Abstract

The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order to verify the security problems of 104 protocol, the 104 master-slave communication implemented DoS attacks, ARP spoofing and Ettercap packet filtering and other man-in-the-middle attacks. DoS attacks may damage the network functions of the 104 communication host, resulting in communication interruption. ARP spoofing damaged the data privacy of the 104 protocol, and Ettercap packet filtering cut off the communication connection between the master and the slave. In order to resist the man-in-the-middle attack, the AES and RSA hybrid encryption signature algorithm and the national secret SM2 elliptic curve algorithm are proposed. AES and RSA hybrid encryption increases the security strength of communication data and realizes identity authentication. The digital signature implemented by the SM2 algorithm can realize identity verification, ensure that the data has not been tampered with, and can ensure the integrity of the data. Both of them improve the communication security of the 104 protocol.

Highlights

  • 104 Protocol, Man in the Middle Attack, AES and RSA Hybrid Encryption Signature, National Secret SM2 Algorithm

  • When transmitting messages between the master station and the slave station of the SCADA system, the 104 protocol transmits the real-time data from the slave station to the master station and sends the upper command to the slave station [2]

  • Chapter four proposes a hybrid encryption signature algorithm based on 104 protocol AES and RSA and a digital signature based on 104 protocol SM2 algorithm

Read more

Summary

Overview

Liu Yuanyuan [4] designed and implemented a secure communication protocol with message encryption and access authentication in response to the problem that the message content of the 104 protocol may be tampered with, and developed a remote control terminal application software based on the security mechanism It improves the security of message transmission. This article did the following: 1) Use the PMA communication protocol analysis tool to build a 104 protocol master station and slave station, get the communication message of master and slave station; 2) In view of the security vulnerabilities in the 104 protocol, use DoS attacks and ARP spoofing methods to conduct attack tests, and analyze the communication between the master and slave stations after the attack; 3) In order to improve the communication security of 104 protocol, AES and RSA hybrid encryption signature algorithm and national secret SM2 elliptic curve algorithm are proposed.

Safety Issues of IEC 60870-5-104 Protocol
Security Test and Analysis
DoS Attack
ARP Spoofing
Ettercap Packet Filtering
AES RSA-SM2 Algorithm Based on 104 Protocol
Hybrid Encryption Signature Algorithm of AES and RSA
National Secret SM2 Algorithm
Experimental Analysis of AES-RSA Algorithm
Experimental Analysis of SM2 Algorithm
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call