Abstract
With the continuous development of smart grid interactive business applications, the existing terminal access mechanism is difficult to ensure that all types of power terminals access to power information network security. Based on the idea of trusted computing and trusted network connection, this paper proposes a power terminal security access architecture for power interactive business from terminal security access and access control, terminal encryption and content filtering, and establishes architecture of supporting for interaction business from Internet and terminal security access, enhances the external network interactive services and terminal access authentication and access control capabilities in order to improve the security of terminal access to protect the strength of the Internet to ensure interactive services and terminal access to the trustworthy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lamport, L.: Password authentication with insecure communication. Commun. ACM 24, 770–772 (1981)
Chang, C.-C., Lee, C.-Y., Chiu, Y.-C.: Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 32, 611–618 (2009)
Peyravian, M., Zunic, N.: Methods for protecting password transmission. Comput. Secur. 19, 466–469 (2000)
Wu, T.C., Hung-Sung, S.: Authenticating passwords over an insecure channel. Comput. Secur. 15, 431–439 (1996)
Hwang, M.S., Li, L.H.: A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46, 28–30 (2000)
Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–472 (1985)
Sun, H.M.: An efficient remote use authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46, 958–961 (2000)
Chien, H.Y., Jan, J.K., Tseng, Y.M.: An efficient and practical solution to remote authentication: smart card. Comput. Secur. 21, 372–375 (2002)
Ku, W.C., Chen, S.M.: Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 50, 204–207 (2004)
Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 50, 612–614 (2004)
Wang, X.M., Zhang, W.F., Zhang, J.S., Khan, M.K.: Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Comput. Stand. Interfaces 29, 507–512 (2007)
Chen, T.H., Hsiang, H.C., Shih, W.K.: Security enhancement on an improvement on two remote user authentication schemes using smart cards. Fut. Gener. Comput. Syst. 27, 377–380 (2011)
Song, R.: Advanced smart card based password authentication protocol. Comput. Stand. Interfaces 32, 321–325 (2010)
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China under Grant 51507084, in part by NUPTSF under Grant NY214203.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Deng, S., Zhang, L., Yue, D. (2017). Research on Power Terminal Access Control Technology Supporting Internet Interactive Service in Smart Grid. In: Li, K., Xue, Y., Cui, S., Niu, Q., Yang, Z., Luk, P. (eds) Advanced Computational Methods in Energy, Power, Electric Vehicles, and Their Integration. ICSEE LSMS 2017 2017. Communications in Computer and Information Science, vol 763. Springer, Singapore. https://doi.org/10.1007/978-981-10-6364-0_63
Download citation
DOI: https://doi.org/10.1007/978-981-10-6364-0_63
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6363-3
Online ISBN: 978-981-10-6364-0
eBook Packages: Computer ScienceComputer Science (R0)