skip to main content
10.1145/3639631.3639635acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacaiConference Proceedingsconference-collections
research-article

Design of identity authentication scheme in distribution network dispatching system based on dynamic password

Authors Info & Claims
Published:16 February 2024Publication History

ABSTRACT

In order to prevent illegal users from malicious attacks on the distribution network dispatching system, a dynamic password-based identity authentication scheme in the distribution network dispatching system is proposed to ensure the safe and stable operation of the distribution network. The challenge-response protocol is used to generate dynamic passwords, and the string space model is used to optimize the constraints of the registration and login phases of the protocol, so that it can meet the requirements of dynamic password mutual authentication. After the password is generated, an out-of-synchronization adjustment mechanism is incorporated into the scheme to enable authentication Able to maintain a high degree of synchronization. The hash calculation of the data string is completed by the Keyed MD5 algorithm, and the hash value input by the client is obtained, and the hash value is compared with the pre-stored hash value. If the two are consistent, the user is directly determined as a legitimate user, otherwise, it is an illegal user. Experiments show that the execution ability of the proposed method is better than that of the traditional method, with higher safety performance and stronger practicability.

References

  1. CAO S. An improved identity authentication scheme of dynamic ID multi-factor remote users[J]. Computer Engineering & Science, 2019, 41(04): 633.Google ScholarGoogle Scholar
  2. DU Mengyao WANG, Zheng, Ll Na, Dynamic Password Authentication Protocol for Wireless Body Area Network [J]. Computer Engineering and Applications, 2020, 56(14): 68-73.Google ScholarGoogle Scholar
  3. Li Xiaotian, Chen Jianhua. Research on security-enhanced three-factor multi-server authentication scheme with anonymity [J]. Application Research of Computers, 2020, 37(09): 2781-2788.Google ScholarGoogle Scholar
  4. WU wenfeng, ZHANG Wenfang, WANG Xiaomin, A Security Enhanced Train to Ground Wireless Communication Authentication Key Agreement Scheme for LTE-R [J]. Journal of the China Railway Society, 2019, 41(12): 66-74.Google ScholarGoogle Scholar
  5. Zuo L, Zhang M, Ding S, Identity authentication protocol with message recovery in microgrid SCADA system [J][J]. Grid Technology, 2019, 43(12): 4299-4306.Google ScholarGoogle Scholar
  6. ZHANG K, TU G, ZHANG C, Joint Virtual User Identification and Channel Security En/Decoding Method for Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2021, 43(2): 380-387.Google ScholarGoogle Scholar
  7. Liu J, Lai Y, Yang S, Bilateral authentication protocol for WSN and certification by strand space model[J]. Comput. Sci, 2019, 46(9): 169-17Google ScholarGoogle Scholar
  8. XU Han, Yu Changyong, SHl Jie. K-mer Counting Algorithm Based on Minimal Perfect Hash Function [J]. Journal of China Academy of Electronics and Information Technology, 2020,15(05):435-441.Google ScholarGoogle Scholar
  9. LIU Xiao, TANG Yong, ZHENG Fang, Research and Design of XOR-Hash Indexing for Shard instruction Cache [J]. Chinese Journal of Computers, 2019, 42(11): 2499-2511.Google ScholarGoogle Scholar
  10. Zhou Hanbing Li Mingwei Zhang Chuanyuan, A synchronized detect algorithm for AD9371 broadband burst communications [J]. Application of Electronic Technique, 2019, 45(12): 87-90.Google ScholarGoogle Scholar
  11. Liang Ji. Energy saving scheduling model of the constant frequency motor in active distribution network based on vector control [J]. Machine Design and Manufacturing Engineering. 2019, 48(10): 66-70.Google ScholarGoogle Scholar
  12. Qu H, Li X, Yang L, Multi-objective distribution network dynamic reconfiguration and DG control considering time variation of load and DG[J]. High. Volt. Eng, 2019, 45: 873-881.Google ScholarGoogle Scholar

Index Terms

  1. Design of identity authentication scheme in distribution network dispatching system based on dynamic password
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              ACAI '23: Proceedings of the 2023 6th International Conference on Algorithms, Computing and Artificial Intelligence
              December 2023
              371 pages
              ISBN:9798400709203
              DOI:10.1145/3639631

              Copyright © 2023 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 16 February 2024

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed limited

              Acceptance Rates

              Overall Acceptance Rate173of395submissions,44%
            • Article Metrics

              • Downloads (Last 12 months)4
              • Downloads (Last 6 weeks)2

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format