Hong Qiao, Kaiyi Wang, Yanbo Long, TanLong Huang, Xianyong Xu, Shuai Liu
{"title":"智能配电网络中基于音频特征识别的配置终端身份验证方法","authors":"Hong Qiao, Kaiyi Wang, Yanbo Long, TanLong Huang, Xianyong Xu, Shuai Liu","doi":"10.1088/1742-6596/2774/1/012027","DOIUrl":null,"url":null,"abstract":"\n A smart distribution network contains a large number of data acquisition terminals used to monitor the operation status of the distribution network and control the operation parameters, some of which are located in outdoor and other unsafe environments. If the attacker operates and configures the distribution network terminal by pretending to be a legitimate configuration device, it will become a springboard to infiltrate the main station of the internal network or misreport fault information, which may result in the leakage of sensitive data and even destroy the running state of the equipment. Identity authentication is the first line of defense to ensure the safe and stable operation of equipment. At present, the commonly used identity authentication technologies such as certificate authentication and key authentication have certain security vulnerabilities at different levels, which make it increasingly difficult to prevent the ever-changing network attack technology. According to the characteristics of physical unclonable facility (PUF), which is used to describe the hidden characteristics of the device and is directly related to the hardware, this paper proposes a method to authenticate the validity of the power distribution network configuration terminal based on the audio feature, which collects the frequency response characteristics of the hardware from the audio sensor of the configuration device as the identification information to identify the validity of the configuration device.","PeriodicalId":506941,"journal":{"name":"Journal of Physics: Conference Series","volume":"2002 8","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Identity Authentication Method Of Configuration Terminal Based On Audio Feature Recognition In Smart Distribution Network\",\"authors\":\"Hong Qiao, Kaiyi Wang, Yanbo Long, TanLong Huang, Xianyong Xu, Shuai Liu\",\"doi\":\"10.1088/1742-6596/2774/1/012027\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\n A smart distribution network contains a large number of data acquisition terminals used to monitor the operation status of the distribution network and control the operation parameters, some of which are located in outdoor and other unsafe environments. If the attacker operates and configures the distribution network terminal by pretending to be a legitimate configuration device, it will become a springboard to infiltrate the main station of the internal network or misreport fault information, which may result in the leakage of sensitive data and even destroy the running state of the equipment. Identity authentication is the first line of defense to ensure the safe and stable operation of equipment. At present, the commonly used identity authentication technologies such as certificate authentication and key authentication have certain security vulnerabilities at different levels, which make it increasingly difficult to prevent the ever-changing network attack technology. According to the characteristics of physical unclonable facility (PUF), which is used to describe the hidden characteristics of the device and is directly related to the hardware, this paper proposes a method to authenticate the validity of the power distribution network configuration terminal based on the audio feature, which collects the frequency response characteristics of the hardware from the audio sensor of the configuration device as the identification information to identify the validity of the configuration device.\",\"PeriodicalId\":506941,\"journal\":{\"name\":\"Journal of Physics: Conference Series\",\"volume\":\"2002 8\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Physics: Conference Series\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1088/1742-6596/2774/1/012027\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Physics: Conference Series","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1088/1742-6596/2774/1/012027","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Identity Authentication Method Of Configuration Terminal Based On Audio Feature Recognition In Smart Distribution Network
A smart distribution network contains a large number of data acquisition terminals used to monitor the operation status of the distribution network and control the operation parameters, some of which are located in outdoor and other unsafe environments. If the attacker operates and configures the distribution network terminal by pretending to be a legitimate configuration device, it will become a springboard to infiltrate the main station of the internal network or misreport fault information, which may result in the leakage of sensitive data and even destroy the running state of the equipment. Identity authentication is the first line of defense to ensure the safe and stable operation of equipment. At present, the commonly used identity authentication technologies such as certificate authentication and key authentication have certain security vulnerabilities at different levels, which make it increasingly difficult to prevent the ever-changing network attack technology. According to the characteristics of physical unclonable facility (PUF), which is used to describe the hidden characteristics of the device and is directly related to the hardware, this paper proposes a method to authenticate the validity of the power distribution network configuration terminal based on the audio feature, which collects the frequency response characteristics of the hardware from the audio sensor of the configuration device as the identification information to identify the validity of the configuration device.