Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for identity authentication between master station and slave station in SCADA (Supervisory Control and Data Acquisition) system

An identity authentication and master station technology, applied in the field of identity authentication, can solve the problems that the security of the session key needs to be enhanced, the identity authentication mechanism needs to be improved, and the illegal access of users and devices cannot be effectively prevented, so as to achieve both security and reduce Effects of Computational Complexity

Active Publication Date: 2016-05-25
SHANGHAI JIAO TONG UNIV +1
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The above research shows that the SCADA system mainly uses symmetric encryption algorithm to realize the encryption transmission and decryption verification process of data, but the security of the session key needs to be enhanced, the identity authentication mechanism of both communication parties needs to be improved, and the existing security protection mechanism cannot effectively prevent users from and illegal access of equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for identity authentication between master station and slave station in SCADA (Supervisory Control and Data Acquisition) system
  • Method and system for identity authentication between master station and slave station in SCADA (Supervisory Control and Data Acquisition) system
  • Method and system for identity authentication between master station and slave station in SCADA (Supervisory Control and Data Acquisition) system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0041] Since the SCADA system needs to process a large amount of data in a short period of time, the lightweight encryption mechanism can ensure rapid recovery after system interruption and reduce system losses. The use of symmetric encryption has advantages in the number of key nodes and the cost of response time, which meets the requirements of the system's lightweight encryption mechanism. However, since the encryption and decryption key used in the symmetric encryption process is unique, the securit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for identity authentication between a master station and a slave station in an SCADA system. The method comprises following steps that: the master station A creates service and generates a symmetric polynomial coefficient aij; the slave station B builds connection with the master station A according to the IP address of the server of the master station A; after the connection is built successfully, the slave station B and the master station A share the symmetric multinomial parameter; both the master station and the slave station take the data frames of a communication protocol as own identity identifier IDA and IDB; the master station and the slave station exchange mutual identity identifiers; the identity identifiers are substituted into a symmetric polynomial for calculation; if f(IDA, IDB) is equal to f(IDB, IDA), the slave station B and the master station A realize two-way authentication; and a symmetric encryption key KAB is obtained through calculation and extension. According to the method and the system of the invention, the shared key is generated by the symmetric polynomial; the shared key is taken as the symmetric encryption key; a symmetric encryption algorithm is used in the message exchange process; and therefore, the calculation complexity is reduced.

Description

technical field [0001] The invention relates to an identity authentication technology used between master and slave stations of a SCADA system, in particular to a bidirectional authentication technology based on a symmetric polynomial encryption mechanism, and specifically relates to the guarantee of the communication security of the master and slave stations of the SCADA system. Background technique [0002] With the continuous development of information technology and the increasing level of industrial modernization, industrial control systems (Industry Control System, ICS) are widely used in many industries closely related to the national economy and people's livelihood, such as metallurgy, water and electricity supply, oil and gas transmission, aerospace, road traffic, etc. It plays an irreplaceable role in the construction of social production and security infrastructure. A typical SCADA (Supervisory Control and Data Acquisition) system is mainly used for remote monitor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0435H04L63/0869
Inventor 陈秀真陆越金波陈长松
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products