首页 | 本学科首页   官方微博 | 高级检索  
     

针对Modbus协议的双重认证算法设计
引用本文:张玉鹏,温 蜜.针对Modbus协议的双重认证算法设计[J].计算机工程与应用,2018,54(20):93-98.
作者姓名:张玉鹏  温 蜜
作者单位:1.上海电力学院 自动化工程学院,上海 200090 2.上海电力学院 计算机科学与技术学院,上海 200090
摘    要:随着现代化工业网络的不断发展,越来越多的工控网络安全问题层出不穷。在工控网络中Modbus协议应用最为普遍。然而Modbus工控网络却没有安全通信的机制,极易受到恶意攻击。根据文献追踪来看,目前还没有效的解决方案。为解决这些安全问题,提出了针对Modbus工控网络主从设备的认证模型、双重认证算法以及算法的配置方案。该算法利用了哈希链以及对称加密的一些特点,是针对Modbus工控网络主从设备有限的计算和存储能力而设计的轻量型认证算法。通过安全性分析可知,该认证算法能有效抵御常见Modbus工控网络的安全问题,并且算法的配置方案能有效减小认证算法对主从设备通信的干扰。

关 键 词:Modbus工控网络  安全通信  认证算法  哈希链  对称加密  安全性分析  

Design of dual authentication algorithm for Modbus protocol
ZHANG Yupeng,WEN Mi.Design of dual authentication algorithm for Modbus protocol[J].Computer Engineering and Applications,2018,54(20):93-98.
Authors:ZHANG Yupeng  WEN Mi
Affiliation:1.School of Automation Engineering, Shanghai University of Electric Power, Shanghai 200090, China 2.School of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 200090, China
Abstract:With the development of modern industrial networks, more and more security problems appear. The Modbus protocol application is widely used in the industrial control network. However, the Modbus protocol is not secure, thus, it is vulnerable to malicious attacks. As far as is known there is no effective solution till now. In order to solve these security problems, this paper presents a dual authentication model, algorithm and configuration scheme for master and slave devices of Modbus based industrial network. The algorithm utilizes some features of Hash chain and symmetric encryption, and it is a lightweight authentication algorithm designed for the limited computing and storage capacity of Modbus based remote control system. The security analysis shows that the authentication algorithm can effectively resist the security problems of the common Modbus based industrial control network, and the algorithm configuration scheme can effectively reduce the interference of the authentication algorithm to the master and slave devices.
Keywords:Modbus industrial control network  secure communication  authentication algorithm  Hash chain  symmetric encryption  security analysis  
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号