z-logo
open-access-imgOpen Access
RETRACTED: Access Point Authentication Scheme of SCADA System Based on Cloud Computing Technology
Author(s) -
Jian Shen,
Jun Xu,
Kai-Yuan Cai,
Ji Yan
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1748/2/022010
Subject(s) - scada , cloud computing , computer science , computer security , authentication (law) , computer network , scheme (mathematics) , authentication protocol , password , identity (music) , protocol (science) , operating system , engineering , mathematical analysis , physics , mathematics , acoustics , electrical engineering , medicine , alternative medicine , pathology
Aiming at the security problem of the SCADA system introduced into cloud computing that lacks a credible identity authentication mechanism, this paper proposes a cloud computing-based SCADA system access point authentication scheme. In this scheme, a cloud service security access protocol for SCADA system is proposed. The protocol uses password based identity authentication technology to screen the identity of the terminal node, and effectively identifies the illegal access point by authenticating the access point. By this method, the user’s private information is prevented from being intercepted and tampered maliciously.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here