Research on Power Terminal Access Control Technology Supporting Internet Interactive Service in Smart Grid

With the continuous development of smart grid interactive business applications, the existing terminal access mechanism is difficult to ensure that all types of power terminals access to power information network security. Based on the idea of trusted computing and trusted network connection, this paper proposes a power terminal security access architecture for power interactive business from terminal security access and access control, terminal encryption and content filtering, and establishes architecture of supporting for interaction business from Internet and terminal security access, enhances the external network interactive services and terminal access authentication and access control capabilities in order to improve the security of terminal access to protect the strength of the Internet to ensure interactive services and terminal access to the trustworthy.

[1]  Ronggong Song Advanced smart card based password authentication protocol , 2010, Comput. Stand. Interfaces.

[2]  Min-Shiang Hwang,et al.  A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..

[3]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[4]  Hung-Min Sun,et al.  An efficient remote use authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..

[5]  Wei-Kuan Shih,et al.  Security enhancement on an improvement on two remote user authentication schemes using smart cards , 2011, Future Gener. Comput. Syst..

[6]  Wei-Chi Ku,et al.  Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards , 2004, IEEE Transactions on Consumer Electronics.

[7]  Chin-Chen Chang,et al.  Enhanced authentication scheme with anonymity for roaming service in global mobility networks , 2009, Comput. Commun..

[8]  Nevenko Zunic,et al.  Methods for Protecting Password Transmission , 2000, Comput. Secur..

[9]  Hung-Yu Chien,et al.  An Efficient and Practical Solution to Remote Authentication: Smart Card , 2002, Comput. Secur..

[10]  Wu Tzong-Chen,et al.  Refereed paper: Authenticating passwords over an insecure channel , 1996 .

[11]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[12]  Eun-Jun Yoon,et al.  Further improvement of an efficient password based remote user authentication scheme using smart cards , 2004, IEEE Transactions on Consumer Electronics.

[13]  Xiaomin Wang,et al.  Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards , 2007, Comput. Stand. Interfaces.