信息网络安全 ›› 2024, Vol. 24 ›› Issue (8): 1143-1151.doi: 10.3969/j.issn.1671-1122.2024.08.001

• 理论研究 • 上一篇    下一篇

一种基于任务和可信等级的数控网络跨域互操作方法

秦元庆1,2(), 董泽阳1,2, 韩汶君1,2   

  1. 1.华中科技大学人工智能与自动化学院,武汉 430074
    2.华中科技大学图像信息处理与智能控制教育部重点实验室,武汉 430074
  • 收稿日期:2024-06-04 出版日期:2024-08-10 发布日期:2024-08-22
  • 通讯作者: 秦元庆 qinyuanqing@hust.edu.cn
  • 作者简介:秦元庆(1976—),男,山东,副教授,博士,主要研究方向为工业互联网信息安全、网络化控制系统|董泽阳(1998—),男,湖北,硕士研究生,主要研究方向为数控系统信息安全|韩汶君(1998—),男,湖北,硕士研究生,主要研究方向为数控系统信息安全
  • 基金资助:
    国家重点研发计划(2021YFB2012201)

A Cross-Domain Interoperability Method of Distributed Numerical Control Network Based on Task and Trust Level

QIN Yuanqing1,2(), DONG Zeyang1,2, HAN Wenjun1,2   

  1. 1. School of Artificial Intelligence and Automation, Huazhong University of Science and Technology, Wuhan 430074, China
    2. Image Processing and Intelligent Control, Ministry of Education, Huazhong University of Science and Technology, Wuhan 430074, China
  • Received:2024-06-04 Online:2024-08-10 Published:2024-08-22

摘要:

随着工业4.0不断深化,数控网络不断开放导致网络攻击的可达性,使其面临巨大的安全风险。传统跨域互操作方法存在对访问主体认证客观性不足、任务执行效率低及身份权限分配粒度不够精确的问题。针对这些问题,文章提出一种基于任务和可信等级的数控网络跨域互操作方法,该方法通过可信计算3.0技术对访问主体进行可信评估,实现对访问主体的客观评价,提高跨域请求的安全性。文章同时提出一种互操作方法,以任务为互操作基础,在保障互操作细粒度安全性的同时,提高任务执行效率。仿真实验验证了该跨域互操作方法的有效性和适用性。

关键词: 可信计算, 跨域访问, 互操作, 任务, 可信等级

Abstract:

With the continuous deepening of industry 4.0, the openness of distributed numerical control network has led to increased vulnerability to cyber-attacks. Traditional cross-domain interoperability models face issues such as insufficient objectivity in access subject authentication, low execution efficiency of tasks, and insufficient precision in identity and permission allocation. To address these challenges, this paper proposed a cross-domain interoperability method of distributed numerical control network based on task and trust level. The method utilized trusted computing 3.0 technology to conduct a trustworthiness assessment of access subjects, objectively evaluated their trustworthiness and enhanced the security of cross-domain requests. Furthermore, this paper proposed a novel interoperability method, which was based on tasks to ensure fine-grained security during interoperation while also enhancing task execution efficiency. Simulation experiments validated the effectiveness and applicability of the proposed cross-domain interoperability method.

Key words: trusted computing, cross-domain access, interoperability, task, trust levels

中图分类号: