面向电压监测终端的远程升级加密通讯方法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Remote Upgrading Encryption Communication Method for Voltage Monitoring Terminal
  • 作者:包依勤
  • 英文作者:Bao Yiqin;College of Information Engineering,Nanjing Xiaozhuang University;
  • 关键词:在应用升级 ; 断点续传 ; 公开密钥 ; 斐波那契
  • 英文关键词:IAP;;broken-point continuously-transferring;;public key;;Fibonacc
  • 中文刊名:JZCK
  • 英文刊名:Computer Measurement & Control
  • 机构:南京晓庄学院信息工程学院;
  • 出版日期:2019-05-25
  • 出版单位:计算机测量与控制
  • 年:2019
  • 期:v.27;No.248
  • 基金:江苏省科技项目(BY2016095-3)
  • 语种:中文;
  • 页:JZCK201905040
  • 页数:6
  • CN:05
  • ISSN:11-4762/TP
  • 分类号:184-188+193
摘要
随着智能终端应用的日益增长和对其功能需求的不断提高,需要对嵌入式软件进行远程在应用升级;针对电压监测终端远程在线升级的安全性,从前的升级只考虑实现升级功能,而忽视升级效率和安全性,造成升级软件易被第三方窃取等问题,提出了一种在线升级加密通讯方法,通过对电压监测系统的架构、通讯规约、文件结构及加密方法等进行了分析和研究,采用断点续传、Fibonacci矩阵和Diffie-Hellman密钥交换等方法,既保证了升级操作的升级效率,又实现了安全性,容错性;实践结果表明,此种升级加密通讯方法,提高了终端的升级效率和安全。
        With the increasing application of intelligent terminal and the increasing demand for its functions,it is necessary to remotely upgrade IAP for embedded software.Aiming at the security of remote online upgrade of voltage monitoring terminal,the previous upgrade only considered the upgrade function,but neglected the efficiency and security of the upgrade,which made the upgrade software easy to be stolen by the third party.This paper proposed an online upgrade encryption communication method,through the framework of voltage monitoring system,communication protocol,files.The structure and encryption method are analyzed and studied.The methods of discontinuous transmission,Fibonacci matrix and Diffie-Hellman key exchange are used to ensure the efficiency of upgrade operation,and to achieve security and fault-tolerance.The practice results confirmed the upgraded encryption.
引文
[1]田建伟,刘晶,刘潇潇,等.用电信息采集终端远程升级平台设计与实现[J].计算机应用与软件,2014,31(1):330-333.
    [2]戴浩.基于FTP的文件定时传输软件的设计与实现[J].计算机应用与软件,2013,30(1):332-333.
    [3]徐旭光,欧毓毅,凌捷,等.基于PUF的轻量级RFID安全认证协议[J].计算机应用与软件,2014,31(11):302-306.
    [4]王铮.一种支持OpenMP线程绑定的分布式构件模型[J].计算机应用与软件,2013,30(3):203-206.
    [5]金杉,李秋.基于多目标遗传算法的动态负载均衡方案[J].计算机工程与科学2013,35(12):102-106.
    [6]乔付.具有模糊多目标的网格任务调度算法计算机工程与科学[J].2014,36(9):1644-1649.
    [7]郝秀,宗群,李庆鑫,等.基于dSPACE的高超声速飞行器实时仿真平台[J].计算机应用与软件,2014,31(2):52-54.
    [8]徐长彬.IEEE-1394b光纤总线互连实时性分析[J].科学技术与工程,2012,12(21):5347-5351.
    [9]赵彩,丁凰.网络信息安全中DES数据加密技术研究计算机测量与控制[J].2017,25(8):241-243.
    [10]Chen Shuzhen,Wang Zhu.The general term and property of the five order Fibonacci series[J].Journal of Hainan Normal University(Natural Science),Hainan,2014,27:241-244.
    [11]Pohlig S,Hellman M.An Improved algorithm for computing Logarithm over GF(p)and its Cryptographic significance[J].IEEE Transaction on Information Theory,SpringerVerlag,1998,1462,458-471.
    [12]Kocher P,Timing attacks on Implementations of Diffie-Hellman,RSA DSS and other systems[J].Advances in Cryptology,1996,1109:104-113.
    [13]Jyotirmie P A,Ravi Kumar B,Chandra Sekhar A,Uma Devi S,A one to one Correspondence in elliptic curve cryptography[J].International Journal of Mathematical archive,2013,4(3):300-304.
    [14]Ravi Kumar B,Chandra Sekhar A,Appala Naidu G.A Diffie-Hellman key exchange for self-Encryption over points on the Elliptic Curve Cryptography[J].Journal of Information and Computing Science,2017,12(2):83-87.