Hong Qiao, Kaiyi Wang, Yanbo Long, TanLong Huang, Xianyong Xu, Shuai Liu
{"title":"An Identity Authentication Method Of Configuration Terminal Based On Audio Feature Recognition In Smart Distribution Network","authors":"Hong Qiao, Kaiyi Wang, Yanbo Long, TanLong Huang, Xianyong Xu, Shuai Liu","doi":"10.1088/1742-6596/2774/1/012027","DOIUrl":null,"url":null,"abstract":"\n A smart distribution network contains a large number of data acquisition terminals used to monitor the operation status of the distribution network and control the operation parameters, some of which are located in outdoor and other unsafe environments. If the attacker operates and configures the distribution network terminal by pretending to be a legitimate configuration device, it will become a springboard to infiltrate the main station of the internal network or misreport fault information, which may result in the leakage of sensitive data and even destroy the running state of the equipment. Identity authentication is the first line of defense to ensure the safe and stable operation of equipment. At present, the commonly used identity authentication technologies such as certificate authentication and key authentication have certain security vulnerabilities at different levels, which make it increasingly difficult to prevent the ever-changing network attack technology. According to the characteristics of physical unclonable facility (PUF), which is used to describe the hidden characteristics of the device and is directly related to the hardware, this paper proposes a method to authenticate the validity of the power distribution network configuration terminal based on the audio feature, which collects the frequency response characteristics of the hardware from the audio sensor of the configuration device as the identification information to identify the validity of the configuration device.","PeriodicalId":506941,"journal":{"name":"Journal of Physics: Conference Series","volume":"2002 8","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Physics: Conference Series","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1088/1742-6596/2774/1/012027","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A smart distribution network contains a large number of data acquisition terminals used to monitor the operation status of the distribution network and control the operation parameters, some of which are located in outdoor and other unsafe environments. If the attacker operates and configures the distribution network terminal by pretending to be a legitimate configuration device, it will become a springboard to infiltrate the main station of the internal network or misreport fault information, which may result in the leakage of sensitive data and even destroy the running state of the equipment. Identity authentication is the first line of defense to ensure the safe and stable operation of equipment. At present, the commonly used identity authentication technologies such as certificate authentication and key authentication have certain security vulnerabilities at different levels, which make it increasingly difficult to prevent the ever-changing network attack technology. According to the characteristics of physical unclonable facility (PUF), which is used to describe the hidden characteristics of the device and is directly related to the hardware, this paper proposes a method to authenticate the validity of the power distribution network configuration terminal based on the audio feature, which collects the frequency response characteristics of the hardware from the audio sensor of the configuration device as the identification information to identify the validity of the configuration device.