ABSTRACT
In order to prevent illegal users from malicious attacks on the distribution network dispatching system, a dynamic password-based identity authentication scheme in the distribution network dispatching system is proposed to ensure the safe and stable operation of the distribution network. The challenge-response protocol is used to generate dynamic passwords, and the string space model is used to optimize the constraints of the registration and login phases of the protocol, so that it can meet the requirements of dynamic password mutual authentication. After the password is generated, an out-of-synchronization adjustment mechanism is incorporated into the scheme to enable authentication Able to maintain a high degree of synchronization. The hash calculation of the data string is completed by the Keyed MD5 algorithm, and the hash value input by the client is obtained, and the hash value is compared with the pre-stored hash value. If the two are consistent, the user is directly determined as a legitimate user, otherwise, it is an illegal user. Experiments show that the execution ability of the proposed method is better than that of the traditional method, with higher safety performance and stronger practicability.
- CAO S. An improved identity authentication scheme of dynamic ID multi-factor remote users[J]. Computer Engineering & Science, 2019, 41(04): 633.Google Scholar
- DU Mengyao WANG, Zheng, Ll Na, Dynamic Password Authentication Protocol for Wireless Body Area Network [J]. Computer Engineering and Applications, 2020, 56(14): 68-73.Google Scholar
- Li Xiaotian, Chen Jianhua. Research on security-enhanced three-factor multi-server authentication scheme with anonymity [J]. Application Research of Computers, 2020, 37(09): 2781-2788.Google Scholar
- WU wenfeng, ZHANG Wenfang, WANG Xiaomin, A Security Enhanced Train to Ground Wireless Communication Authentication Key Agreement Scheme for LTE-R [J]. Journal of the China Railway Society, 2019, 41(12): 66-74.Google Scholar
- Zuo L, Zhang M, Ding S, Identity authentication protocol with message recovery in microgrid SCADA system [J][J]. Grid Technology, 2019, 43(12): 4299-4306.Google Scholar
- ZHANG K, TU G, ZHANG C, Joint Virtual User Identification and Channel Security En/Decoding Method for Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2021, 43(2): 380-387.Google Scholar
- Liu J, Lai Y, Yang S, Bilateral authentication protocol for WSN and certification by strand space model[J]. Comput. Sci, 2019, 46(9): 169-17Google Scholar
- XU Han, Yu Changyong, SHl Jie. K-mer Counting Algorithm Based on Minimal Perfect Hash Function [J]. Journal of China Academy of Electronics and Information Technology, 2020,15(05):435-441.Google Scholar
- LIU Xiao, TANG Yong, ZHENG Fang, Research and Design of XOR-Hash Indexing for Shard instruction Cache [J]. Chinese Journal of Computers, 2019, 42(11): 2499-2511.Google Scholar
- Zhou Hanbing Li Mingwei Zhang Chuanyuan, A synchronized detect algorithm for AD9371 broadband burst communications [J]. Application of Electronic Technique, 2019, 45(12): 87-90.Google Scholar
- Liang Ji. Energy saving scheduling model of the constant frequency motor in active distribution network based on vector control [J]. Machine Design and Manufacturing Engineering. 2019, 48(10): 66-70.Google Scholar
- Qu H, Li X, Yang L, Multi-objective distribution network dynamic reconfiguration and DG control considering time variation of load and DG[J]. High. Volt. Eng, 2019, 45: 873-881.Google Scholar
Index Terms
- Design of identity authentication scheme in distribution network dispatching system based on dynamic password
Recommendations
A novel identity-based strong designated verifier signature scheme
Unlike ordinary digital signatures, a designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third ...
An Identity-Based One-Time Password Scheme with Anonymous Authentication
NSWCTC '09: Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 02Password authentication is one of the simplest and the most convenient authentication mechanisms over insecure networks. One-time password authentication which uses dynamic password helps to enhance the security of password. In this paper, we suggest a ...
Improvement of identity-based proxy multi-signature scheme
A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer, a company or an organization. A proxy multi-signature scheme is an extension of the basic proxy signature scheme, and permits two or more original signers ...
Comments