Computer and Modernization

Previous Articles     Next Articles

Trusted Secure Access Scheme of Ubiquitous Power IoT

  

  1. (1. Power Dispatching and Control Center, China Southern Power Grid Co. Ltd., Guangzhou 510000, China;
    2. Innovation Incubation Division, Dingxin Information Technology Co. Ltd., Guangzhou 510623, China)
  • Received:2019-07-18 Online:2020-04-22 Published:2020-04-24

Abstract: In order to comprehensively improve the comprehensive security defense capability of all-service ubiquitous power Internet of Things(IoT), and solve the lack and deficiency of the security protection guidance and terminal authentication mechanism of all-service ubiquitous power IoT, this  paper proposes a trusted secure access scheme of ubiquitous power IoT. Firstly, a unique fingerprint information is determined for the power IoT terminal layer equipment. Then, combined with the fingerprint information, the identification and password technology is used to realize the access authentication of terminal layer equipment and block the access of illegal terminals. Finally, the security transfer mechanism of legal terminal identity information is designed to trace the abnormal behavior of legal terminal according to the identity information.

Key words: ubiquitous power IoT, trusted secure access, terminal authentication

CLC Number: