Paper
12 May 2023 Research on trusted Modbus/TCP protocol of SCADA system based on digital envelope technology
Chenxue Guo, Yuanbo Cui, Chao Wang
Author Affiliations +
Proceedings Volume 12641, International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2023); 126410V (2023) https://doi.org/10.1117/12.2679065
Event: International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2023), 2023, Changsha, China
Abstract
Considering the issues of lack of integrity, authentication and confidentiality of Modbus/TCP protocol broadly utilized in SCADA system, this study suggests a trusted Modbus/TCP protocol based on digital envelope technology on the basis of trusted cryptography module (TCM). To the basic Modbus/TCP protocol, the protocol adds identity authentication sub-protocol and communication sub-protocol. Utilizing the SM2, SM3 and SM4 algorithms provided by TCM, the security of sub-protocol communication procedure and communication information is guaranteed by digital envelope technology and hash calculation. The security of the sub-protocol is verified by the SPAN tool, as well as the time overhead determined by the sub-protocol is tested. Experiments illustrates that the proposed trusted Modbus/TCP protocol can meet the high real-time prerequisites of industrial control systems and various business performance criteria while ensuring integrity, authentication and confidentiality.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Chenxue Guo, Yuanbo Cui, and Chao Wang "Research on trusted Modbus/TCP protocol of SCADA system based on digital envelope technology", Proc. SPIE 12641, International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2023), 126410V (12 May 2023); https://doi.org/10.1117/12.2679065
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Data communications

Computer security

Symmetric-key encryption

Telecommunications

Information security

Control systems

Back to Top