Industrial control communication encryption system and method based on load balancing

A technology of load balancing and industrial control, applied in the field of communication, can solve problems such as large increase in traffic, inconsistent data communication security index, misjudgment, etc., and achieve the effect of improving security

Active Publication Date: 2021-11-30
珠海市鸿瑞信息技术股份有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Load balancing refers to assigning tasks to multiple operating units for execution, and multiple servers interact to complete work tasks, which can effectively expand the bandwidth of devices and servers, increase throughput, and thereby improve network data processing capabilities. In the process of industrial control communication, although a load balancing server is added, in order to ensure the security of communication between devices, the communication process needs to be encrypted. However, with the development of network technology, communication encryption methods and algorithms are becoming more and more diverse. Simply selecting the appropriate encryption method based on the communication process and protocol makes the security index of each data communication different, the anti-attack capability cannot be balanced, and the cost of communication encryption is increased. Due to the addition of different types of load balancing servers, some load After the balance server (such as: reverse proxy server) is added, the security of data communication has been improved to a certain extent. After joining the direction proxy server, there is no need for an encryption method that is too strong, depending on the strength level of the encryption method and the load used. The distribution of appropriate encryption methods for the balance server type is beneficial to balance the security of data communication while ensuring load balance; secondly, when adding a load balance server, due to the need for timely interaction between servers, it is necessary to ensure that data is updated in time, so that The address can be randomly assigned, and a small data refresh time needs to be set, which will greatly increase the traffic, appearing as if the communication is under attack, and may cause misjudgment. Marking the normal change range of the traffic during encryption can avoid misjudgment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control communication encryption system and method based on load balancing
  • Industrial control communication encryption system and method based on load balancing
  • Industrial control communication encryption system and method based on load balancing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] Embodiment 1: Use the encryption method statistics unit to make statistics on the currently existing encryption method set as A={A 1 , A 2 , A 3 , A 4 , A 5}, the intensity set of the corresponding encryption method collected by the encryption level acquisition unit is 2 k ={2 k1 ,2 k2 ,2 k3 ,2 k4 ,2 k5}={128, 256, 64, 32, 64}, according to the formula Calculate encryption strength benchmark value M=108, compare 2 kj and M: 2 k1 > M, 2 k2 >M, the encryption method A 1 and A 2 It is categorized into the category with high encryption level, and other encryption methods are classified into the category with low encryption level. The client positioning unit locates the location of a random client based on the IP address, and uses the client location as the origin to model the communication environment. Load balancing The location coordinates of the server are (x 负 ,y 负 )=(2, 2), the coordinate set of the accessed server is (X, Y)={(X 1 , Y 1 ), (X 2 , Y ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an industrial control communication encryption system and method based on load balancing, and the system comprises a configuration information collection module, a data processing center, an attack misjudgment prevention module, a related equipment positioning module, a transmission direction analysis module, and an encryption balance scheduling module. A configuration information acquisition module counts a current existing encryption mode and encryption strength grade data thereof, acquires initialization data refreshing time set when a load balancing server is added, and marks a normal change interval in which traffic is increased due to load balancing in an encryption process through an attack misjudgment prevention module. The encryption balance scheduling module compares and predicts whether the currently-adopted server is a common load balance server or a reverse proxy server according to the data transmission direction, and allocates a proper encryption mode according to the correspondingly-adopted server type and the encryption strength level, thereby avoiding the misjudgment of a communication attack phenomenon. And the data communication security is balanced while the load balancing is ensured.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a load balancing-based industrial control communication encryption system and method. Background technique [0002] Load balancing refers to assigning tasks to multiple operating units for execution, and multiple servers interact to complete work tasks, which can effectively expand the bandwidth of devices and servers, increase throughput, and thereby improve network data processing capabilities. In the process of industrial control communication, although a load balancing server is added, in order to ensure the security of communication between devices, the communication process needs to be encrypted. However, with the development of network technology, communication encryption methods and algorithms are becoming more and more diverse. Simply selecting the appropriate encryption method based on the communication process and protocol makes the security index of each data c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L67/2866H04L67/1001
Inventor 刘智勇蒋劲松
Owner 珠海市鸿瑞信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products