| In the current era,digitalization,informatization and intelligence have gradually become the general trend of national economic and social development.In March 2019,Premier Li Keqiang stressed in the report on the work of the government that it is necessary to comprehensively promote the construction of "Internet+" and use new technologies and models to transform traditional industries.Nowadays,a new generation of information technology is in the ascendant,and the reform of power companies is booming.The accelerated integration of the Internet and traditional industries has become an irreversible trend.State Grid Co.,Ltd.actively follows this trend and proposes the strategic goal of building the Ubiquitous Electric Power Internet of Things,accelerates the transformation and upgrading of traditional businesses,and at the same time leverages the advantages of grid companies to fully utilize advanced technologies such as artificial intelligence,big data,and blockchain to achieve energy connectivity,smart services and efficient and convenient resource allocation.The thesis starts with the perceptual layer of the ubiquitous electric power Internet of Things,studies the domestic CPK(Combined Public Key)key generation algorithm in China,analyzes its collusion problem in detail,proposes a solution different from previous research,and applies it to the identity authentication and access control of the perception layer.It aims to secure the Ubiquitous Electricity Internet of Things.First,the thesis introduced the construction and security system of the ubiquitous electric power Internet of Things at the current stage briefly.explained elliptic curve cryptography and common authentication technologies briefly,and then introduced the CPK key algorithm with independent intellectual property rights in China,and made a detailed analysis of multiple versions of CPK,key generation process and deficiencies in detail.Next,the thesis analyzes the collusion problem of the CPK algorithm,and points out that its existence forms are divided into three types:linear collusion attack,selective collusion attack,and random collusion attack.From the perspective of theoretical analysis,this thesis presents a solution to the collusion attack problem,namely the ICPK key algorithm.This algorithm adds a random coefficient matrix during the key generation process,and combines the original matrix with the random coefficient matrix.It is designed to resist linear collusion attacks and selective collusion attacks,and to a certain extent increase the difficulty of random collusion attacks.Finally,the thesis applies the above algorithm to the identity authentication of the perception layer.Aiming at the characteristics of a large number of terminals,a variety of types,low security,and a complex hierarchy in the perception layer,the architecture of the identity authentication system is designed.The terminal identity authentication and registration scheme and the server identity authentication scheme based on ICPK are proposed,and simulation experiments prove that it can effectively protect the access security of Ubiquitous Electric Power IoT devices.This article also designs a multi-level access control authorization model based on ICPK,theoretically introduces the model construction process,and does an analysis from the perspective of security and efficiency. |