Fan He, Z. Ang, Qingqin Fu, Guanglun Yang, Pingjiang Xu, Jia Liu, Ling Yi, Changsheng Niu, Jiankui Liu, Yuqiang Jiang
{"title":"A new security authentication method for master station and terminal","authors":"Fan He, Z. Ang, Qingqin Fu, Guanglun Yang, Pingjiang Xu, Jia Liu, Ling Yi, Changsheng Niu, Jiankui Liu, Yuqiang Jiang","doi":"10.1109/ICEI52466.2021.00029","DOIUrl":null,"url":null,"abstract":"This paper analyzes the shortcomings of the traditional master station and terminal security authentication method, and proposes a new security authentication method for the master station and the terminal. This method uses a combination of session initialization and recovery, and session negotiation instructions to complete security authentication. The user can optionally execute the corresponding application instruction according to the actual application, thereby improving the security of the authentication and the randomness of the session key of the subsequent business operation.","PeriodicalId":113203,"journal":{"name":"2021 IEEE International Conference on Energy Internet (ICEI)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Energy Internet (ICEI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEI52466.2021.00029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper analyzes the shortcomings of the traditional master station and terminal security authentication method, and proposes a new security authentication method for the master station and the terminal. This method uses a combination of session initialization and recovery, and session negotiation instructions to complete security authentication. The user can optionally execute the corresponding application instruction according to the actual application, thereby improving the security of the authentication and the randomness of the session key of the subsequent business operation.