Electric Power ›› 2022, Vol. 55 ›› Issue (5): 149-157.DOI: 10.11930/j.issn.1004-9649.202101024

• Information and Communication • Previous Articles     Next Articles

A Trusted Batch Authentication Mechanism Based on Tree for Power Internet of Things

ZHAO Baohua1,2,3, WANG Zhihao2,3, CHEN Liandong4, REN Chunhui2,3, YU Fajiang5, XU Qing5   

  1. 1. School of Computer Science,Beijing University of Technology, Beijing 100124,China;
    2. State Grid Smart Grid Research Institute Co., Ltd.,Beijing 102209,China;
    3. Artificial Intelligence on Electric Power System State Grid Corporation Joint Laboratory (State Grid Smart Grid Research Institute Co.,Ltd.), Beijing 102209,China;
    4. State Grid Hebei Information & Telecommunication Branch, Shijiazhuang 050021, China;
    5. School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
  • Received:2021-01-05 Revised:2021-12-01 Online:2022-05-28 Published:2022-05-18
  • Supported by:
    This work is supported by the Science and Technology Project of SGCC (Research on the Application of Key Technologies for the Security of Basic Software and Hardware of the Internet of Things Based on Trusted Computing, No.5700-202013190A-0-0-00)

Abstract: Devices in power Internet of things need to be trusted measurement. However, the existing data processing architecture has problems such as excessive pressure in cloud platform, and the existing trusted measurement architecture also has problems such as low efficiency and excessive consumption. This paper proposed a trusted batch authentication mechanism based on unbalanced hash tree, which is suitable for power Internet of things based on cloud-edge collaborative. The edge computing architecture of cloud-edge collaboration is adopted to lighten the load of cloud platform. The device adopts a lightweight trusted architecture for trusted measurement to obtain measurement information. The structure of unbalanced hash tree generates less verification information during device verification and protects privacy. The sparse Merkel tree multiproofs method is used to generate the verification information to implement the batch authentication of devices. In this paper, the security threat analysis, prototype implementation and performance analysis are carried out. The experimental results show that this mechanism is better than Merkel hash tree in building the tree, and better than IMA linear structure in trusted authentication of devices. And in batch verification, it can greatly reduce the size of verification information.

Key words: power Internet of things, cloud-edge collaboration, trusted measurement, unbalanced hash tree, batch authentication