中国电力 ›› 2023, Vol. 56 ›› Issue (4): 88-94.DOI: 10.11930/j.issn.1004-9649.202204082

• 面向数字配电网的边缘计算与控制技术 • 上一篇    下一篇

面向边缘计算的电力终端轻量级认证协议

杨晋祥1, 彭勇刚1, 蔡田田2, 习伟2, 邓清唐2   

  1. 1. 浙江大学 电气工程学院, 浙江 杭州 310027;
    2. 南方电网数字电网研究院有限公司, 广东 广州 510640
  • 收稿日期:2021-04-19 修回日期:2023-03-13 出版日期:2023-04-28 发布日期:2023-04-26
  • 作者简介:杨晋祥(1997-),男,硕士研究生,从事配电网终端安全接入研究,E-mail:yjxmail@zju.edu.cn;彭勇刚(1978-),男,通信作者,博士,教授,从事分布式发电、智能电网等研究,E-mail:pengyg@zju.edu.cn
  • 基金资助:
    国家重点研发计划资助项目(2020YFB0906000)。

Power Terminal Lightweight Authentication Protocol for Edge Computing

YANG Jinxiang1, PENG Yonggang1, CAI Tiantian2, XI Wei2, DENG Qingtang2   

  1. 1. College of Electrical Engineering, Zhejiang University, Hangzhou 310027, China;
    2. Digital Grid Research Institute, CSG, Guangzhou 510640, China
  • Received:2021-04-19 Revised:2023-03-13 Online:2023-04-28 Published:2023-04-26
  • Supported by:
    This work is supported by the National Key Research and Development Program of China (No.2020YFB0906000).

摘要: 边缘计算有效缓解了云平台的计算压力,降低网络带宽消耗,但也带来了新的安全问题,传统的认证机制不再适用于“云边端”网络架构,对此提出一种轻量级云边协同的双向身份认证协议,针对海量资源受限的电力终端,仅基于哈希与异或操作实现认证,减轻终端计算压力与带宽传输压力。利用安全协议与应用自动化验证工具(automated validation of internet security protocols and applications,AVISPA)以及安全特性分析验证协议的安全性,分析和仿真结果表明:所提协议可以抵抗重放攻击和仿冒攻击等,与同类型协议相比,具有更小的计算和通信开销。

关键词: 边缘计算, 电力终端, 双向认证, 轻量级

Abstract: Edge computing effectively relieves the computing pressure of cloud platform and reduces the consumption of network transmission bandwidth, but it brings new security problems as well, the traditional authentication mechanism no longer applies to “cloud-edge-end” network architecture. We proposed a lightweight two-way authentication protocol based on cloud-edge collaboration. In view of the limited resources of massive power terminal, the protocol is only based on a Hash and XOR operation to achieve certification, so it reduces the pressure of terminal calculation and transmission bandwidth. Its security was successfully verified by AVISPA tool together with informal analysis. The analysis and simulation results show that the protocol can resist replay attack, impersonation attack and so on. In addition, the comparison with similar protocols shows that the protocol has less computation and communication overhead.

Key words: edge computing, electrical terminal, mutual authentication, lightweight