期刊文献+

电网电压监测装置接入协议安全分析与改进 被引量:5

Security analysis and improvement of access protocol for voltage monitoring device in power network
下载PDF
导出
摘要 为提高基于无线APN虚拟专网的电压监测装置信息安全接入规范中的密钥协商协议和数据加密传输协议的安全性,对其进行改进。在密钥协商请求报文和应答报文中添加时间戳,密钥协商确认报文添加时间戳与报文签名,数据加密报文添加时间戳和报文签名的方式提升了协议的安全性。对改进后的密钥协商协议与数据加密传输协议进行安全性分析,分析结果表明,改进后的协议可以抵抗消息重放攻击、消息篡改攻击,能够实现协议报文的来源可靠性和数据完整性保护。 To improve the security of key agreement protocol and data encryption transmission protocol in the information security access specification of voltage monitoring device based on wireless access point name(APN)virtual private network,they were improved.The security of the protocol was improved by adding a timestamp to the request message and reply message and adding a timestamp and a message signature to key agreement confirmation message and data encryption message.At the same time,the security of the improved key agreement protocol and the data encryption transmission protocol was analyzed.The analysis results show that the improved protocol can resist the message replay attack and the message tampering attack.And it can protect the source reliability and data integrity of protocol packets.
作者 林楠 陈祚松 左黎明 王露 LIN Nan;CHEN Zuo-song;ZUO Li-ming;WANG Lu(Electric Power Research Institute,State Grid Jiangxi Electric Power Limited Company,Nanchang 330096,China;School of Science,East China Jiaotong University,Nanchang 330013,China;Institute of Systems Engineering and Cryptograph,East China Jiaotong University,Nanchang 330013,China)
出处 《计算机工程与设计》 北大核心 2019年第11期3085-3089,共5页 Computer Engineering and Design
基金 国家自然科学基金项目(11361024) 江西省教育厅科技基金项目(GJJ161417、GJJ170386) 国网江西省电力有限公司科技基金项目(52182017001L)
关键词 安全协议 密钥协商 加密传输 协议改进 数据完整性保护 security protocol key agreement encryption transmission protocol improvement data integrity protection
  • 相关文献

参考文献9

二级参考文献92

  • 1余勇,林为民.基于等级保护的电力信息安全监控系统的设计[J].计算机科学,2012,39(S3):440-442. 被引量:20
  • 2余勇,林为民,何军.电力数字证书服务系统的设计及应用[J].电力系统自动化,2005,29(10):64-68. 被引量:23
  • 3游韵,喻占武.基于椭圆曲线公钥算法的SSL协议分析和实现[J].微计算机信息,2006,22(10X):213-215. 被引量:2
  • 4PALANIAPPAN S, RABIAH A, MARIANA Y. A conceptual framework of info structure for information security risk assessment (ISRA)[J]. Journal of Information Security and Applications, 2013, 18: 45-52.
  • 5REBOLLO O, MELLADO D, FERNANDEZ-MEDINA E, et al. Empirical evaluation of a cloud computing informationsecurity governance framework [J]. Information and Software Technology, 2015, 58 44-57.
  • 6JIRASEK V. Practical application of information security models [J]. Information Security Technical Report, 2011, 17(1) : 1 8.
  • 7WANG Dong, LI Ruixue, WANG Huaiyu, et al. Research on the model of in-depth defense and control ability system of information security[C]//2014 the 7th International Conference on Information Management, Innovation Management and Industrial Engineering, October 25-26, 2014, Xi'an, China: 153-155.
  • 8KANDROT E,SANDERS J.CUDA by example:an introduc- tion to general-purpose GPU programming[M].Amsterdam: Addison- Wesley Ixmgman, 2010.
  • 9IWAI K, NISHIKAWA N, KUROKAWA T.Acceleration of AES encryption on CUDA GPU[J].International Journal of Networking and Computing, 2012,2 ( 1 ) : 131 - 145.
  • 10王保义,杨丽.基于安全网关的电力二次系统安全防护[J].电力系统通信,2008,29(12):28-32. 被引量:15

共引文献300

同被引文献58

引证文献5

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部