面向电力物联网的RFID认证方案
CSTR:
作者:
作者单位:

1.河南九域腾龙信息工程有限公司,郑州 450000;2.国网河南省电力公司信息通信分公司,郑州 450000;3.国网河南省电力公司电力科学研究院,郑州 450000

作者简介:

陈萌萌(1993—),女,硕士研究生,主要从事网络安全方向研究,(E-mail)2423772692@qq.com。

通讯作者:

中图分类号:

基金项目:

国家电网公司科技项目(521700250014-153-ZN)。


RFID authentication scheme for the electric power Internet of Things
Author:
Affiliation:

1.Henan Jiuyu Tenglong Information Engineering Co., Ltd., Zhengzhou 450000, P. R. China;2.State Grid Henan Information & Telecommunication Company, Zhengzhou 450000, P. R. China;3.State Grid Henan Electric Power Research Institute, Zhengzhou 450000, P. R. China

Fund Project:

Supported by Science and Technology Projects of State Grid Corporation of China(521700250014-153-ZN).

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    随着电力物联网技术的快速发展,建设能源互联网具有重大意义。电力物联终端设备的识别认证是保障能源互联网安全稳定运行的基础。为实现海量电力终端设备信息高效采集与安全认证,研究提出一种面向电力物联网的RFID(radio frequency identification)认证方案,该方案利用RFID技术,基于国密SM3和SM4设计算法,实现了阅读器与电力设备之间的相互认证,保障了电力通信数据的传输安全,降低设备标签的计算复杂度。安全性分析表明,该方案满足不可追踪性、抗重放攻击、抗去同步攻击、抗拒绝服务攻击等安全特性,BAN逻辑分析进一步表明该方案满足相互认证性。性能分析表明,该方案在标签计算量、存储量、通信量及数据库搜索效率方面具有较好的性能优势。

    Abstract:

    With the rapid advancement of electric power Internet of Things (EPIoT) technology, the development of a secure and efficient energy Internet has become increasingly important. Identification and authentication of electric power terminal devices are fundamental to ensuring the safe and stable operation of the energy Internet. To realize efficient data collection and secure authentication for a large number of terminal devices, this paper proposes an RFID-based authentication scheme for EPIoT. The scheme integrates RFID (radio frequency identification) technology with the national cryptographic algorithms SM3 and SM4, achieving mutual authentication between readers and terminal devices while ensuring secure transmission of power communication data and reducing computational overhead for device tags. Security analysis shows that the proposed scheme satisfies key security requirements, such as untraceability, resistance to replay attacks, de-synchronization attacks, and denial-of-service attacks. Further verification using BAN logic confirms the mutual authentication capability of the scheme, while performance analysis shows advantages in tag computation, storage, communication overhead, and database search efficiency.

    参考文献
    相似文献
    引证文献
引用本文

陈萌萌,伦迪,李鸣岩.面向电力物联网的RFID认证方案[J].重庆大学学报,2025,48(10):110-118.

复制
分享
相关视频

文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2024-02-29
  • 最后修改日期:
  • 录用日期:
  • 在线发布日期: 2025-10-20
  • 出版日期:
文章二维码