Cargando…
A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system
As an important part of the second defense line of the power system, the Security and Stability Control System (SSCS) is of great significance to ensure the reliable operation of the power system. However, SSCS still lacks an effective security mechanism and is easily accessed by attackers, thus pos...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8947118/ https://www.ncbi.nlm.nih.gov/pubmed/35324985 http://dx.doi.org/10.1371/journal.pone.0265937 |
_version_ | 1784674363063140352 |
---|---|
author | Li, Zhaohan Li, June Zhao, Siyu Chen, Xiong Feng, Ke Wang, Wang |
author_facet | Li, Zhaohan Li, June Zhao, Siyu Chen, Xiong Feng, Ke Wang, Wang |
author_sort | Li, Zhaohan |
collection | PubMed |
description | As an important part of the second defense line of the power system, the Security and Stability Control System (SSCS) is of great significance to ensure the reliable operation of the power system. However, SSCS still lacks an effective security mechanism and is easily accessed by attackers, thus posing a threat to the stable and reliable operation of the power system. To tackle this issue, we propose a blockchain-based identity authentication scheme for Intelligent Electronic Devices (IEDs) of SSCS. We first propose an identity authentication system model for IEDs and design the deployment of consortium chain nodes on IEDs, with architectural characteristics of SSCS and the working scenario of IEDs taken into consideration. The consortium chain is used to store credentials required for authentication, ensuring that they are tamper-proof. We combine IP address, port number and physical ID, and propose the unique identification of IEDs, with a data structure designed for the identification. We also propose a lightweight identity authentication method based on renewable hash chains, with hash chains used as one-time authentication passwords, and introduce a renewal mechanism of hash chains. Further, the detailed processes of registration and authentication phase are designed. Finally, the security analysis shows that our identity authentication scheme can resist various attacks, and the feasibility of our scheme is verified by experiments. |
format | Online Article Text |
id | pubmed-8947118 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-89471182022-03-25 A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system Li, Zhaohan Li, June Zhao, Siyu Chen, Xiong Feng, Ke Wang, Wang PLoS One Research Article As an important part of the second defense line of the power system, the Security and Stability Control System (SSCS) is of great significance to ensure the reliable operation of the power system. However, SSCS still lacks an effective security mechanism and is easily accessed by attackers, thus posing a threat to the stable and reliable operation of the power system. To tackle this issue, we propose a blockchain-based identity authentication scheme for Intelligent Electronic Devices (IEDs) of SSCS. We first propose an identity authentication system model for IEDs and design the deployment of consortium chain nodes on IEDs, with architectural characteristics of SSCS and the working scenario of IEDs taken into consideration. The consortium chain is used to store credentials required for authentication, ensuring that they are tamper-proof. We combine IP address, port number and physical ID, and propose the unique identification of IEDs, with a data structure designed for the identification. We also propose a lightweight identity authentication method based on renewable hash chains, with hash chains used as one-time authentication passwords, and introduce a renewal mechanism of hash chains. Further, the detailed processes of registration and authentication phase are designed. Finally, the security analysis shows that our identity authentication scheme can resist various attacks, and the feasibility of our scheme is verified by experiments. Public Library of Science 2022-03-24 /pmc/articles/PMC8947118/ /pubmed/35324985 http://dx.doi.org/10.1371/journal.pone.0265937 Text en © 2022 Li et al https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Li, Zhaohan Li, June Zhao, Siyu Chen, Xiong Feng, Ke Wang, Wang A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system |
title | A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system |
title_full | A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system |
title_fullStr | A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system |
title_full_unstemmed | A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system |
title_short | A blockchain-based lightweight identity authentication scheme for the IEDs of security and stability control system |
title_sort | blockchain-based lightweight identity authentication scheme for the ieds of security and stability control system |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8947118/ https://www.ncbi.nlm.nih.gov/pubmed/35324985 http://dx.doi.org/10.1371/journal.pone.0265937 |
work_keys_str_mv | AT lizhaohan ablockchainbasedlightweightidentityauthenticationschemefortheiedsofsecurityandstabilitycontrolsystem AT lijune ablockchainbasedlightweightidentityauthenticationschemefortheiedsofsecurityandstabilitycontrolsystem AT zhaosiyu ablockchainbasedlightweightidentityauthenticationschemefortheiedsofsecurityandstabilitycontrolsystem AT chenxiong ablockchainbasedlightweightidentityauthenticationschemefortheiedsofsecurityandstabilitycontrolsystem AT fengke ablockchainbasedlightweightidentityauthenticationschemefortheiedsofsecurityandstabilitycontrolsystem AT wangwang ablockchainbasedlightweightidentityauthenticationschemefortheiedsofsecurityandstabilitycontrolsystem AT lizhaohan blockchainbasedlightweightidentityauthenticationschemefortheiedsofsecurityandstabilitycontrolsystem AT lijune blockchainbasedlightweightidentityauthenticationschemefortheiedsofsecurityandstabilitycontrolsystem AT zhaosiyu blockchainbasedlightweightidentityauthenticationschemefortheiedsofsecurityandstabilitycontrolsystem AT chenxiong blockchainbasedlightweightidentityauthenticationschemefortheiedsofsecurityandstabilitycontrolsystem AT fengke blockchainbasedlightweightidentityauthenticationschemefortheiedsofsecurityandstabilitycontrolsystem AT wangwang blockchainbasedlightweightidentityauthenticationschemefortheiedsofsecurityandstabilitycontrolsystem |