TANG Jun, GE Qianghua, ZOU Zhirong, et al. Lightweight encryption scheme for train communication network[J]. Electric drive for locomo tives, 2024(1): 122-128.
TANG Jun, GE Qianghua, ZOU Zhirong, et al. Lightweight encryption scheme for train communication network[J]. Electric drive for locomo tives, 2024(1): 122-128.DOI:10.13890/j.issn.1000-128X.2024.01.100.
Lightweight encryption solution for train communication network
The wide application of wireless communication technology has brought about an increase in network security risks for train communication networks. To mitigate these risks
data encryption has emerged as an important means
albeit with additional demand on CPU computing resources. However
train communication network hosts predominantly rely on embedded devices with limited computing resources. This paper proposes a lightweight encryption solution for train communication networks. This solution employs a key negotiation process based on traditional communication encryption scheme
aiming to achieve lightweight encryption in train communication networks and compliance with the authenticity
integrity
and confidentiality requirements of communication data
while greatly reducing hardware demands and computational burdens associated with key management. Experimental verification using the proposed solution yielded a key negotiation time consumption of about 31.9% and reduced the CPU load on devices to about 35.8% when compared to the traditional SM2+SM3+SM4 communication encryption method.
关键词
列车通信网络数据加密轻量化密钥协商
Keywords
train communication networkdata encryptionlightweightkey negotiation
National Information Security Standardization Technical Committee(SAC/TC 260). Information security techniques-public key infrastructure-security technology requirement for PKI system: GB/T 21053—2023[S]. Beijing: Standards Press of China, 2023.
Information Technology Laboratory, National Institute of Standards and Technology. Advanced encryption standard (AES): FIPS 197[S]. Gaithersburg: National Institute of Standards and Technology, 2023.
PAN Xiaozhong, ZHANG Wei, XU Xiaojun, et al. Analysis of data encryption techniques[J]. Systems engineering and electronics, 2003, 25(2): 236-238.
Information Technology Laboratory, National Institute of Standards and Technology. Secure Hash Standard (SHS): FIPS PUB 180-4[S]. Gaithersburg: National Institute of Standards and Technology, 2015.
National Information Security Standardization Technical Committee(SAC/TC 260). Information security technology-public key cryptographic algorithm SM2 based on elliptic curves-part 1: general: GB/T 32918.1—2016[S]. Beijing: Standards Press of China, 2017.
GAO Feng, YU Bo, LI Yuanxuan. Technical scheme and development direction of train network control system for urban rail vechicles[J]. Railway technical innovation, 2015(4): 57-62.
SCHNEIER B. Applied cryptography: protocols, algorithms, and source code in C[M]. Translated by WU Shizhong, ZHU Shixiong, ZHANG Wenzheng, et al. Beijing: China Machine Press, 2014: 20-23.
刘远航. PKI实现与应用中的一些问题[D]. 长春: 吉林大学, 2004.
LIU Yuanhang. Some issues in implementing and applying a PKI[D]. Changchun: Jilin University, 2004.
杨波. 现代密码学[M]. 5版. 北京: 清华大学出版社, 2022: 161-163.
YANG Bo. Modern cryptography[M]. 5th ed. Beijing: Tsinghua University Press, 2022: 161-163.
刘洪强. 基于SSL协议的VPN技术研究与实现[D]. 济南: 山东大学, 2008.
LIU Hongqiang. Research and implementation of SSL-based VPN[D]. Jinan: Shandong University, 2008.
SHANNON C E. Communication theory of secrecy systems[J]. The bell system technical journal, 1949, 28(4): 656-715.