期刊文献+

针对Modbus协议的双重认证算法设计 被引量:2

Design of dual authentication algorithm for Modbus protocol
下载PDF
导出
摘要 随着现代化工业网络的不断发展,越来越多的工控网络安全问题层出不穷。在工控网络中Modbus协议应用最为普遍。然而Modbus工控网络却没有安全通信的机制,极易受到恶意攻击。根据文献追踪来看,目前还没有效的解决方案。为解决这些安全问题,提出了针对Modbus工控网络主从设备的认证模型、双重认证算法以及算法的配置方案。该算法利用了哈希链以及对称加密的一些特点,是针对Modbus工控网络主从设备有限的计算和存储能力而设计的轻量型认证算法。通过安全性分析可知,该认证算法能有效抵御常见Modbus工控网络的安全问题,并且算法的配置方案能有效减小认证算法对主从设备通信的干扰。 With the development of modern industrial networks,more and more security problems appear.The Modbus protocol application is widely used in the industrial control network.However,the Modbus protocol is not secure,thus,it is vulnerable to malicious attacks.As far as is known there is no effective solution till now.In order to solve these security problems,this paper presents a dual authentication model,algorithm and configuration scheme for master and slave devices of Modbus based industrial network.The algorithm utilizes some features of Hash chain and symmetric encryption,and it is a lightweight authentication algorithm designed for the limited computing and storage capacity of Modbus based remote control system.The security analysis shows that the authentication algorithm can effectively resist the security problems of the common Modbus based industrial control network,and the algorithm configuration scheme can effectively reduce the interference of the authentication algorithm to the master and slave devices.
作者 张玉鹏 温蜜 ZHANG Yupeng;WEN Mi(School of Automation Engineering,Shanghai University of Electric Power,Shanghai 200090,China;School of Computer Science and Technology,Shanghai University of Electric Power,Shanghai 200090,China)
出处 《计算机工程与应用》 CSCD 北大核心 2018年第20期93-98,共6页 Computer Engineering and Applications
基金 国家自然科学基金(No.61572311 No.61602295) 上海市曙光计划(No.16SG47) 上海市地方能力项目(No.15110500700)
关键词 Modbus工控网络 安全通信 认证算法 哈希链 对称加密 安全性分析 Modbus industrial control network secure communication authentication algorithm Hash chain symmetric encryption security analysis
  • 相关文献

参考文献4

二级参考文献110

  • 1陈星,贾卓生.工业控制网络的信息安全威胁与脆弱性分析与研究[J].计算机科学,2012,39(S2):188-190. 被引量:29
  • 2LANGNER R. Stuxnet: Dissecting a cyberwarfare weapon [J]. IEEE Security Privacy, 2011, 9(3): 49-51.
  • 3IRVINE C, ARMSTRONG H. Security education and critical infrastructures [M]. Norwell: Kluwer Academic Publishers, 2003.
  • 4KRGER W. Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools [J]. Reliability Engineering and System Safety, 2008, 93(12): 1781-1787.
  • 5LEON D, ALVES-FOSS J, KRINGS A, et al. Modeling complex control systems to identify remotely accessible devices vulnerable to cyber attack [EB/OL]. [2007-11-12]. http:∥www2.cs.uidaho.edu/~krings/publications/SACT-2002-D.pdf.
  • 6RALSTON P, GRAHAM J, HIEB J. Cyber security risk assessment for SCADA and DCS networks [J]. ISA Transactions, 2007, 46(4): 583-594.
  • 7TEN C-W, LIU C-C, GOVINDARASU M. Vulnerability assessment of cybersecurity for SCADA systems using attack trees [C]∥ Proceedings of IEEE Power Engineering Society General Meeting 2007. Tampa: [s.n.], 2007: 18.
  • 8MCLAUGHLIN S, PODKUIKO D, MCDANIEL P. Energy theft in the advanced metering infrastructure [C]∥ Proceedings of 4th International Conference on Critical Information Infrastructures Security. Bonn: Springer, 2009: 176-187.
  • 9HAWRYLAK P J, HANEY M, PAPA M, et al. Using hybrid attack graphs to model cyber-physical attacks in the Smart Grid [C]∥ Proceedings of the 5th International Symposium on Resilient Control Systems. Salt Lake City: [s.n.], 2012: 161-164.
  • 10CHEN T M, SANCHEZ-AARNOUTSE J C, BUFORD J. Petri net modeling of cyber-physical attacks on smart grid [J]. IEEE Transactions on Smart Grid, 2011, 2(4): 741-749.

共引文献91

同被引文献10

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部