咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >AES RSA-SM2 Algorithm against ... 收藏

AES RSA-SM2 Algorithm against Man-in-the-Middle Attack in IEC 60870-5-104 Protocol

AES RSA-SM2 Algorithm against Man-in-the-Middle Attack in IEC 60870-5-104 Protocol

作     者:Shan Shi Yong Wang Cunming Zou Yingjie Tian Shan Shi;Yong Wang;Cunming Zou;Yingjie Tian

作者机构:College of Computer Science and Technology Shanghai University of Electric Shanghai China Third Institute of Ministry of Public Security National Network and Information System Safety Product Quality Supervision and Testing Center Shanghai China Institute of Electric Power Science State Grid Shanghai Electric Power Company Shanghai China 

出 版 物:《Journal of Computer and Communications》 (电脑和通信(英文))

年 卷 期:2022年第10卷第1期

页      面:27-41页

学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

主  题:104 Protocol Man in the Middle Attack AES and RSA Hybrid Encryption Signature National Secret SM2 Algorithm 

摘      要:The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order to verify the security problems of 104 protocol, the 104 master-slave communication implemented DoS attacks, ARP spoofing and Ettercap packet filtering and other man-in-the-middle attacks. DoS attacks may damage the network functions of the 104 communication host, resulting in communication interruption. ARP spoofing damaged the data privacy of the 104 protocol, and Ettercap packet filtering cut off the communication connection between the master and the slave. In order to resist the man-in-the-middle attack, the AES and RSA hybrid encryption signature algorithm and the national secret SM2 elliptic curve algorithm are proposed. AES and RSA hybrid encryption increases the security strength of communication data and realizes identity authentication. The digital signature implemented by the SM2 algorithm can realize identity verification, ensure that the data has not been tampered with, and can ensure the integrity of the data. Both of them improve the communication security of the 104 protocol.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分