
DATA EXCHANGE TECHNOLOGY BASED ON THE HANDSHAKE PROTOCOL FOR INDUSTRIAL AUTOMATION SYSTEM
Author(s) -
A. V. Astafiev,
T. O. Shardin
Publication year - 2018
Publication title -
izvestiâ ûgo-zapadnogo gosudarstvennogo universiteta
Language(s) - English
Resource type - Journals
eISSN - 2686-6757
pISSN - 2223-1560
DOI - 10.21869/2223-1560-2018-22-2-27-33
Subject(s) - handshake , computer science , key exchange , protocol (science) , data exchange , public key cryptography , computer security , transport layer security , key (lock) , encryption , computer network , database , medicine , alternative medicine , pathology , asynchronous communication
In this paper, the technology of secure data exchange based on the handshake Protocol for industrial automation systems is considered. The threats of client-server applications, on the basis of which it was concluded that the need to use and further implementation of a secure communication channel, for the implementation of secure data exchange. In the process of work, the existing methods of integration and automation of the process at industrial enterprises are analyzed. According to the results of the comparative analysis, as the integration of client and server was chosen Wordpress using plug-ins an online store WooCommerce and 1C. Were considered direct analogues of the handshake Protocol, highlighting the advantages and disadvantages of using in this application, we compare each method, as a secure communication channel has been selected the handshake Protocol, as it showed more benefits than listed counterparts. The handshake Protocol used an asymmetric RSA encryption system. The server generated a pair of keys, the public key was at the client, the private - at the server, the client identification was carried out by the public key and the control phrase, which was originally agreed by the exchange participants. If at any stage of identification the data did not match or an attempt was made to invade third parties in the information exchange, the client did not receive any data from the server. Finally, the schemes of the handshake Protocol, RSA cryptosystems and the General scheme of the implemented application are presented. This development has shown effective use and has been implemented in the enterprise for the production of furniture products.