Paper
8 May 2022 Research on secure communication of industrial wireless WIA-PA networks
Yingping Tan, Ge Peng, Hao Wang, Min Wei
Author Affiliations +
Proceedings Volume 12249, 2nd International Conference on Internet of Things and Smart City (IoTSC 2022); 122490D (2022) https://doi.org/10.1117/12.2636696
Event: 2022 2nd International Conference on Internet of Things and Smart City (IoTSC 2022), 2022, Xiamen, China
Abstract
While industrial wireless technology optimizes the communication performance of the industrial network, security has also become a key problem restricting the popularization of an industrial wireless network communication application. As an industrial wireless network protocol independently developed in China, the WIA-PA standard urgently needs to establish a set of independent and controllable security mechanisms. Aiming at the security problems faced by industrial wireless WIA-PA networks, this paper proposes a secure communication scheme based on National secret algorithm, designs node identity authentication, key agreement, and end-to-end secure transmission suitable for WIA-PA networks, and develops a secure communication system based on National secret algorithm based on self-developed chip TF2400 and WIA-PA protocol stacks, the feasibility of the proposed communication scheme and the test results of the confidentiality of the network show the effectiveness of the proposed secure communication scheme.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yingping Tan, Ge Peng, Hao Wang, and Min Wei "Research on secure communication of industrial wireless WIA-PA networks", Proc. SPIE 12249, 2nd International Conference on Internet of Things and Smart City (IoTSC 2022), 122490D (8 May 2022); https://doi.org/10.1117/12.2636696
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Computer security

Wireless communications

Information security

Telecommunications

Data communications

Algorithm development

Back to Top