首页 | 本学科首页   官方微博 | 高级检索  
     

KNXnet/IP协议安全性分析与改进
引用本文:刘君昌,张曦煌.KNXnet/IP协议安全性分析与改进[J].计算机应用,2011,31(7):1912-1916.
作者姓名:刘君昌  张曦煌
作者单位:江南大学 物联网工程学院,江苏 无锡 214122
摘    要:KNXnet/IP协议作为欧洲安装总线(EIB)协议的扩展应用,提高了EIB系统的传输速率并满足了智能管理的需求,但分析表明以IP网络作为骨干网的KNXnet/IP协议在安全性要求较高的应用领域内面临严重的威胁。在分析现有IP网络安全机制及嵌入式系统特点的基础上,提出适用于EIB系统的安全加密通信协议,该安全协议以非对称加密算法为基础,使用自定义的密钥交换协议管理密钥集,设备之间使用对称加密算法通信,具有对原协议架构改动较小、提供数据透明传输的特点,协议的原型实现证明了其可行性和安全性。

关 键 词:KNX/EIB协议    IP骨干网安全    嵌入式网络    密钥集管理    椭圆曲线加密算法
收稿时间:2011-01-07
修稿时间:2011-02-27

Security analysis and improvement of KNXnet/IP protocol
LIU Jun-chang,ZHANG Xi-huang.Security analysis and improvement of KNXnet/IP protocol[J].journal of Computer Applications,2011,31(7):1912-1916.
Authors:LIU Jun-chang  ZHANG Xi-huang
Affiliation:School of Internet of Things Engineering, Jiangnan University, Wuxi Jiangsu 214122, China
Abstract:As the extended application of European Installation Bus (EIB) protocol, KNXnet/IP protocol increases the transmission speed of EIB system and fulfills the requirement of intelligent management. But the security of KNXnet/IP protocol is heavily threatened in the security critical environment. A security protocol was proposed after analyzing the security mechanism of IP network and embedded system. The security protocol used self defined key sets distribution protocol based on asymmetric cryptography algorithm and used symmetric cryptography algorithm for communication. It provides transparent data transmission and only needs very few changes of the primary architecture. The implementation proves the feasibility and security of the security approach.
Keywords:KNX/EIB protocol                                                                                                                        security of IP backbone                                                                                                                        embedded network                                                                                                                        key sets management                                                                                                                        Elliptic Curve Cryptography (ECC) algorithm
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号