Font Size: a A A

Design Of Security Switch In Industrial Control System

Posted on:2014-01-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y N ZouFull Text:PDF
GTID:2248330395492832Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
Industrial control system, as an important constituent of national important infrastructure, is related to the national economy and people’s livelihood. In recent years, the attacks to industrial control system constantly emerge. National and people’s lives and property are tremendous threatened. As an important constituent of industrial control system, the traditional switch can’t guarantee the security of the system. Therefore, design of security switch has become an urgent task. Therefore, this article mainly does several aspects work as follow.1. In order to ensure the security of the industrial control system, this paper puts forward a design scheme of security switch. In order to ensure user identity access to exchange network is legal, use802.1x authentication protocol to ensure user identity. In order to guarantee the data in exchange network can’t be stealed, use DES algorithm for data encryption.2. Analyze802.lx authentication protocol, and analyze the FPGA realization method of the protocol. Put forward the double authentication model. Design the algorithm realization process and specific function modules, and complete its realization in FPGA by writing Verilog code.3. Analyze DES encryption algorithm, and analyze the FPGA realization method of the algorithm. Use assembly line method to design the algorithm realization process and specific function modules, and complete its realization in FPGA by writing Verilog code.4. Analyze the IIC interface function sequence diagram, and analyze the FPGA realization method of the interface. Design the realization process and specific function modules, and complete its realization in FPGA by writing Verilog code.
Keywords/Search Tags:Security of industrial control system, Switch, FPGA, 802.1xauthentication, DES encryption algorithm
PDF Full Text Request
Related items