2020
DOI: 10.1088/1742-6596/1646/1/012060
|View full text |Cite
|
Sign up to set email alerts
|

Non-Crypto Authentication for Smart Grid Based on Edge Computing

Abstract: As a new computing architecture, edge computing has gradually penetrated into the smart grid and provide real time monitoring and control. However, as a new type of node arranged in the network, its own security protection has become an incredibly challenging task. Security authentication is the first line of defence for security protection. Due to its fast and light-weight characteristics, physical layer channel information access authentication technology for non-cryptographic packets is a potential identifi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…The security overflow probability of intelligent terminals increases with the decrease of overflow probability, which means that the ability to withstand eavesdropping is stronger at this time [21]. The time taken to upload the computing task to the edge server in this paper represents the uploading speed of the intelligent terminal, as shown in formula (3).…”
Section: Multireceiver Signcryption Without a Certificatementioning
confidence: 99%
See 1 more Smart Citation
“…The security overflow probability of intelligent terminals increases with the decrease of overflow probability, which means that the ability to withstand eavesdropping is stronger at this time [21]. The time taken to upload the computing task to the edge server in this paper represents the uploading speed of the intelligent terminal, as shown in formula (3).…”
Section: Multireceiver Signcryption Without a Certificatementioning
confidence: 99%
“…The optimization algorithm based on the genetic algorithm is combined with the resource management algorithm based on multibase station cooperation. Further considering the scenario of multiple intelligent terminals and a single edge server, how does the edge server choose intelligent terminals to provide computing services with limited energy resources [3]? Aiming at the abovementioned problems, this paper proposes an accurate and effective algorithm to find the optimal intelligent terminal selection scheme and a large number of simulation results prove the accuracy of the proposed algorithm [4].…”
Section: Introductionmentioning
confidence: 99%
“…The authentication system becomes an important part and the first line of defense when an unauthorized party tries accessing data or a device [1]. Today's most popular authentication method is using a numeric password [2] because users do not need to incur additional costs, and it is easy to remember.…”
Section: Introductionmentioning
confidence: 99%