Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure coding and decoding method of railway transponder messages based on lightweight chaotic authentication encryption

A transponder message, encoding and decoding method technology, applied in the direction of railway signal and security, secure communication through chaotic signal, railway signal, etc., can solve the problems of on-board ATP calculation, not proposed, wrong speed curve, etc., and achieve enhanced security protection effect of ability

Inactive Publication Date: 2018-08-31
SOUTHWEST JIAOTONG UNIV
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the transponder is laid on the open track ground without supervision outdoors, it faces the risk of malicious transponder message tampering and illegal transponder counterfeiting. Attackers may tamper with the slope, curve radius, temporary speed limit or position of the line ahead. and other information, causing the vehicle-mounted ATP to calculate the wrong speed curve, which brings a major safety risk to driving, but there are no specific and effective measures to identify and prevent these malicious attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure coding and decoding method of railway transponder messages based on lightweight chaotic authentication encryption
  • Secure coding and decoding method of railway transponder messages based on lightweight chaotic authentication encryption
  • Secure coding and decoding method of railway transponder messages based on lightweight chaotic authentication encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] figure 2 It shows the security encoding process of the transponder message, and the specific steps are as follows:

[0061] 1. First, assign a 772-bit legal key K∈G(2 772 );

[0062] 2. The authorized party generates regular user messages (FI, PI, ED) according to the ETCS / CTCS responder standard;

[0063] 3. The read-write device of the transponder relies on the special lightweight chaos authentication encryption algorithm (such as Figure 4 Shown), generate encrypted information package EI and authentication label Tag, the steps are as follows:

[0064] a) Generate a 4×4 S box according to the key K, denoted as S(·), as an example, its content is as follows:

[0065] x

0

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

S(x)

12

7

15

0

13

11

3

1

10

2

6

14

9

5

8

4

[0066] b) Use the S-box to construct an integer chaotic coupled mapping lattice;

[0067] 1) Gener...

Embodiment 2

[0084] The transponder security encoding message format is shown in Table 1, in which the 913-bit Sd user message is obtained by extending the 830-bit Su security user message from 10 bits to 11 bits, and the extension method adopts the ETCS transponder standard; the Tag authentication label message is obtained by the authentication The 85-bit authentication label generated by the encryption algorithm is obtained; the generation method of the Cb control message, the Sb scrambling code message and the Esb correction code message is the same as the ETCS transponder standard;

[0085] Table 1 Transponder Security Coded Message Format

[0086] 1

2

3

4

5

Sd user message

Cb control message

Sb scrambled message

Esb correction code message

Tag authentication label message

83*11=913bit

3bit

12bit

10bit

85bit

[0087] Table 2 Su security user message structure (information frame)

[0088] serial number

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secure coding and decoding method of railway transponder messages based on lightweight chaotic authentication encryption. The secure coding and decoding method comprises a dedicated lightweight chaotic authentication encryption method for transponder messages, a transponder message coding method based on authentication encryption, a corresponding decryption verification algorithm, and a transponder message decryption verification method based on the decryption verification algorithm. On the premise of maintaining the ETCS and CTCS standards, confidentiality, integrityand authentication protection is provided for the transponder messages, and security risks such as forgery, tampering and counterfeiting faced by the existing transponder messages are avoided. Meanwhile, in view of the limited computing resources of a transponder read-write device, a lightweight chaotic authentication encryption algorithm is used for providing lightweight information security protection for the transponder messages, so that the train-ground communication security of a transponder of a train control system is effectively enhanced.

Description

technical field [0001] The invention relates to the technical field of secure transmission of train control information in a high-speed railway train operation control system, in particular to a method for securely encoding and decoding railway transponder messages based on lightweight chaos authentication and encryption. Background technique [0002] Transponder is a kind of ground signal equipment in high-speed railway train operation control system. It is divided into passive transponder and active transponder. Its main purpose is to provide reliable ground fixed information and variable information to train control on-board equipment. The information transmitted by the transponder to the on-board train control equipment includes basic line parameters, line speed information, temporary speed limit information, station route information, turnout information, special positioning information, etc. When the train passes above the ground transponder, the transponder obtains th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00B61L1/02
CPCB61L1/02H04L9/001
Inventor 王小敏张文芳郑启明
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products