Abstract
Aiming at the security problem of the SCADA system introduced into cloud computing that lacks a credible identity authentication mechanism, this paper proposes a cloud computing-based SCADA system access point authentication scheme. In this scheme, a cloud service security access protocol for SCADA system is proposed. The protocol uses password based identity authentication technology to screen the identity of the terminal node, and effectively identifies the illegal access point by authenticating the access point. By this method, the user’s private information is prevented from being intercepted and tampered maliciously.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have