Until today in many fields such as infrastructure and industrial production,the development of industrial control information management has achieved the remote control management,automation and intelligent management of industrial control terminal.The deeper integration of industrial control systems and industrial control terminal manipulating,has realized the collaborative production of industrial control terminal and information sharing between upper machine and industrial control terminal.Although industrial control informatization has become a new generation of industrial revolution,the combined application of information technology and industrial control is becoming wider and wider,but the current industrial control security problem is very notable.Most current terminal access control in the industrial control system adopts direct docking interface for communication.Industrial control security uses industrial control system security protection and external safety device protection.The lack of authentication for the industrial control terminal access system is vulnerable to threats such as external eavesdropping and false access.Therefore,there is an urgent need for an authentication mechanism for industrial control terminals to access the industrial control system to protect the security of the industrial control system.In addition,the current use of the plug-in safety certification device needs to have a certification process for the industrial control terminal,which is not conducive to the real-time production requirements of industrial control.Industrial control technology is a significant advance in human life.However,this technology has introduced new security issues while bringing convenience to human life.On the one hand,in the process of industrial control,industrial control terminal control more and more equipment,and many control devices are in the wild,so the safety of equipment itself is difficult to be guaranteed.On the other hand,when industrial control terminals obtain information from legitimate devices,malicious attackers can also obtain information due to insufficient security capabilities of devices,and even obtain users’ privacy information by monitoring device usage and location.Therefore,in the process of industrial control terminal management,it is necessary to enhance the security intensity of the system through the establishment of a strong security mechanism to ensure that the system is safe and reliable.Starting from the security problems faced by the industrial control certification system,this paper focuses on the study of the security architecture,key management mechanism and security authentication protocols among different devices of the industrial control certification system based on the PKI theory.The article first analyzed the authentication system in the way of composition,working principle,application mode,and present situation of technical standard,summarized the characteristics of industrial certification network different from the Internet.Then it analyzes the possible security problems in the industrial control authentication system in detail from the perception layer,transmission layer and application layer,and puts forward the security requirements of authentication system and security architecture of authentication system based on trust chain,integrates the CPK mechanism into the PKI system,constructs the key mixed management mechanism,and realizes the security technology of the security authentication and encryption communication between devices by the two-way security authentication protocol of the authentication system which adapts to the different environment requirements.Finally,put the research scheme into practice,design and implement the quick access certification system for industrial control terminals based on PKI,prove the feasibility and advancement of the research results through comparative analysis,and verify the system functional integrity and performance stability through testing. |