Skip to main content

Credible Identity Authentication Mechanism of Electric Internet of Things Based on Blockchain

  • Conference paper
  • First Online:
The 10th International Conference on Computer Engineering and Networks (CENet 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1274))

Included in the following conference series:

Abstract

In order to solve the problems of low authentication efficiency and easy tampering of authentication data in the electric IoT system, this paper proposes the electric IoT based on blockchain. First, the authentication model based on blockchain is proposed, and four key issues are analyzed, such as data security storage, user biometrics extraction, power terminal equipment feature extraction, and authentication key generation, then technical solutions are proposed. Secondly, based on the authentication model, the power terminal registration process, user registration process, and authentication process are proposed. The performance analysis of the authentication mechanism is carried out from four aspects: availability, integrity, privacy and efficiency. The analysis results show that the authentication mechanism proposed in this paper has good performance. Finally, the application scenarios and precautions of the authentication mechanism are analyzed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Song, X.R., Zhang, M.: Present situation and trend of the foreign network trusted identity authentication technology and it enlightenment to China. Cyberspace Secur. 9(2), 6–11 (2018)

    Google Scholar 

  2. Ma, X., Zhao, F.G.: Mobile terminal multi source biometric real-time identity authentication system for mobile internet. Video Eng. 4 (2017)

    Google Scholar 

  3. Fan, Y., Xv, J., Gao, Y.T.: Research and implementation of e id-based identity authentication system. Netinfo Secur. 3, 48–53 (2015)

    Google Scholar 

  4. Zhang, T., Lin, W.X.: Implementation method of mobile terminal identity authentication and use authorization based on SWP-SIM technology. Technol. Innov. Appl. 9, 21–22 (2018)

    Google Scholar 

  5. Li, Y., Guo, J.W., Du, L.P., et al.: Research on mobile terminal identity authentication scheme based on combined symmetric key algorithm. Netw. Secur. Technol. Appl. 1, 94–95 (2016)

    Google Scholar 

  6. Ma, L.L.: An identity authentication scheme of mobile terminal based on two-dimension code in cloud computing environment. Microelectron. Comput. 33(1), 140–143 (2016)

    Google Scholar 

  7. Sun, Z.W., Zhang, Y.C.: Deep belief network model for mobile terminal identity authentication. Netinfo Secur. 3, 34–42 (2019)

    Google Scholar 

  8. Leng, X.W., Chen, G.P., Jiang, Y., et al.: Data specification and processing in big-data analysis system for monitoring and operation of smart grid. Autom. Electric Power Syst. 42(19), 169–176 (2018)

    Google Scholar 

  9. Xia, Z.Q., Zhao, L., Wang, J., et al.: Research on a privacy protection method for power users based on virtual ring architecture. Netinfo Secur. 18(2), 48–53 (2018)

    Google Scholar 

  10. Dong, G.S., Chen, Y.X., Li, H.W., et al.: Cross-domain authentication credibility based on blockchain in heterogeneous environment. Commun. Technol. 52(6), 27 (2019)

    Google Scholar 

  11. Chen, Z.Y., Gao, D.Q., Wang, D., et al.: Quantum key based optimal data protection model for power business. Autom. Electric Power Syst. 42(11), 113–121 (2018)

    Google Scholar 

  12. Wang, S.X., Chen, H.W., Pan, Z.X., et al.: A reconstruction method for missing data in power system measurement using an improved generative adversarial network. Proc. CSEE 1, 1–7 (2019)

    Google Scholar 

Download references

Acknowledgements

This work is supported by the science and technology project of State Grid Corporation: Blockchain-Based Research and Typical Scenario Application of Trusted Service Support System for Electric Power Business (5700-201918243A-0-0-00).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiuli Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, L., Huang, X., Chen, L., Fan, J., Zhang, M. (2021). Credible Identity Authentication Mechanism of Electric Internet of Things Based on Blockchain. In: Liu, Q., Liu, X., Shen, T., Qiu, X. (eds) The 10th International Conference on Computer Engineering and Networks. CENet 2020. Advances in Intelligent Systems and Computing, vol 1274. Springer, Singapore. https://doi.org/10.1007/978-981-15-8462-6_100

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-8462-6_100

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-8461-9

  • Online ISBN: 978-981-15-8462-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics