As a new computing architecture, edge computing has gradually penetrated into the smart grid and provide real time monitoring and control. However, as a new type of node arranged in the network, its own security protection has become an incredibly challenging task. Security authentication is the first line of defence for security protection. Due to its fast and light-weight characteristics, physical layer channel information access authentication technology for non-cryptographic packets is a potential identification method for the smart grid terminal access under the edge computing system, in which the real time response is incredibly important. This paper aims to investigate the physical layer authentication method compared with the traditional upper layer authentication technology, and an authentication scheme suitable for smart grid is proposed.
The early Poisson distribution and Markov autoregressive models can no longer reflect the characteristics of smart grid business flow. The long correlation characteristics of burst flow are simulated by the heavy tail ON/OFF model with multi-source convergence, while the Poisson model with short correlation and no memory is used for random flow. The simulation results show that the synthesized flow is still has a certain statistical self-similarity, and the coefficient H decreases after synthesis.That the long correlation and burst of self-similar business flows will not be smoothed by the convergence and synthesis of the self-similar business flows with short correlation services. In the actual operation process, the station-level power grid will result in load aggravation and significantly affect the network performance when it acts in response to faults. Therefore, it is necessary to consider the changes of network performance under different burst degrees.
Aiming at the problems of low concealment of existing storage-type covert channels, high bit error rate, and low transmission rate of time-type covert channels, this paper proposes a method of constructing covert channels based on HTTP protocol combination. The method simulates browser application to send HTTP requests, dynamically distributes HTTP requests to different browsers, embeds hidden information by mathematical combination, and dynamically adjusts access objects, data packet time interval, and data packet length, thus improving the concealment of the channel. At the same time, the channel is based on the reliable transmission inside TCP protocol so that it is not affected by network jitter, thus ensuring the reliability of the channel. Experimental results show that this method can resist the detection method based on application signature, protocol fingerprint detection method, and combination model detection method, and has strong concealment. It can adjust the concealment and channel capacity according to the application scenario.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.