CN115297475A - Secret key distribution method for encrypted communication in rail transit - Google Patents

Secret key distribution method for encrypted communication in rail transit Download PDF

Info

Publication number
CN115297475A
CN115297475A CN202211186141.8A CN202211186141A CN115297475A CN 115297475 A CN115297475 A CN 115297475A CN 202211186141 A CN202211186141 A CN 202211186141A CN 115297475 A CN115297475 A CN 115297475A
Authority
CN
China
Prior art keywords
key
control terminal
ground control
random
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211186141.8A
Other languages
Chinese (zh)
Other versions
CN115297475B (en
Inventor
周石磊
杜德兵
姚海涛
陆飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Kexin Quantum Technology Co ltd
Original Assignee
Nanjing Kexin Quantum Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Kexin Quantum Technology Co ltd filed Critical Nanjing Kexin Quantum Technology Co ltd
Priority to CN202211186141.8A priority Critical patent/CN115297475B/en
Publication of CN115297475A publication Critical patent/CN115297475A/en
Application granted granted Critical
Publication of CN115297475B publication Critical patent/CN115297475B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • H04W4/42Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for mass transport vehicles, e.g. buses, trains or aircraft
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Train Traffic Observation, Control, And Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A secret key distribution method for encrypted communication in rail transit. The method comprises the steps that a first ground control terminal obtains a first random key and a second random key; the first ground control terminal encrypts a first communication key and a second random key; the second ground control terminal acquires a second random key and a third random key; the second ground control terminal encrypts a second communication key and a third random key; the first ground control terminal sends the encrypted first communication key and the encrypted second random key; the VOBC decrypts the first communication key and the second random key; when the VOBC is positioned in the preset position interval, the second ground control terminal sends the encrypted second communication key and the encrypted third random key; the VOBC decrypts the second communication key and the third random key. In the application, the communication key encrypts the communication data, the random key encrypts the communication key and the random key of the next site, and the security of communication between the VOBC and the ground terminal is improved through double encryption.

