interoperability and Open-Source Solutions. 2016:123-138. [24]YEH L Y, CHIANG P Y, TSAI Y L, et al. Cloud-based fine-grained health information access control framework for lightweight IoT devices with dynamic auditing and attribute revocation[J]. IEEE Transactions on Cloud Computing, 2018,6(2):532-544. [25]HUSSEIN D, BERTIN E, FREY V. A community-driven access control approach in distributed IoT environments[J]. IEEE Communications Magazine, 2017,55(3):146-153. [26]LU B X, WANG L, LIU J L, et al. LaSa: Location aware wireless security access control for IoT systems[J]. Mobile Networks & Applications, 2018(11):1-13. [27]CRUZPIRIS L, RIVERA D, MARSAMAESTRE I, et al. Access control mechanism for IoT environments based on modelling communication procedures as resources[J]. Sensors, 2018,18(3):917-937. [28]梅颖. 基于区块链的物联网访问控制简化模型构建[J]. 中国传媒大学学报(自然科学版), 2017,24(5):7-12. [29]周超,任志宇. 结合属性与角色的访问控制模型综述[J]. 小型微型计算机系统, 2018,39(4):782-786. [30]SHANG C W, LIU Q T, ZHAO C L, et al. A research on UCON enhanced dynamic access control model for the business process of composite Web services[J]. Journal of Wuhan University, 2011,57(5):408-412. [31]杨赞,王建新,杨林,等. 多域环境下基于使用控制的融合访问控制机制[J]. 吉林大学学报(工学版), 2014,44(1):158-163. [32]蔡婷,陈昌志. 云环境下基于UCON的访问控制模型研究[J]. 计算机科学, 2014,41(S1):262-264. [33]CUI Y Q. Dynamic context_aware usage control-based grid access control model[J]. Computer Science, 2008,35(2):37-41. [34]张海鹏. 基于UCON的物联网环境访问控制模型及其应用[D]. 上海:华东理工大学, 2012. [35]丁霞,徐开勇,李立新,等. 基于UCONABC模型的电子文档安全系统[J]. 计算机工程, 2008,34(2):127-129. [36]AZIZ B. Modelling fine-grained access control policies in grids[J]. Journal of Grid Computing, 2015,14(3):1-17. [37]KRISHNAMACHARI N, IYENGAR S. Distributed Bayesian algorithms for fault tolerant event region detection in wireless sensor networks[J]. IEEE Transactions on Computers, 2004,53(3):241-250. [38]LUO X W, DONG M, HUANG Y L. On distributed fault tolerant detection in wireless sensor networks[J]. IEEE Transactions on Computers, 2006,55(1):58-70. [39]曹冬磊,曹建农,金蓓弘. 一种无线传感器网络中事件区域监测的容错算法[J]. 计算机学报, 2007,30(10):1770-1776. [40]李宏,谢政,陈建二. 一种无线传感网分布式加权容错算法[J]. 系统仿真学报, 2008,20(14):3750-3755. [41]PENG L P, GAO H, LI J Z, et al. Reliable and fast detection of gradual events in wireless sensor networks[C]// International Conference on Wireless Algorithms. 2008:261-273. [42]YM S J, CHOI Y H. An adaptive fault-tolerant event detection scheme for wireless sensor networks[J]. Sensors, 2010,10(3):2332-2447. [43]JAN M A, NANDA P, HE X, et al. A robust authentication scheme for observing resources in the Internet of Things environment[C]// 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. 2014:205-211. |
[1] | 欧基发, 蔡茂国, 洪广杰, 詹楷杰. 基于PWLCM和秃鹰俯冲机制改进的野狗优化算法[J]. 计算机与现代化, 2024, 0(01): 109-116. |
[2] | 夏煌智, 陈丽敏, 毛雪迪, . 融入动态学习与高斯变异的自适应秃鹰搜索算法[J]. 计算机与现代化, 2024, 0(01): 117-126. |
[3] | 闫 阳, 詹子俊, 曹绍华. 基于设备协同的大规模卸载:融合分治和贪心的双层优化算法[J]. 计算机与现代化, 2023, 0(11): 13-21. |
[4] | 卢 磊, 贺智明, 黄志成. 基于多策略改进的麻雀搜索算法[J]. 计算机与现代化, 2023, 0(10): 23-31. |
[5] | 马国祥, 杨凌菲, 严传波, 张志豪, 孙 彬, 王晓荣. 基于深度DenseNet网络的肝包虫病超声影像诊断方法[J]. 计算机与现代化, 2023, 0(09): 100-104. |
[6] | 韩 雪. 基于约束聚类和粒子群算法的多路径规划[J]. 计算机与现代化, 2023, 0(08): 7-11. |
[7] | 赖建彬, 冯刚. 一种基于混合样本的经验回放策略[J]. 计算机与现代化, 2023, 0(06): 33-38. |
[8] | 赵英, 翟源伟, 陈骏君, 滕建. 基于LSTM-Prophet非线性组合的时间序列预测模型[J]. 计算机与现代化, 2020, 0(09): 6-11. |
[9] | 万科. 社交网络中正影响支配集问题的轮转贪心算法[J]. 计算机与现代化, 2020, 0(09): 49-53. |
[10] | 郑慧敏, . 基于矩阵分解的海洋SAR图像舰船检测[J]. 计算机与现代化, 2020, 0(09): 89-94. |
[11] | 宋良才, 索贵龙, 胡军涛, 窦艳梅, 崔志永. 基于注意力机制的Encoder-Decoder光伏发电预测模型[J]. 计算机与现代化, 2020, 0(09): 112-117. |
[12] | 林钦壮, 何昭水. 基于注意力机制的高效点云识别方法[J]. 计算机与现代化, 2020, 0(08): 51-55. |
[13] | 鄢丽娟, 张彦虎. 一种基于平均剩余能量的无线传感器网络分簇路由算法[J]. 计算机与现代化, 2020, 0(07): 16-20. |
[14] | 王振庭, 陈永府, 刘田. 智能仓储中的多机器人调度方法[J]. 计算机与现代化, 2020, 0(07): 65-70. |
[15] | 杨牧川, 吕晓丹, 蒋朝惠, . 云计算环境下的可修分布式系统可靠性分析方法[J]. 计算机与现代化, 2020, 0(06): 28-. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||