Study of the Industrial Wireless Control Network Security Based on Elliptic Curve Cryptography

Article Preview

Abstract:

Industrial wireless control network brought great convenience in industrial production, and security issues was very important. This paper analyzing the characteristics of the wireless industry control network, and presented a perspective which based on elliptic curve cryptography system, at last, introduction to design a hierarchic structure of the ECC integral solution, then make it better applied to the industrial wireless environment.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

207-211

Citation:

Online since:

October 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Liang Qinghua. Industrial control network technology[M]. Dalian University of technology press , 2006, 12.

Google Scholar

[2] Wei Min, Wang Ping, Wang Quan. Research and implementation of security strategy for wireless industry control network [J]. Chinese Journal of Scientific Instrument, Vol. 30 No. 4, Apr, (2009).

Google Scholar

[3] Miller V S. Use of elliptic curves in cryptography[A]. Advances in Cryptology Crypto 85[C]. Lecture Notes in Computer Science, 1985, (128), 417-426.

DOI: 10.1007/3-540-39799-x_31

Google Scholar

[4] Koblit Z N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48(177) , 203-209.

DOI: 10.1090/s0025-5718-1987-0866109-5

Google Scholar

[5] SUI Aifen, YANG Yixian, NIU Xinxin, LUO Shoushan. Research on the Authenticated key Agreement Protocol Based on Elliptic Curve Cryptography[J]. Journal of Beijing University of Posts and Telecommunications, Vol. 27 No. 3, Jun, (2004).

Google Scholar

[6] Wang Hao, Wu Zhong-Fu, Wang Ping. Research on Security Model for Industrial Control Networks[J]. Computer Science, Vol. 34 No. 5. 96-98, May (2007).

Google Scholar

[7] M Aydos, B Sunar, C K Koc. An elliptic curve cryptography based authentication and key agreement protocol for wireless communication[C]. The 2nd Int'l Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, Dallas (1998).

Google Scholar

[8] Kristin Lauter, Microsoft Corporation. The advantages of elliptic curve cryptography for wireless security[J]. IEEE Wireless Communications, Vol. 11. 62-67, Feb (2004).

DOI: 10.1109/mwc.2004.1269719

Google Scholar

[9] Yang Ziheng, Zhou Ping, Liu Jia, Ding Qun. Improvement and implementation of the algorithm design of elliptic curve dot product based on GF(2n) [J]. Chinese Journal of Scientific Instrument, Vol. 30, No. 7. 1546-1551, Jul (2009).

Google Scholar