期刊文献+

Modbus TCP的安全机制研究与实现 被引量:4

Research and implementation of Modbus TCP security technology
下载PDF
导出
摘要 针对Modbus TCP协议设计存在的安全问题,基于密码学原理提出一种安全的Modbus协议(Modbus-E协议):采用对称密钥和数字签名技术实现数据的保密性和可认证性,利用同步性原理和哈希函数的单向性原理保证数据的唯一性,通过"白名单"方法保证指令的可控性,最终在不增加通信过程的情况下实现安全通信。通过实验验证和分析,Modbus-E协议能够防止攻击者针对指令的认证类攻击、中间人攻击及重放攻击,与已有方法相比,该方法安全性更高,可以全面提高Modbus TCP通信的安全性。 Considering the security problem in the design of Modbus TCP protocol,this paper proposes a secure protocol( Modbus-E) based on the principle of cryptography. It uses symmetric key and digital signature technology to ensure the confidentiality and authentication of the data,uses the synchronization principle and the mono-direction principle of the hash function to ensure the uniqueness of the data,uses the method of "white list " to guarantee the controllability of instruction, without increasing communication process. Through experimental verification and analysis,Modbus-E protocol can prevent the authentication attack,man-in-the-middle attack and replay attack of the instruction from the attacker.Compared with existing methods,this method is more secure and can comprehensively improve the security of Modbus TCP communication.
作者 罗旋 李永忠 LUO Xuan;LI Yong-zhong(College of Computer,Jiangsu University of Science and Technology,Zhenjiang 212003,Jiangsu Province,China)
出处 《信息技术》 2019年第1期15-19,共5页 Information Technology
基金 江苏省研究生实践创新计划项目(SJCX18_0784)
关键词 MODBUS TCP协议 哈希函数 对称密钥 白名单 身份验证 Modbus TCP protocol hash function symmetric key white list authenticate
  • 相关文献

参考文献10

二级参考文献49

  • 1梁京章,赵启斌,陈学广.基于规则的防火墙匹配算法研究[J].计算机工程与应用,2005,41(20):166-168. 被引量:8
  • 2孙大林,蒋大明.Modbus/Tcp的安全性及其在工业监控系统中的应用[J].中国安全生产科学技术,2006,2(2):92-95. 被引量:8
  • 3张公忠(清华大学).现代网络技术教程[M].北京:电子工业出版社,2000(1).87-173.
  • 4MODBUS Application Protocol Specification V1.1a. http://www.Modbus- IDA.org . 2004
  • 5MODBUS over Serial Line Specification & Implementation guide V1.0. http://www.Modbus-IDA.org . 2004
  • 6MODBUS MESSAGING ON TCP/IP IMPLEMENTATION GUIDE V1.0.a. http://www.Modbus-IDA.org . 2004
  • 7Peng Y, Jiang C Q, Xie F, et al. Industrial control system cybersecurity research[J]. Journal of Tsinghua University: Science and Technolo- gy, 2012, 52(4) : 1396 - 1408.
  • 8Kang D H, Kim B K, Na J C. Cyber threats and defence approaches in SCADA systems[ C]//2014 16th International Conference on Ad- vanced Communication Technology (ICACT). Piscataway, NJ, USA : IEEE, 2014 : 324 - 327.
  • 9Knijff R M. Control system/SCADA forensics, what's the d fference? [J]. Digital Investigation, 2014, II (3) : 160 -174.
  • 10Industrial Control Systems Cyber Emergency Response Team. ICS-CERT year in review[ EB/OL]. (201d -02 -24) [ 2015 -03 -011. https: // ics-cert, us-cert, gov/sites/default/files/documents/Year In Review_FY2013_Final. pdf.

共引文献117

同被引文献37

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部