An IoT-based 5G power business user identity encryption and authentication system
Author:
Affiliation:

Power Dispatching and Control Center,China Southern Power Grid,Guangzhou Guangdong 510670,China

Funding:

Ethical statement:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
    Abstract:

    In response to the issue of poor authentication effectiveness in traditional encryption and authentication systems, an Internet of Things(IoT)-based 5G power business user identity encryption and authentication system is proposed. In terms of hardware, an encryption chip, a communicator, and an identity recognizer are designed. On the software side, leveraging the information transmission model of the Internet of Things, the identity information of power business users are input to ensure the integrity of the identity information. Using cryptographic Hash function, the Hash values of different data information are calculated to encrypt the user identity information. The authentication of the encrypted user identity is completed through the authentication code generated by the terminal device. Through the above hardware and software designs, the 5G power business user identity encryption and authentication system is completed. In simulation experiments, compared with previous 5G power business user identity encryption and authentication systems, the proposed IoT-based 5G power business user identity encryption and authentication system has an average memory leak value of 32 MB, with better authentication performance and greater application value.

    Reference
    Related
    Cited by
Get Citation

曹扬,苏扬,陶文伟,张富川,张国翊.基于物联网的5G电力业务用户身份加密认证系统[J]. Journal of Terahertz Science and Electronic Information Technology ,2025,23(4):423~428

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
History
  • Received:November 05,2023
  • Revised:December 14,2023
  • Adopted:
  • Online: May 07,2025
  • Published: