首页 | 本学科首页   官方微博 | 高级检索  
     

基于侧链技术的电力物联网跨域认证研究
引用本文:李大伟,霍瑛. 基于侧链技术的电力物联网跨域认证研究[J]. 电力工程技术, 2020, 39(6): 8-12
作者姓名:李大伟  霍瑛
作者单位:南京工程学院
基金项目:江苏省高校自然科学基金项目(19KJB520036)南京工程学院人才引进项目(YKJ201721)
摘    要:能源互联网和5G通信技术发展使电力物联网规模不断增大,对于跨域数据交换的业务需求缺少有效的认证手段。分析了电力物联网终端跨域认证需求和面临的问题,介绍了区块链跨链技术中的侧链技术及实现机理,并将其引入到电力物联网跨域认证方案中,提出了一种基于侧链技术的电力物联网跨域认证方案。首先建立了基于侧链技术的跨链认证架构,设计了区块数据结构和双向锚定认证信息传递模型,通过公钥证书和数字签名生成认证凭据,通过时间戳确保认证信息的时效性,然后提出了基于侧链技术的电力物联网终端跨域认证流程,实现了认证凭证从申请域到认证域的可信传递。认证方案通过主链和侧链数据交互和共享,具有认证信息跨域有效、不可篡改以及分布式共识的特点。最后在配电自动化应用场景中进行仿真实验,验证了方案的可行性。

关 键 词:电力物联网   区块链   侧链技术   双向锚定;接入认证
收稿时间:2020-06-30
修稿时间:2020-08-18

Cross domain authentication of power IoT based on side chain
LI Dawei,HUO Ying. Cross domain authentication of power IoT based on side chain[J]. Electric Power Engineering Technology, 2020, 39(6): 8-12
Authors:LI Dawei  HUO Ying
Affiliation:Nanjing Institute of Technology
Abstract:With the development of energy Internet and 5G communication technology, the scale of power IOT is increasing, and there is a lack of effective authentication means for cross domain data exchange. This paper analyzes the require-ments of power IOT terminal cross domain authentication, discusses the side chain technology and its implementa-tion mechanism in the cross chain technology of blockchain, and introduces it into the cross domain authentication scheme of power IOT, and proposes a cross domain authentication scheme of power IOT based on side chain technol-ogy. Firstly, the cross chain authentication architecture based on side chain technology is established, and the block data structure and two-way peg authentication information transfer model are designed. The authentication creden-tials are generated by public key certificate and digital signature, and the timeliness of authentication information is ensured by time stamp. Then, the cross domain authentication process of power IOT terminal based on side chain technology is proposed, which realizes the authentication certificate from application domain to authentication Trusted delivery of the domain. Through the interaction and sharing of main chain and side chain data, the authentica-tion scheme has the characteristics of cross domain effective, tamper proof and distributed consensus. Finally, simula-tion experiments are carried out in the application scenarios of distribution automation system to verify the feasibility of the scheme.
Keywords:power internet of things  blockchain  side chain technology  two-way peg  access authentication
点击此处可从《电力工程技术》浏览原始摘要信息
点击此处可从《电力工程技术》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号