Authentication Algorithm Based on Grid Environment
نویسندگان
چکیده
We propose the encryption and decryption algorithm to produce authenticator. In local execute grid node, we use this authenticator to build user information data base and do authentication application. In supervisor grid node, we use the authenticator to build remote user information data base and do authentication application. When these algorithms install in all grid nodes, we can run authentication in all system more secure and effective. Key-Words: Authentication; Decryption; Encryption,
منابع مشابه
An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملDynamic Replication based on Firefly Algorithm in Data Grid
In data grid, using reservation is accepted to provide scheduling and service quality. Users need to have an access to the stored data in geographical environment, which can be solved by using replication, and an action taken to reach certainty. As a result, users are directed toward the nearest version to access information. The most important point is to know in which sites and distributed sy...
متن کاملVery Fast Load Flow Calculation Using Fast-Decoupled Reactive Power Compensation Method for Radial Active Distribution Networks in Smart Grid Environment Based on Zooming Algorithm
Distribution load flow (DLF) calculation is one of the most important tools in distribution networks. DLF tools must be able to perform fast calculations in real-time studies at the presence of distributed generators (DGs) in a smart grid environment even in conditions of change in the network topology. In this paper, a new method for DLF in radial active distribution networks is proposed. The ...
متن کاملModification on Kerberos Authentication Protocol in Grid Computing Environment
The Kerberos is applied widely in OS and grid computing environment. The Kerberos system isn’t secure enough for symmetrical encryption. The paper describes a method that transform symmetrical key into asymmetric encryption on the basis of keeping symmetrical key of one side changeless. The algorithm strengthens the security of Kerberos protocol through proofing.
متن کاملIoT Based Load Management of a Micro-Grid Using Arduino and HMAS
This paper aims to establish an Arduino and IoT-based Hierarchical Multi-Agent System (HMAS) for management of loads’ side with incentive approach in a micro-grid. In this study, the performance of the proposed algorithm in a micro-grid has been verified. The micro-grid contains a battery energy storage system (BESS) and different types of loads known as residential consumer (RC), commercial co...
متن کامل