当前位置: X-MOL 学术Journal of Applied Security Research › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Modified Hardware Security Algorithms for Process Industries Using Internet of Things
Journal of Applied Security Research ( IF 1.1 ) Pub Date : 2020-03-17 , DOI: 10.1080/19361610.2020.1736458
J. S. Prasath 1 , U. Ramachandraiah 2 , G. Muthukumaran 2
Affiliation  

Abstract

Embedded devices used in process industries are vulnerable to a variety of attacks due to its large number of deployments to reduce the measurement and process complexity. The security threats increase due to the wide usage of embedded systems, wireless networks, and the internet for process monitoring and control applications. Attackers will gain the process information from the embedded devices and wireless networks through a variety of security attacks and modify the critical process parameters of the final product. It is essential to protect the embedded system with wireless networks from unauthorized access. The novelty of this proposed work is the implementation of a modified security algorithm along with the dedicated hardware key using embedded system which allows secure transmission and monitoring of process parameters through the internet. This proposed algorithm generates large key size of 1024-bit for asymmetric encryption and 256-bit key size for symmetric encryption. This encryption algorithm is implemented using raspberry pi which consists of the ARM Cortex processor. This proposed security algorithm monitors process data through the internet strengthens the data security by generating large key size along with usage of dedicated hardware key. The authorized only hold this hardware key to compile the security algorithm and to access the process data in encrypted and decrypted form. It achieves a data transfer rate of 300 Megabits per second and more than 95 percent efficiency. It ensures secure monitoring and transmission of sensitive process information through the internet. It also provides cost-effective solutions in protecting the process equipment and plant information from unauthorized access as well as safety to plant operators.



中文翻译:

使用物联网的流程工业修改后的硬件安全算法

摘要

流程行业中使用的嵌入式设备由于其大量部署以降低测量和流程复杂性而容易受到各种攻击。由于嵌入式系统,无线网络和用于过程监视和控制应用程序的Internet的广泛使用,安全威胁增加了。攻击者将通过各种安全攻击从嵌入式设备和无线网络中获取过程信息,并修改最终产品的关键过程参数。必须保护具有无线网络的嵌入式系统,防止未经授权的访问。这项拟议工作的新颖之处在于使用嵌入式系统实现了改进的安全算法以及专用硬件密钥,该嵌入式系统允许通过互联网安全地传输和监视过程参数。该算法为非对称加密生成了1024位的大密钥,而对于对称加密生成了256位的大密钥。该加密算法是使用树莓派pi来实现的,该树莓派pi包含ARM Cortex处理器。该提议的安全算法通过互联网监视过程数据,通过生成较大的密钥大小以及使用专用硬件密钥来增强数据安全性。被授权方仅持有此硬件密钥才能编译安全算法并以加密和解密的形式访问过程数据。它实现了每秒300兆位的数据传输速率和95%以上的效率。它确保通过互联网安全监控和传输敏感的过程信息。它还提供了经济有效的解决方案,可保护过程设备和工厂信息免受未经授权的访问,并保护工厂操作员的安全。

更新日期:2020-03-17
down
wechat
bug