计算机科学 ›› 2020, Vol. 47 ›› Issue (6A): 360-363.doi: 10.11896/JsJkx.191000114

• 信息安全 • 上一篇    下一篇

工业互联网网络传输安全问题研究

伍育红1, 胡向东2   

  1. 1 重庆邮电大学计算机科学与技术学院 重庆400065;
    2 重庆邮电大学自动化学院 重庆 400065
  • 发布日期:2020-07-07
  • 通讯作者: 伍育红(753006330@qq.com)

Study on Security of Industrial Internet Network Transmission

WU Yu-hong1 and HU Xiang-dong2   

  1. 1 School of Computer Science and Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,China
    2 School of Automation,Chongqing University of Posts and Telecommunications,Chongqing 400065,China
  • Published:2020-07-07
  • About author:WU Yu-hong, born in 1981, Ph. D, associate professor.Her main research interests include internet of things, industrial internet security and big data, etc.

摘要: 工业互联网数据要实现互联互通必将依赖网络传输,对工业互联网而言网络传输的安全问题至关重要,应配备信息传输过程中的安全机制,应在传输两端主体身份鉴别和认证、传输数据加密、传输链路节点身份鉴别和认证方面进行安全控制。文中就工业互联网的有线传输介质与无线传输介质涉及的安全风险提出了相应的规避措施,并就数据在传输过程中如何加密及如何选择密码算法进行了深入透彻的分析,提出了多因素认证办法,并就网络传输的其他各环节提出了相应的对策。

关键词: 多因素认证, 加密算法, 密钥管理, 身份鉴别, 网络传输

Abstract: Industrial Internet data must rely on network transmission for interoperability,and the security of network transmission is crucial for industrial Internet.It should be equipped with security mechanisms in the process of information transmission.Security control should be carried out in identity authentication of the subJect at both ends of the transmission,data encryption of the transmission,and transmission link node identification and authentication.This paper proposes corresponding measures to avoid the security risks involved in wired transmission medium and wireless transmission media of industrial Internet,and makes a thorough analysis on how to encrypt the data during transmission and how to choose cryptographic algorithms.It also puts forward the corresponding countermeasures for other aspects of network transmission.

Key words: Encryption algorithm, Identity authentication, Key management, Multi-factor authentication, Network transmission

中图分类号: 

  • TP406
[1] 卢坦,林涛,梁颂.美国工控安全保障体系研究及启示.保密科学技术,2018(4):24-33.
[2] 周剑,肖琳琳.工业互联网平台发展现状、趋势与对策.智慧制造,2017(12):56-58.
[3] 迈克尔?布雷迪,内德?考尔德,等.企业的工业互联网平台战略.上海质量,2017(5):15-18.
[4] 李海花.各国强化工业互联网战略,标准化成重要切入点.世界电信,2015(7):24-27.
[5] 陈泓汲,罗璎珞.互联网+网络安全新特性与发展建议.互联网天地,2015(10):1-4.
[6] 王峰.工业互联网平台分类研究.电信技术,2017(10):7-10.
[7] Industrial Internet Consortium (IIC).Volume G1:Reference Architecture.8,2015.
[8] Industrial Internet Consortium (IIC),Volume G5:Connec-tivity Framework,v1.8.8,2016.
[9] IEC61158-4 Industrial Communication Networks-Fieldbus Speci-fications.
[10] IEC61784-2 Industrial Communication Networks- Profiles-Part 2:Additional Fieldbus Profiles for Real- time Networks Based on ISO/IEC 8802-3.
[11] WU Yu-hong,born in 1981,Ph.D,associate professor.Her main research interests include internet of things,industrial internet security and big data,etc.
[1] 宗思洁, 覃天, 贺龙兵.
面向IOT芯片的安全启动算法分析与应用
Analysis and Application of Secure Boot Algorithm Based on IOT Chip
计算机科学, 2021, 48(11A): 552-556. https://doi.org/10.11896/jsjkx.210300237
[2] 刘俊, 李泽昊, 苏国宇, 李婧雯.
保留格式加密技术在民航信息系统数据处理中的应用研究
Application of Reserved Format Encryption Technology in InformationProcessing of Civil Aviation Information System
计算机科学, 2019, 46(6A): 571-576.
[3] 陈少华,樊晓光,丛伟,黄金科,孙贤明.
基于网格的Ad Hoc网络签密算法及应用
Grid-based Identity Signcryption Algorithm and Application in Ad Hoc Network
计算机科学, 2017, 44(6): 168-173. https://doi.org/10.11896/j.issn.1002-137X.2017.06.028
[4] 杨璐,叶晓俊.
云服务环境下的密钥管理问题和挑战
Key Management Issues and Challenges in Cloud
计算机科学, 2017, 44(3): 3-9. https://doi.org/10.11896/j.issn.1002-137X.2017.03.002
[5] 王刚,孙良旭,曾子维,杨丹.
一种非对等无线传感器网络环境中安全高效的混合密钥管理机制
Secure and Efficient Hybrid Key Management Mechanism in Heterogeneous WSN
计算机科学, 2016, 43(7): 153-156. https://doi.org/10.11896/j.issn.1002-137X.2016.07.027
[6] 成茂才,徐开勇.
基于可信计算平台的审计日志安全存储系统
Audit Log Secure Storage System Based on Trusted Computing Platform
计算机科学, 2016, 43(6): 146-151. https://doi.org/10.11896/j.issn.1002-137X.2016.06.030
[7] 牛文生,李亚晖,郭鹏.
面向无人装置协同操作的安全认证协议
Authentication Protocol for Cooperation of Unmanned Vehicles
计算机科学, 2016, 43(1): 178-180. https://doi.org/10.11896/j.issn.1002-137X.2016.01.040
[8] 周健,孙丽艳.
独立群密钥更新模型研究
Research on Independence Rekey Model for Group Key Management
计算机科学, 2015, 42(8): 190-193.
[9] 潘中强,常新峰.
数据储存式无线传感器网络下一个具有高效能的密钥管理方案
Efficient Key Management Scheme for Data-centric Storage Wireless Sensor Networks
计算机科学, 2014, 41(Z11): 277-281.
[10] 徐旸, 周薇, 杜秋双, 王国军.
基于多叉树的多权限群组密钥管理
Multiway Tree-based Group Key Management Scheme for Multi-privileged Group Communications
计算机科学, 2014, 41(5): 41-45. https://doi.org/10.11896/j.issn.1002-137X.2014.05.009
[11] 王晓东,王腾飞,胡彬彬,蒋刚毅,章联军.
编码端帧级立体视频传输失真模型
Frame-level Stereoscopic Video Transmission Distortion Model at Encoder
计算机科学, 2014, 41(10): 160-163. https://doi.org/10.11896/j.issn.1002-137X.2014.10.036
[12] 孙凌,田源.
普适计算环境中基于身份的密钥管理方案
Identity-based Key Management Scheme in Pervasive Computing Environments
计算机科学, 2013, 40(6): 124-127.
[13] 乔震,刘光杰,李季,戴跃伟.
移动自组织网络安全接入技术研究综述
Survey on Secure Access Technology in Mobile Ad-hoc Network
计算机科学, 2013, 40(12): 1-8.
[14] 何文才,杜敏,刘培鹤,陈志伟,郑钊.
基于Paillier同态的无线自组网组密钥管理方案
Wireless AD-hoc Network Group Key Management Scheme Based on Paillier Homomorphic
计算机科学, 2013, 40(10): 114-118.
[15] 潘艳辉,王韬,吴杨,郑燕茹,罗盛君.
基于随机矩阵预分配的卫星网络密钥管理
Satellite Network Key Management Based on Pre-distribution According to Stochastic Matrix
计算机科学, 2012, 39(Z6): 57-59.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!