Lightweight end-to-end secure communication authentication method based on identification password

A technology of secure communication and identification password, which is applied in the field of lightweight end-to-end secure communication authentication, can solve problems such as imperfect access authentication mechanisms, and achieve the effects of improving authentication efficiency, ensuring correctness, and reducing computing resources

Active Publication Date: 2020-12-22
SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI +1
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the problems such as the imperfect access authentication mechanism in the industrial control system proposed in the background technology, the present invention proposes a lightweight end-to-end secure communication authentication method based on identification passwords, w

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight end-to-end secure communication authentication method based on identification password
  • Lightweight end-to-end secure communication authentication method based on identification password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0041] Such as figure 1 As shown, the lightweight end-to-end security communication authentication scheme based on identification password for industrial control system includes three entities, namely key generation server, engineering station, and terminal equipment, in which the terminal equipment is mainly composed of security processing unit (Security processing unit, referred to as SPU) and terminal equipment master control. The key generation server is responsible for generating the private key of the engineering station. The engineering station uses its own private key to generate a digital signature, and the terminal device uses the digital signature to authenticate the identity of the engineering station.

[0042] Such as figure 2 As shown, a lightweight end-to-end secure communication authentication method based on identification password, including the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a lightweight end-to-end secure communication authentication method based on an identification password. According to the method, the digital signature algorithm based on the identity label is integrated into the SSL/TLS handshake protocol and is applied to the industrial control system, so that the authentication process of the digital signature algorithm based on the identity label between the engineer station and the terminal equipment is completed. Meanwhile, when the terminal equipment is connected with the engineer station for the first time, identity authentication can be carried out in a challenge/response-based mode, so that the correctness of the identity of the engineer station is ensured. And while identity authentication is carried out, the two parties also realize exchange of symmetric encryption keys. The engineer station takes the identity label of the engineer station as the public key of the engineer station, a public key certificate is not needed any more, the complexity of public key certificate management and maintenance is greatly reduced, the industrial control system added with the authentication function can effectively block unauthorized access of illegal users to the industrial control system, terminal equipment is prevented from being invaded, and sensitive resources of the system are protected.

Description

technical field [0001] The invention belongs to the field of information security of industrial control systems, and specifically relates to a light-weight end-to-end secure communication authentication method based on identification codes applied to industrial control systems. Background technique [0002] With the rapid development of information and Internet technology and their continuous extension and penetration into various industries, the field of industrial control is gradually opening up. This aspect has brought challenges and threats, and dangerous factors such as viruses and Trojan horses are spreading in industrial control systems. In recent years, vicious incidents of attacks on industrial control systems have emerged one after another. From the "Stuxnet" incident at the Iranian nuclear power plant in 2010 to the "Onion Dog" incident in the Asian energy industry in 2016, it shows that the tentacles of cyber security threats have really begun to spread to the in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/0861H04L9/0869H04L9/3247H04L63/061H04L63/0807H04L63/12
Inventor 尚文利陈春雨尹隆刘贤达赵剑明佟国毓杨路瑶刘周斌
Owner SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products