Font Size: a A A

Research On Authentication And Access Control Method In Dispatching Automation System

Posted on:2013-03-28Degree:MasterType:Thesis
Country:ChinaCandidate:S G QiuFull Text:PDF
GTID:2232330395476180Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the dispatching and control brain of power system, power dispatching automation system is used to implement the on-line computer control and dispatching decisions, its role in the power system is increasingly significant. At present, China is vigorously carried out the construction of smart grid, intelligent dispatching is the inevitable trend of the development of smart grid, and the base of intelligent dispatching is power dispatching automation system. Therefore, we must strengthen identity authentication technology and access control mechanisms to protect the safety of power dispatching automation systemIn authentication, According to the problem of identity disguise in power dispatching automation system, a new two factor two-way authentication model was proposed in this paper. It combines the dynamic password authentication and fingerprint authentication technology, and it not only can implement two-way authentication between the user and the server authentication, but also can generate negotiation key used to encrypt the subsequent communication information after the end of the authentication, which can improve the security of system.In access control, According to the requests of access control in power dispatching automation system and the faults of role-based access control, a new model, role-based access control based on credibility, is proposed in this paper. It combines the user behavior trust with identity trust, capturing the user login implied information and using uncertain reasoning theory of artificial intelligence to calculate the use’s credibility, which participate in the user’s authorization. It set credibility active threshold to roles and permissions, and the user can not get their deserved permissions unless they have satisfied the credible active constraints for roles and permissions. It can realize flexible system delegation, ensure the user safely access to system resource and can well apply to existing power dispatching automation system.
Keywords/Search Tags:dispatching automation system, too-way authentication, RBAC, credibility
PDF Full Text Request
Related items