Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Industrial wireless network security communication implementation method based on cipher key

An industrial wireless network and secure communication technology, applied in the field of industrial wireless network security communication implementation, can solve problems such as not being an industrial wireless network security management solution, and achieve the effects of authentication and authorization, rational utilization, and network performance improvement.

Active Publication Date: 2009-04-29
魏旻
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the limited storage capacity and computational complexity of wireless devices, this mechanism is also not the best security management solution for industrial wireless networks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial wireless network security communication implementation method based on cipher key
  • Industrial wireless network security communication implementation method based on cipher key
  • Industrial wireless network security communication implementation method based on cipher key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings.

[0034] Such as figure 1 As shown, in this embodiment, the industrial wireless network security architecture is composed of a security manager 1 (host computer), a security management agent 2 (subnet routing device), and a security management object 3 (terminal device). Manage secure communications across the network in a distributed coexistence manner. In centralized network security management, the network security manager 1 is responsible for configuring the security policy of the entire network, key management and network access device authentication. Distributed network security management is that wireless gateways and wireless routing devices with security management agents are responsible for subnet boundary protection, and realize message filtering (including network address, flow control, industrial communication message identif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method used for realizing the safety communication of an industrial wireless network based on cryptographic-key. By using the combination management mode of concentration type and distribution type, a safety network management framework consists of a safety manager, a safety management agent and a safety management object commonly; the method comprises the steps as follows: 1) the safety manager and the safety management agent provide the safety cryptographic-key; 2) when equipment accesses to the network, the equipment and the safety manager authenticates each other; 3) during the communication process, the data messages are converged ,encrypted and then transmitted; the network management mechanism based on the safety cryptographic-key can effectively solve the problems of limited memory capability of the wireless equipment in the industrial wireless network, calculation complexity and the like, furthermore, the network management mechanism can solve the safety problems that the data information is prone to be stolen, falsified and inserted during the process of wireless network transmission and communication, and can utilize the network resource more reasonably, improve the network performance, effectively realize the authentication and authorization of the equipment access to the network, distribution and update of the cryptographic-key, support the communication processing on network safety, and ensure the normal running of the network.

Description

technical field [0001] The invention relates to the technical field of industrial wireless networks and network security, in particular to a method for realizing secure communication of industrial wireless networks. Background technique [0002] The rapid development and maturity of wireless technology has greatly improved people's quality of life, accelerated the process of social development, and made information sharing and application more extensive and in-depth. Industrial wireless communication network technology expands the freedom of industrial users. It has the characteristics of short installation time, convenience, flexibility and economy for adding users or changing the network structure, and can provide full-featured communication services within the wireless coverage area. However, this freedom also brings new challenges. Security issues have become a major obstacle restricting the popularization of wireless network technology applications. Due to the fragile ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/06H04W80/12H04W12/03H04W12/041H04W12/0431H04W12/0433H04W12/08H04W12/106
Inventor 魏旻王平张萱王浩王泉
Owner 魏旻
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products