A Trusted Batch Authentication Mechanism Based on Tree for Power Internet of Things

Devices in power Internet of things need to be trusted measurement. However, the existing data processing architecture has problems such as excessive pressure in cloud platform, and the existing trusted measurement architecture also has problems such as low efficiency and excessive consumption. This...

Full description

Saved in:
Bibliographic Details
Main Authors: Baohua ZHAO, Zhihao WANG, Liandong CHEN, Chunhui REN, Fajiang YU, Qing XU
Format: Article
Language:zho
Published: State Grid Energy Research Institute 2022-05-01
Series:Zhongguo dianli
Subjects:
Online Access:https://www.electricpower.com.cn/CN/10.11930/j.issn.1004-9649.202101024
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Devices in power Internet of things need to be trusted measurement. However, the existing data processing architecture has problems such as excessive pressure in cloud platform, and the existing trusted measurement architecture also has problems such as low efficiency and excessive consumption. This paper proposed a trusted batch authentication mechanism based on unbalanced hash tree, which is suitable for power Internet of things based on cloud-edge collaborative. The edge computing architecture of cloud-edge collaboration is adopted to lighten the load of cloud platform. The device adopts a lightweight trusted architecture for trusted measurement to obtain measurement information. The structure of unbalanced hash tree generates less verification information during device verification and protects privacy. The sparse Merkel tree multiproofs method is used to generate the verification information to implement the batch authentication of devices. In this paper, the security threat analysis, prototype implementation and performance analysis are carried out. The experimental results show that this mechanism is better than Merkel hash tree in building the tree, and better than IMA linear structure in trusted authentication of devices. And in batch verification, it can greatly reduce the size of verification information.
ISSN:1004-9649