• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

工业以太网EtherCAT协议形式化安全评估及改进

冯涛, 王帅帅, 龚翔, 方君丽

冯涛, 王帅帅, 龚翔, 方君丽. 工业以太网EtherCAT协议形式化安全评估及改进[J]. 计算机研究与发展, 2020, 57(11): 2312-2327. DOI: 10.7544/issn1000-1239.2020.20200399
引用本文: 冯涛, 王帅帅, 龚翔, 方君丽. 工业以太网EtherCAT协议形式化安全评估及改进[J]. 计算机研究与发展, 2020, 57(11): 2312-2327. DOI: 10.7544/issn1000-1239.2020.20200399
Feng Tao, Wang Shuaishuai, Gong Xiang, Fang Junli. Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol[J]. Journal of Computer Research and Development, 2020, 57(11): 2312-2327. DOI: 10.7544/issn1000-1239.2020.20200399
Citation: Feng Tao, Wang Shuaishuai, Gong Xiang, Fang Junli. Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol[J]. Journal of Computer Research and Development, 2020, 57(11): 2312-2327. DOI: 10.7544/issn1000-1239.2020.20200399
冯涛, 王帅帅, 龚翔, 方君丽. 工业以太网EtherCAT协议形式化安全评估及改进[J]. 计算机研究与发展, 2020, 57(11): 2312-2327. CSTR: 32373.14.issn1000-1239.2020.20200399
引用本文: 冯涛, 王帅帅, 龚翔, 方君丽. 工业以太网EtherCAT协议形式化安全评估及改进[J]. 计算机研究与发展, 2020, 57(11): 2312-2327. CSTR: 32373.14.issn1000-1239.2020.20200399
Feng Tao, Wang Shuaishuai, Gong Xiang, Fang Junli. Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol[J]. Journal of Computer Research and Development, 2020, 57(11): 2312-2327. CSTR: 32373.14.issn1000-1239.2020.20200399
Citation: Feng Tao, Wang Shuaishuai, Gong Xiang, Fang Junli. Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol[J]. Journal of Computer Research and Development, 2020, 57(11): 2312-2327. CSTR: 32373.14.issn1000-1239.2020.20200399

工业以太网EtherCAT协议形式化安全评估及改进

基金项目: 国家自然科学基金项目(61462060,61762060)
详细信息
  • 中图分类号: TP309

Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol

Funds: This work was supported by the National Natural Science Foundation of China (61462060, 61762060).
  • 摘要: EtherCAT协议由于具有较高的实时性和较强的性能而被广泛应用,但是随着工业以太网协议的快速发展和开放化,使得工业控制系统承受着巨大的网络攻击风险.目前有许多对工业以太网协议安全和改进的研究,但是这些研究缺乏对协议的形式化建模与安全评估,只注重协议本身安全功能的实现,有一定的局限性.为了解决工业以太网受到攻击的现状,将当前应用较多的EtherCAT协议作为研究对象,提出了一种基于有色Petri网理论和Dolev-Yao攻击方法的模型检测方法,对协议进行了安全性评估与改进.首先基于Petri网理论和CPN Tools模型工具对协议的安全机制FSoE进行了一致性验证;然后引入了Dolev-Yao攻击模型对协议的原始模型进行安全性评估,发现协议存在着篡改、重放和欺骗3类中间人攻击漏洞;最后针对协议存在的漏洞提出了一种新方案,对原协议加入了秘钥分发中心和Hash函数,再次利用CPN模型检测工具对新方案进行了安全性验证.通过验证可以发现新方案能够有效防止3类中间人攻击,提高协议的安全性.
    Abstract: The EtherCAT protocol is widely used due to its high real-time performance and strong performance. However, with the rapid development and openness of the Industrial Ethernet protocol, industrial control systems are subject to huge network attack risks. There are many studies on the security and improvement of industrial Ethernet protocols, but these studies lack formal modeling and security evaluation of the protocol, and only focus on the realization of the security function of the protocol itself, which has certain limitations. In order to solve the current situation of industrial Ethernet being attacked, we take EtherCAT protocol which is widely used at present as the research object, and propose a model checking method based on colored Petri net theory and Dolev-Yao attack method, and evaluate and improve the security of the protocol. First, we verify the security mechanism of the protocol FSoE based on Petri net theory and CPN Tools model tools; then introduce the Dolev-Yao attack model to evaluate the security of the original model of the protocol. It is found that there are 3 types of man-in-the-middle attack vulnerabilities in the protocol, including tampering, replay, and deception. Finally, a new solution is proposed for the vulnerabilities in the protocol. A key distribution center and a Hash function are added to the original protocol. The security verification of the new scheme is carried out again using the CPN model detection tool. Through verification, it can be found that the new scheme can effectively prevent 3 types of man-in-the-middle attacks and improve the security of the protocol.
  • 期刊类型引用(4)

    1. 林炼升,郑焕钦,苏申,雷凯,陈晓丰,田志宏. 一种DeFi价格操纵攻击在线防御机制. 计算机研究与发展. 2025(02): 443-457 . 本站查看
    2. 郭春霞. 基于权限验证图的Web访问控制漏洞检测方法. 自动化与仪器仪表. 2024(06): 252-256+260 . 百度学术
    3. 安洋,李坤,李军怀,王怀军,臧东玲. 基于智能合约和企业信用的访问控制模型. 计算机系统应用. 2022(03): 197-202 . 百度学术
    4. 孙彬文,陈竟飞,柳絮. 基于UML的智能合约生命周期动态模型. 工业技术创新. 2021(04): 79-88+108 . 百度学术

    其他类型引用(7)

计量
  • 文章访问数:  871
  • HTML全文浏览量:  3
  • PDF下载量:  250
  • 被引次数: 11
出版历程
  • 发布日期:  2020-10-31

目录

    /

    返回文章
    返回