期刊文献+

基于VPN的电力调度数据网络安全方案 被引量:29

A Security Scheme for Power Dispatching Data Network Based on VPN
在线阅读 下载PDF
导出
摘要 在分析电力调度数据网络现有的基于公钥数字证书的公钥基础设施/认证中心(PKI/CA)的安全系统基础上,针对调度数据网络中实时性与安全性需求之间的矛盾,提出了新的身份认证和密钥协商安全方案,通过改进基于有限域上离散对数的数字签名和密钥协商算法,将身份认证和密钥协商融合在一次会话中,并且使安全方案不依赖于第三方的在线证书系统,同时在现有的虚拟专用网(VPN)安全框架内对冗余功能进行了裁剪,取代了传统的PKI/CA体制,在保证电力调度数据网络安全性需求的同时满足了实时性需求。 Based on an analysis of the current security scheme for public key infrastructure and certification authorities (PKI/ CA) in the power dispatching data network and focusing on the contradiction between real time and security, a novel security scheme for identity authentication and key agreement is proposed. By improving the digital signature and key agl:eement algorithm based on discrete logarithm in a finite field, the identity authentication and key agreement are merged into one session, and the security scheme is made independent of the third party on-line certificate system. Meanwhile, the redundant functions of the current virtual private network (VPN) framework are cut down to replace the traditional PKI/CA system. The proposed security scheme for the power dispatching data network guarantees both security and real time.
出处 《电力系统自动化》 EI CSCD 北大核心 2007年第14期94-97,共4页 Automation of Electric Power Systems
基金 四川省应用基础研究基金资助项目(04JY029-017-2) 国家科技型中小企业技术创新基金资助项目(04C26225110223)~~
关键词 电力调度数据网 安全性 实时性 身份认证 密钥协商 VPN power dispatching data network security real time identity authentication key agreement virtual privatenetwork (VPN)
  • 相关文献

参考文献8

  • 1胡炎,董名垂,韩英铎.电力工业信息安全的思考[J].电力系统自动化,2002,26(7):1-4. 被引量:78
  • 2彭清卿,向力,卢长燕,邹国辉,孙炜.国家电力调度数据网组网研究[J].电力系统自动化,2004,28(8):10-14. 被引量:68
  • 3段斌,刘念,王键,黄生龙.基于PKI/PMI的变电站自动化系统访问安全管理[J].电力系统自动化,2005,29(23):58-63. 被引量:46
  • 4罗汉武,李昉.基于IPSec技术的电力调度数据网安全解决方案[J].电力系统通信,2006,27(1):1-3. 被引量:8
  • 5AURA T.Strategies against replay attacks//Proceedings of 10th Computer Security Foundations Workshop,Jun 10-12,1997,Rockport,MA,USA.Los Alamitos,CA,USA:IEEE Computer Society,1997:59-68.
  • 6SERPANOS D N,LIPTON R J.Defense against man-in-the-middle attack in client-server systems//Proceedings of Sixth IEEE Symposium on Computers and Communications,Jul 3-5,2001,Hammamet,Tunisia.Piscataway,NJ,USA:IEEE,2001:9-14.
  • 7FRIEND R.Making the gigabit IPsee VPN architecture secu re.IEEE Trans on Computer,2004,37(6):54-60.
  • 8LI Huijie,LIN Xiaokang.An OPNET-based 3-tier network simulation architecture//Proceedings of IEEE International Symposium on Communications and Information Technology:Vol 1,Oct 12-14,2005,Bering,China.Piscataway,NJ,USA:IEEE Computer Society,2005:767-770.

二级参考文献32

共引文献189

同被引文献190

引证文献29

二级引证文献252

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部