Employing PKI to Secure Smart Grid CommunicationIn this subsection, we dịch - Employing PKI to Secure Smart Grid CommunicationIn this subsection, we Việt làm thế nào để nói

Employing PKI to Secure Smart Grid

Employing PKI to Secure Smart Grid Communication
In this subsection, we argue that PKI is a potential mechanism
for securing smart grid communication as it can meet most
security requirements of smart grid communication networks.
As shown in Fig. 2, security requirements of entity authen-
tication and non-repudiation can be satisfied by employing
digital signatures. A PKI binds the public keys and the entities’
identities through the use of digital certificates. The binding
is established through a registration process, and after a
trust
authority (TA) (consisting of the registration authority,
certificate
authority and validation authority) assures the correctness
of the binding, the TA issues the certificate to the
entity.
Since the public key of each entity is made available to
all
other entities in the network, entity authentication can be
achieved.
The simplest form of a certificate consists of the following
contents: Cert
j
= {id
j
, PK
,
{SIG
SK
TA
{h(id
j
|| PK
j
|| ExpT)}}, where id
denotes entity j’s
identity, PK
j
j
represents the public key of entity j , ExpT
denotes certificate expiry time, SK
denotes the private key
of TA and SIG
SK
TA
{h(id
j
|| PK
j
TA
|| ExpT)} is a signature over
h(id
j
|| PK
j
|| ExpT) based on SK
. Here, h(.) indicates hash
function operation. Thus, any entity can sign any outgoing
TA
j
, Exp
T
message using its unique private key. An outgoing
message is then transmitted as {M,
SIG
SK
j
{h(id
j
|| M)}, Cert
}, where M denotes
the outgoing message and SK
j
denotes the private
key of entity j.
Of course, timestamps
should
be included in Mto
prevent the replay
attack.
When it is received, the receiver verifies
the signature of the sender using its public
key. Upon successful verification, the
identity
of the sender is confirmed and it can
also
be concluded that the message content
has
not been altered. In other words, entity
authentication
and non-repudiation are
achieved.
In addition, conditional privacy can
be
preserved using anonymous certificates, as
they
do not contain the identity information
of
their holders. In this case, when necessary,
the
identity of the holder of an anonymous
certificate
can only be revealed by a TA.
0/5000
Từ: -
Sang: -
Kết quả (Việt) 1: [Sao chép]
Sao chép!
Employing PKI to Secure Smart Grid CommunicationIn this subsection, we argue that PKI is a potential mechanismfor securing smart grid communication as it can meet mostsecurity requirements of smart grid communication networks.As shown in Fig. 2, security requirements of entity authen-tication and non-repudiation can be satisfied by employingdigital signatures. A PKI binds the public keys and the entities’identities through the use of digital certificates. The bindingis established through a registration process, and after atrustauthority (TA) (consisting of the registration authority,certificateauthority and validation authority) assures the correctnessof the binding, the TA issues the certificate to theentity.Since the public key of each entity is made available toallother entities in the network, entity authentication can beachieved.The simplest form of a certificate consists of the followingcontents: Certj= {idj, PK,{SIGSKTA{h(idj|| PKj|| ExpT)}}, where iddenotes entity j’sidentity, PKjjrepresents the public key of entity j , ExpTdenotes certificate expiry time, SKdenotes the private keyof TA and SIGSKTA{h(idj|| PKjTA|| ExpT)} is a signature overh(idj|| PKj|| ExpT) based on SK. Here, h(.) indicates hashfunction operation. Thus, any entity can sign any outgoingTAj, ExpTmessage using its unique private key. An outgoingmessage is then transmitted as {M,SIGSKj{h(idj|| M)}, Cert}, where M denotesthe outgoing message and SKjdenotes the privatekey of entity j.Of course, timestampsshouldbe included in Mtoprevent the replayattack.When it is received, the receiver verifiesthe signature of the sender using its publickey. Upon successful verification, theidentityof the sender is confirmed and it canalsobe concluded that the message contenthasnot been altered. In other words, entityauthenticationand non-repudiation areachieved.In addition, conditional privacy canbepreserved using anonymous certificates, astheydo not contain the identity informationoftheir holders. In this case, when necessary,theidentity of the holder of an anonymouscertificatecan only be revealed by a TA.
đang được dịch, vui lòng đợi..
 
Các ngôn ngữ khác
Hỗ trợ công cụ dịch thuật: Albania, Amharic, Anh, Armenia, Azerbaijan, Ba Lan, Ba Tư, Bantu, Basque, Belarus, Bengal, Bosnia, Bulgaria, Bồ Đào Nha, Catalan, Cebuano, Chichewa, Corsi, Creole (Haiti), Croatia, Do Thái, Estonia, Filipino, Frisia, Gael Scotland, Galicia, George, Gujarat, Hausa, Hawaii, Hindi, Hmong, Hungary, Hy Lạp, Hà Lan, Hà Lan (Nam Phi), Hàn, Iceland, Igbo, Ireland, Java, Kannada, Kazakh, Khmer, Kinyarwanda, Klingon, Kurd, Kyrgyz, Latinh, Latvia, Litva, Luxembourg, Lào, Macedonia, Malagasy, Malayalam, Malta, Maori, Marathi, Myanmar, Mã Lai, Mông Cổ, Na Uy, Nepal, Nga, Nhật, Odia (Oriya), Pashto, Pháp, Phát hiện ngôn ngữ, Phần Lan, Punjab, Quốc tế ngữ, Rumani, Samoa, Serbia, Sesotho, Shona, Sindhi, Sinhala, Slovak, Slovenia, Somali, Sunda, Swahili, Séc, Tajik, Tamil, Tatar, Telugu, Thái, Thổ Nhĩ Kỳ, Thụy Điển, Tiếng Indonesia, Tiếng Ý, Trung, Trung (Phồn thể), Turkmen, Tây Ban Nha, Ukraina, Urdu, Uyghur, Uzbek, Việt, Xứ Wales, Yiddish, Yoruba, Zulu, Đan Mạch, Đức, Ả Rập, dịch ngôn ngữ.

Copyright ©2025 I Love Translation. All reserved.

E-mail: