Paper
20 October 2023 A lightweight adaptive authentication protocol for power heterogeneous terminals
Chuan He, Bo Zhang, Liang Zhang, Zesheng Xi, Yuan Fang, Yunfan Wang
Author Affiliations +
Proceedings Volume 12814, Third International Conference on Green Communication, Network, and Internet of Things (CNIoT 2023); 128141R (2023) https://doi.org/10.1117/12.3010257
Event: Third International Conference on Green Communication, Network, and Internet of Things (CNIoT 2023), 2023, Chongqing, China
Abstract
With the development of new power grid under the development of a large number and variety of power terminals, terminals thus face different security risks. In recent years, a number of researchers have focused on researching lightweight authentication techniques applicable to power terminals. However, many existing schemes receive problems such as single scenario and limited effect enhancement, which make it difficult to meet the demand for widely applicable authentication of heterogeneous terminals. Therefore, we propose a lightweight adaptive authentication protocol that can achieve adaptive convergence of multiple lightweight authentication algorithms according to the characteristics and needs of terminals, which realizes low-power and low-arithmetic authentication. We design a pre-authentication protocol and an adaptive scheduling mechanism for matching appropriate authentication algorithms to achieve terminal authentication. The experimental results demonstrate the feasibility of our method in this paper.
(2023) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Chuan He, Bo Zhang, Liang Zhang, Zesheng Xi, Yuan Fang, and Yunfan Wang "A lightweight adaptive authentication protocol for power heterogeneous terminals", Proc. SPIE 12814, Third International Conference on Green Communication, Network, and Internet of Things (CNIoT 2023), 128141R (20 October 2023); https://doi.org/10.1117/12.3010257
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Power grids

Computer security

Systems modeling

Information security

Power consumption

Cryptography

Back to Top