Font Size: a A A

Design And Implementation Of Configurable Secure Transmission Protocol For Business Applications

Posted on:2017-07-26Degree:MasterType:Thesis
Country:ChinaCandidate:K ZhangFull Text:PDF
GTID:2348330488485272Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
In recent years, with the rapid development of network technology and computer technology all areas have entered the information age. For power systems, it can be achieved by network technology that power-related information which is collected throughout the province is transferred to State Grid. This makes some business applications of automatic collection and transmission to promote, such as payment platforms, voltage acquisition, environmental monitoring and so on. However external data into internal network will bring some security risks. There are many standards of secure transmission protocols, such as SSL, IPSec, etc. Their consultation process before data transmission require a lot of interaction packets, and the amount of redundant information of the package of transferring data is very large, so in the case of instable wireless network transmission problems often occur. Besides, There are some protocols designed temporarily to meet specific business applications. Such protocols are not widely available. It has become a problem which urgently needs to be solved to design a secure transmission protocol for business applications, this paper researches and achieves a configurable secure transmission protocol for business applications. The main results of this project are as follows:(1) Discuss several types of scenes where encryption algorithm is used, study the principles of commercial secret algorithm and compare the difference between RSA algorithm, SM2 algorithm.(2) Research several high concurrency communication model, which is TCP concurrency server model and I/O multiplexing server model, and libevent frame which support I/O multiplexing such as epoll model and select model etc., conclude their feature.(3) Based on the above technology research. design secure transmission protocols which is represented by key negotiation and data transfer. The protocol supports both TCP and UDP protocols. Key negotiation and communication process packets are so lightweight as not to overly busy channel.(4) Implement secure transmission protocol using C language, implement commercial secret algorithm in the protocol. Compare the advantages and disadvantages of several concurrency models and select the appropriate model to achieve the secure transfer protocol.
Keywords/Search Tags:secure Transmission protocol, SM2, SM3, libevent, epoll
PDF Full Text Request
Related items