Skip to main content

Research on Power Terminal Access Control Technology Supporting Internet Interactive Service in Smart Grid

  • Conference paper
  • First Online:
Advanced Computational Methods in Energy, Power, Electric Vehicles, and Their Integration (ICSEE 2017, LSMS 2017)

Abstract

With the continuous development of smart grid interactive business applications, the existing terminal access mechanism is difficult to ensure that all types of power terminals access to power information network security. Based on the idea of trusted computing and trusted network connection, this paper proposes a power terminal security access architecture for power interactive business from terminal security access and access control, terminal encryption and content filtering, and establishes architecture of supporting for interaction business from Internet and terminal security access, enhances the external network interactive services and terminal access authentication and access control capabilities in order to improve the security of terminal access to protect the strength of the Internet to ensure interactive services and terminal access to the trustworthy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lamport, L.: Password authentication with insecure communication. Commun. ACM 24, 770–772 (1981)

    Article  Google Scholar 

  2. Chang, C.-C., Lee, C.-Y., Chiu, Y.-C.: Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 32, 611–618 (2009)

    Article  Google Scholar 

  3. Peyravian, M., Zunic, N.: Methods for protecting password transmission. Comput. Secur. 19, 466–469 (2000)

    Article  Google Scholar 

  4. Wu, T.C., Hung-Sung, S.: Authenticating passwords over an insecure channel. Comput. Secur. 15, 431–439 (1996)

    Article  Google Scholar 

  5. Hwang, M.S., Li, L.H.: A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46, 28–30 (2000)

    Article  Google Scholar 

  6. Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–472 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  7. Sun, H.M.: An efficient remote use authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46, 958–961 (2000)

    Article  Google Scholar 

  8. Chien, H.Y., Jan, J.K., Tseng, Y.M.: An efficient and practical solution to remote authentication: smart card. Comput. Secur. 21, 372–375 (2002)

    Article  Google Scholar 

  9. Ku, W.C., Chen, S.M.: Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 50, 204–207 (2004)

    Article  Google Scholar 

  10. Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 50, 612–614 (2004)

    Article  Google Scholar 

  11. Wang, X.M., Zhang, W.F., Zhang, J.S., Khan, M.K.: Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Comput. Stand. Interfaces 29, 507–512 (2007)

    Article  Google Scholar 

  12. Chen, T.H., Hsiang, H.C., Shih, W.K.: Security enhancement on an improvement on two remote user authentication schemes using smart cards. Fut. Gener. Comput. Syst. 27, 377–380 (2011)

    Article  Google Scholar 

  13. Song, R.: Advanced smart card based password authentication protocol. Comput. Stand. Interfaces 32, 321–325 (2010)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grant 51507084, in part by NUPTSF under Grant NY214203.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Song Deng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Deng, S., Zhang, L., Yue, D. (2017). Research on Power Terminal Access Control Technology Supporting Internet Interactive Service in Smart Grid. In: Li, K., Xue, Y., Cui, S., Niu, Q., Yang, Z., Luk, P. (eds) Advanced Computational Methods in Energy, Power, Electric Vehicles, and Their Integration. ICSEE LSMS 2017 2017. Communications in Computer and Information Science, vol 763. Springer, Singapore. https://doi.org/10.1007/978-981-10-6364-0_63

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6364-0_63

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6363-3

  • Online ISBN: 978-981-10-6364-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics