Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 360-363.doi: 10.11896/JsJkx.191000114

• Information Security • Previous Articles     Next Articles

Study on Security of Industrial Internet Network Transmission

WU Yu-hong1 and HU Xiang-dong2   

  1. 1 School of Computer Science and Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,China
    2 School of Automation,Chongqing University of Posts and Telecommunications,Chongqing 400065,China
  • Published:2020-07-07
  • About author:WU Yu-hong, born in 1981, Ph. D, associate professor.Her main research interests include internet of things, industrial internet security and big data, etc.

Abstract: Industrial Internet data must rely on network transmission for interoperability,and the security of network transmission is crucial for industrial Internet.It should be equipped with security mechanisms in the process of information transmission.Security control should be carried out in identity authentication of the subJect at both ends of the transmission,data encryption of the transmission,and transmission link node identification and authentication.This paper proposes corresponding measures to avoid the security risks involved in wired transmission medium and wireless transmission media of industrial Internet,and makes a thorough analysis on how to encrypt the data during transmission and how to choose cryptographic algorithms.It also puts forward the corresponding countermeasures for other aspects of network transmission.

Key words: Encryption algorithm, Identity authentication, Key management, Multi-factor authentication, Network transmission

CLC Number: 

  • TP406
[1] 卢坦,林涛,梁颂.美国工控安全保障体系研究及启示.保密科学技术,2018(4):24-33.
[2] 周剑,肖琳琳.工业互联网平台发展现状、趋势与对策.智慧制造,2017(12):56-58.
[3] 迈克尔?布雷迪,内德?考尔德,等.企业的工业互联网平台战略.上海质量,2017(5):15-18.
[4] 李海花.各国强化工业互联网战略,标准化成重要切入点.世界电信,2015(7):24-27.
[5] 陈泓汲,罗璎珞.互联网+网络安全新特性与发展建议.互联网天地,2015(10):1-4.
[6] 王峰.工业互联网平台分类研究.电信技术,2017(10):7-10.
[7] Industrial Internet Consortium (IIC).Volume G1:Reference Architecture.8,2015.
[8] Industrial Internet Consortium (IIC),Volume G5:Connec-tivity Framework,v1.8.8,2016.
[9] IEC61158-4 Industrial Communication Networks-Fieldbus Speci-fications.
[10] IEC61784-2 Industrial Communication Networks- Profiles-Part 2:Additional Fieldbus Profiles for Real- time Networks Based on ISO/IEC 8802-3.
[11] WU Yu-hong,born in 1981,Ph.D,associate professor.Her main research interests include internet of things,industrial internet security and big data,etc.
[1] CAO Meng, YU Yang, LIANG Ying, SHI Hong-zhou. Key Technologies and Development Trends of Big Data Trade Based on Blockchain [J]. Computer Science, 2021, 48(11A): 184-190.
[2] CHEN Meng-dong, GUO Dong-sheng, XIE Xiang-hui, WU Dong. Design and Implementation of Rule Processor Based on Heterogeneous Computing Platform [J]. Computer Science, 2020, 47(4): 312-317.
[3] CHENG Qing-feng, LI Yu-ting, LI Xing-hua, JIANG Qi. Research on Application of Cryptography Technology for Edge Computing Environment [J]. Computer Science, 2020, 47(11): 10-18.
[4] ZHAO Jiao-jiao, MA Wen-ping, LUO Wei, LIU Xiao-xue. Hierarchical Hybrid Authentication Model Based on Key Sharing [J]. Computer Science, 2019, 46(2): 115-119.
[5] YIN Qiu-shi, CHEN Jian-hua. Improved Identity Authentication Protocol Based on Elliptic Curve Cryptographyin Multi-server Environment [J]. Computer Science, 2018, 45(6): 111-116.
[6] YANG Dong-ju and FENG Kai. Distributed and Unified Authentication Optimization Mechanism Based on Cache [J]. Computer Science, 2018, 45(3): 300-304.
[7] CHEN Shao-hua, FAN Xiao-guang, CONG Wei, HUANG Jin-ke and SUN Xian-ming. Grid-based Identity Signcryption Algorithm and Application in Ad Hoc Network [J]. Computer Science, 2017, 44(6): 168-173.
[8] YANG Lu and YE Xiao-jun. Key Management Issues and Challenges in Cloud [J]. Computer Science, 2017, 44(3): 3-9.
[9] ZHOU Chang-chun, TIAN Xiao-li, ZHANG Ning, YANG Yun-jun and LI Duo. Research on Identity Authentication Technology in Cloud Computing [J]. Computer Science, 2016, 43(Z6): 339-341.
[10] XU Tai-zhong, YANG Tian-chi, CHENG Juan and SHAO Qi-feng. Design Method of SRAM-PUF Based on Error Correcting Code Fuzzy Extractor [J]. Computer Science, 2016, 43(Z11): 373-376.
[11] WU Wei-min, CHEN Dong-xin, LAI Wen-xin and SU Qing. Research and Implementation of EFI OS Loader Security Reinforcement Technology [J]. Computer Science, 2016, 43(9): 188-191.
[12] WANG Gang, SUN Liang-xu, ZENG Zi-wei and YANG Dan. Secure and Efficient Hybrid Key Management Mechanism in Heterogeneous WSN [J]. Computer Science, 2016, 43(7): 153-156.
[13] CHENG Mao-cai and XU Kai-yong. Audit Log Secure Storage System Based on Trusted Computing Platform [J]. Computer Science, 2016, 43(6): 146-151.
[14] XU Jian, LI Ming-jie, ZHOU Fu-cai and XUE Rui. Identity Authentication Method Based on User’s Mouse Behavior [J]. Computer Science, 2016, 43(2): 148-154.
[15] WANG Hu-qing and SUN Zhi-xin. Research on ONS Security [J]. Computer Science, 2016, 43(1): 1-7.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!