SIA OpenIR  > 工业控制网络与系统研究室
Authentication Technology in Industrial Control System Based on Identity Password
Yang LY(杨路瑶)1,2,4,5; Shang WL(尚文利)1,3,4,5; Chen CY(陈春雨)1,2,3,5; Wang TY(王天宇)1,3,4,5; Liu ZB(刘周斌)6
Department工业控制网络与系统研究室
Conference Name39th Chinese Control Conference, CCC 2020
Conference DateJuly 27-29, 2020
Conference PlaceShenyang, China
Author of SourceSystems Engineering Society of China (SESC) ; Technical Committee on Control Theory (TCCT) of Chinese Association of Automation (CAA)
Source PublicationProceedings of the 39th Chinese Control Conference, CCC 2020
PublisherIEEE Computer Society
Publication PlaceWashington, USA
2020
Pages7677-7684
Indexed ByEI
EI Accession number20203909242566
Contribution Rank1
ISSN1934-1768
ISBN978-9-8815-6390-3
KeywordIndustrial control security digital signature identity authentication SSL/TLS handshake protocol
AbstractAiming at the current lack of certification capability in domestic industrial control systems, an industrial control system authentication scheme based on identity cryptography algorithm is proposed. When authenticating between control system devices, the scheme integrates the identity-based digital signature algorithm into the SSL/TLS handshake protocol to complete identity authentication between the engineering station and the trusted PLC. At the same time, when the connection is established for the first time between devices, the connection authentication is selected by the challenge/response based method. The authentication technology based on the identity cryptographic algorithm no longer requires the existence of a public key certificate. This eliminates the need to revoke, store, and issue certificates, simplifies the certification process and reduces the amount of computation required by the authentication process. At the same time, the improved handshake protocol is universal in industrial control systems. The authentication technology based on the identity and password algorithm no longer requires the existence of a public key certificate, eliminating the need for certificate revocation, storage, and issuance, simplifying authentication steps, and reducing system maintenance. Finally, by establishing a test environment, the improved handshake protocol is implemented, and the feasibility of the authentication scheme is verified and analyzed.
Language英语
Document Type会议论文
Identifierhttp://ir.sia.cn/handle/173321/27705
Collection工业控制网络与系统研究室
Corresponding AuthorShang WL(尚文利)
Affiliation1.Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China
2.School of Information Science and Engineering, Northeastern University, Shenyang 110004, China
3.Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, Shenyang 110016, China
4.University of Chinese Academy of Sciences, Beijing 100049, China
5.Institute of Robotics and Intelligent Manufacturing Innovation, Chinese Academy of Sciences, Shenyang 110016, China
6.Electric Power Research Institute, State Grid Zhejiang Electric Power Co., Ltd., Hangzhou 310014, China
Recommended Citation
GB/T 7714
Yang LY,Shang WL,Chen CY,et al. Authentication Technology in Industrial Control System Based on Identity Password[C]//Systems Engineering Society of China (SESC), Technical Committee on Control Theory (TCCT) of Chinese Association of Automation (CAA). Washington, USA:IEEE Computer Society,2020:7677-7684.
Files in This Item:
File Name/Size DocType Version Access License
Authentication Techn(537KB)会议论文 开放获取CC BY-NC-SAView Application Full Text
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Yang LY(杨路瑶)]'s Articles
[Shang WL(尚文利)]'s Articles
[Chen CY(陈春雨)]'s Articles
Baidu academic
Similar articles in Baidu academic
[Yang LY(杨路瑶)]'s Articles
[Shang WL(尚文利)]'s Articles
[Chen CY(陈春雨)]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Yang LY(杨路瑶)]'s Articles
[Shang WL(尚文利)]'s Articles
[Chen CY(陈春雨)]'s Articles
Terms of Use
No data!
Social Bookmark/Share
File name: Authentication Technology in Industrial Control System Based on Identity Password.pdf
Format: Adobe PDF
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.