Abstract
To solve the problem of data loss and malicious tampering caused by IoT devices without security verification during the implementation of smart grid projects, this paper utilizes the distributed ledger and non-tampering characteristics of blockchain technology to ensure the security of the stored data and to solve the problem of data reliability before winding. We design a hardware module based on the Ed25519 signature protocol combined with identity authentication technology to provide the identity key for IoT devices. By combining the two solutions, we can effectively solve the data security problems in the implementation of smart grid projects.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang, Q., Wang, Y.G.: Research on power Internet of Things architecture for smart grid demand. In: 2018 2nd IEEE Conference on Energy Internet and Energy System Integration (EI2). IEEE (2018)
Sun, Q.: Energy Internet and We-Energy. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-0523-8
Lim, Y.H., Hashim, H., Poo, N., Poo, D.C.C., Nguyen, H.D.: Blockchain technologies in E-commerce: social shopping and loyalty program applications. In: Meiselwitz, G. (ed.) HCII 2019. LNCS, vol. 11579, pp. 403–416. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-21905-5_31
Wu, B., Tingting, D.: The application of blockchain technology in financial markets. J. Phys. Conf. Ser. 1176(4), 042094 (2019). IOP Publishing
Zhang, Y., Wen, J.: The IoT electric business model: using blockchain technology for the internet of things. Peer-to-Peer Netw. Appl. 10(4), 983–994 (2016). https://doi.org/10.1007/s12083-016-0456-1
Li, D., et al.: A blockchain-based authentication and security mechanism for IoT. In: 2018 27th International Conference on Computer Communication and Networks (ICCCN). IEEE (2018)
Huang, J.C., Shu, M.H., Hsu, B.M., et al.: Service architecture of IoT terminal connection based on blockchain identity authentication system. Comput. Commun. 160, 411–422 (2020)
Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. Manubot (2019)
Haber, S., Scott , W.: How to time-stamp a digital document. J. Cryptol. 3, 99–111 (1991)
Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media Inc., Newton (2015)
Zyskind, G, Nathan, O.: Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE Security and Privacy Workshops, pp. 180–184. IEEE (2015)
Stoft, S.: 1. The Double-Payment Conundrum of Order 745 (2011)
Watanabe, H., Fujimura, S., Nakadaira, A., et al.: Blockchain contract: a complete consensus using blockchain. In: 2015 IEEE 4th global conference on consumer electronics (GCCE), pp. 577–578. IEEE (2015)
Bernstein, D.J., et al.: EdDSA for more curves. Cryptology ePrint Archive 2015 (2015)
Bernstein, D.J., et al.: High-speed high-security signatures. J. Crypt. Eng. 2(2), 77–89 (2012)
Bernstein, D.J.: Curve25519: new Diffie-Hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207–228. Springer, Heidelberg (2006). https://doi.org/10.1007/11745853_14
Joux, A.: A one round protocol for tripartite Diffie–Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385–393. Springer, Heidelberg (2000). https://doi.org/10.1007/10722028_23
Lamport, L.: Password authentication with insecure communication. Commun. ACM 24, 770–772 (1981)
Tao, F., Liang, Y.X.: Provably secure certificate less blind proxy re-signatures. J. Commun. 33(Z1), 58 (2012)
Zhang, Y., Jiguo, L., Yuan, H.: Certificateless proxy signature scheme. Nanjing Xinxi Gongcheng Daxue Xuebao 9(5), 490–496
Xiong, H.: Cost-effective scalable and anonymous certificateless remote authentication protocol. IEEE Trans. Inf. Forensics Secur. 9(12), 2327–2339 (2014)
Acknowledgment
This work was supported by Research Funds of State Grid Shaanxi Electric Power Company and State Grid Shaanxi Information and Telecommunication Company (contract no. SGSNXT00GCJS2000104).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Guo, Y. et al. (2021). Blockchain Based Trusted Identity Authentication in Ubiquitous Power Internet of Things. In: Huang, DS., Jo, KH., Li, J., Gribova, V., Hussain, A. (eds) Intelligent Computing Theories and Application. ICIC 2021. Lecture Notes in Computer Science(), vol 12837. Springer, Cham. https://doi.org/10.1007/978-3-030-84529-2_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-84529-2_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-84528-5
Online ISBN: 978-3-030-84529-2
eBook Packages: Computer ScienceComputer Science (R0)