Improved train control system security data interaction method

A security data and train control system technology, applied in the transmission system, safety device, digital transmission system, etc., can solve the problems of increased data delay, low communication rate, limited bandwidth, etc., to reduce occupancy rate and increase cracking rate Difficulty, the effect of speeding up the response

Active Publication Date: 2019-09-20
CHINA RAILWAYS CORPORATION +2
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] 1. The DES algorithm used in the existing technology, the core S-box design method of the algorithm has not been fully disclosed, and theoretically there is a "back door" for quick cracking
[0019] 2. The application message is train control security data. The existing scheme uses clear text transmission without encryption, which is easy to send information leakage and has security loopholes
[0020] 3. GSM-R is a circuit domain communication system with low communication rate and limited bandwidth
The existing technical scheme does not modify the message data, so when sending long data such as electronic maps, it will occupy the already very tight GSM-R wireless network resources for a long time, causing subsequent data delays to increase and affecting the real-time performance of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improved train control system security data interaction method
  • Improved train control system security data interaction method
  • Improved train control system security data interaction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0034] An embodiment of the present invention provides an improved train control system security data interaction method, which mainly includes:

[0035] 1. Expand the length of the shared key of the sending and receiving parties and the random numbers generated and shared by the sending and receiving parties, and cooperate with the corresponding SM4 algorithm to calculate the session key with an increased key length.

[0036] The preferred impleme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an improved train control system secure data interaction method, which comprises the following steps of: expanding the shared key of a data transceiver and the length of a random number generated and shared by the transceiver, and calculating a session key with an increased key length by matching with a corresponding SM4 algorithm; dividing the security data X of the train control system into blocks according to N bits, using a data block and a full text of a session key as input in each round, performing iterative computation by using a corresponding SM4 algorithm, and generating an N-bit operation result Hi corresponding to the corresponding data block; regarding the operation result Hi as encrypted data of the corresponding data block, and covering the corresponding data block, so that the security encryption of the security data X of the train control system is realized; and selecting a corresponding lossless compression algorithm according to the type of the train control system security data, performing data lossless compression on the full-text encrypted train control system security data X, and sending the compressed data X to a receiver. According to the method, the data security is greatly improved, and meanwhile, the occupancy rate of wireless resources is reduced.

Description

technical field [0001] The invention relates to the technical field of railway train control, in particular to an improved security data interaction method of a train control system. Background technique [0002] In the field of railway train control, in order to realize the safe operation of trains, a large amount of data interaction between on-board equipment and ground equipment is required. At present, the CTCS-3 train control system and ATO system of China's high-speed railway both use GSM-R / GPRS The wireless system transmits train control data. However, the wireless system is an open system, which cannot guarantee data security. The security of the data transmission process needs to be realized by a secure communication protocol. The data is packaged into the format of "plain text + data check code based on DES algorithm" and sent to the other party. In the future, western railways and even a large number of normal-speed railways may also use wireless methods to tran...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/04H04W28/06H04L9/06H04W12/03H04W12/041H04W12/0431
CPCH04W28/06H04L9/0618H04W4/42H04W12/03H04W12/041
Inventor 王鹏穆进超谢俊红程剑锋岳林冯凯季舒青刘育君李科惠子南蔡晨李昂
Owner CHINA RAILWAYS CORPORATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products