Description

Secret key distribution method for encrypted communication in rail transit
Technical Field
The embodiment of the application relates to the technical field of quantum communication, in particular to a secret key distribution method for encryption communication in rail transit.
Background
With the development of global informatization, the requirement of information technology on information security is increasing day by day, and quantum communication with high security is also more and more valued by people. In the field of Quantum communication, quantum Key Distribution (QKD) technology is one of core technologies.
The development of modern cities can not leave the urban rail transit, and along with the continuous expansion of cities, the rail transit also needs to be continuously expanded and developed. The Automatic Train Control (ATC) system in urban rail transit comprises: an Automatic Train Supervision (ATS) system, an Automatic Train Protection (ATP) system, and an Automatic Train Operation (ATO) system. In the ATC system, a vehicle-mounted Controller (VOBC) on a vehicle side and an ATS system/Zone Controller (ZC, zone Controller)/Computer Interlock (CI) on a ground side together implement a Communication-Based Train automatic Control (CBTC) system. The VOBC at the vehicle end and the ATS system/ZC/CI at the ground end realize communication through a wireless communication network.
In the related art, since the communication between the VOBC on the vehicle side and the ATS system/ZC/CI on the ground side is based on a wireless communication network, the security of the communication data is not high.
Disclosure of Invention
The application provides a secret key distribution method for encrypted communication in rail transit, which can be used for solving the problem that the safety of communication data is not high due to the fact that the communication between a VOBC at a vehicle end and an ATS system/ZC/CI at a ground end in the prior art is based on a wireless communication network.
The application provides a secret key distribution method for encrypted communication in rail transit, which comprises the following steps:
a first ground control terminal acquires a first random key and a second random key, wherein the first random key and the second random key are keys used for encrypting keys;
the first ground control terminal encrypts a first communication key and the second random key according to the first random key, wherein the first communication key is used for encrypting communication data of an Automatic Train Control (ATC) system;
the second ground control terminal acquires the second random key and the third random key;
the second ground control terminal encrypts a second communication key and the third random key according to the second random key, wherein the second communication key is used for encrypting communication data of the ATC system;
the first ground control terminal sends the encrypted first communication key and the second random key;
the vehicle-mounted controller VOBC receives and decrypts the encrypted first communication key and the second random key;
when the VOBC is located in a preset position interval, the second ground control terminal sends the encrypted second communication key and the encrypted third random key;
and the VOBC receives and decrypts the encrypted second communication key and the third random key.
Optionally, the obtaining, by the first ground control terminal, a first random key and a second random key includes:
if the first ground control terminal is the ground control terminal of the first station in the plurality of stations corresponding to the VOBC, using a preset random number as a first random key;
if the first ground control terminal is not the ground control terminal of the first station in the plurality of stations corresponding to the VOBC, a key management server group generates the first random key, wherein the key management server group comprises at least one key management server;
a first key management server corresponding to the first ground controller in the key management server group sends the first random key;
the first ground control terminal receives the first random key;
the key management server group generates the second random key;
the second random key of the first key management server in the key management server group;
and the first ground control terminal receives the second random secret key.
Optionally, the first ground control terminal and the second ground control terminal are ground control terminals of two adjacent platforms of a plurality of platforms corresponding to the VOBC.
Optionally, the method comprises:
if the first ground control terminal is the ground control terminal of the last station in the plurality of stations corresponding to the VOBC, the last two key management servers in the key management server group generate the first random key;
the last key management server in the key management server group sends the first random key;
the first ground control terminal receives the first random secret key;
the first ground control terminal encrypts the first communication key according to the first random key;
the first ground control terminal sends the encrypted first communication key;
the VOBC receives and decrypts the encrypted first communication key.
In the application, the communication key encrypts the communication data, the random key encrypts the communication key and the random key of the next site, and the security of communication between the VOBC and the ground terminal is improved through double encryption.
Drawings
FIG. 1 is a schematic illustration of an implementation environment provided by one embodiment of the present application;
fig. 2 is a flowchart of a key distribution method for encrypted communication in rail transit according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The system architecture and the application scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not constitute a limitation to the technical solution provided in the embodiment of the present application, and it can be known by a person skilled in the art that the technical solution provided in the embodiment of the present application is also applicable to similar technical problems along with the evolution of the system architecture and the appearance of new application scenarios.
Refer to fig. 1, which illustrates an exemplary embodiment of the present application. As shown in fig. 1, VOBC 101 is mounted in a train 102, and each station is provided with a ground control terminal. The ground control terminal 103 is configured with an ATS system/ZC/CI, etc. When the train 102 passes through different stations in the traveling process, a communication link is established with the ground control terminals 103 of the different stations, and the dispatching of the different ground control terminals is received within the traveling ranges corresponding to the different stations. Each site has an overhead key management server 104, and the key management servers 104 of the sites together constitute a key management server group. Each group of quantum keys is generated by two key management servers in the key management server group through negotiation.
Fig. 2 is a key distribution method for encrypted communication in rail transit, according to an exemplary embodiment, the method includes the following steps:
step 201, a first ground control terminal obtains a first random key and a second random key.
The first ground control terminal is a control terminal of a station corresponding to a driving range where the train is located at the current stage, and the first ground control terminal obtains the first random key and the second random key before the train drives into the range corresponding to the first ground control terminal. Wherein the first random key and the second random key are keys for encryption keys. When the VOBC on the train communicates with the ground control terminal, the communication data needs to be encrypted through a secret key to ensure the safety. The secret key used for encrypting the communication data is a communication secret key, and different ground control terminals adopt different communication secret keys. When the train runs to the range corresponding to different stations, the VOBC on the train adopts different communication keys to communicate with the ground control terminals of different stations. Therefore, before the train enters the range corresponding to the first ground control terminal, the first ground control terminal needs to obtain the first random key and the second random key to encrypt the first communication key and send the first communication key to the VOBC.
Alternatively, the key management server set generates the first random key if the first ground control terminal is not the ground control terminal of the first station of the plurality of stations corresponding to the VOBC. Each platform is provided with a key management server, and the key management servers of adjacent platforms establish communication links to jointly form a key management server group. The key management server group includes at least one key management server. The key management server comprises a quantum key transmitter and a quantum key receiver. And the key management servers of the adjacent stations negotiate to generate the quantum key. When the first ground control terminal is not used as the ground control terminal of the starting station of the train, the first key management server of the station corresponding to the first ground control terminal negotiates a quantum key with the key management server of the previous station through which the train passes. The quantum key serves as a first random key. The first key management server sends a first random key, and accordingly the first ground control terminal receives the first random key. The key management server group generates a second random key. And the first key management server and a second key management server of a station corresponding to the second ground control terminal negotiate the quantum key. The quantum key serves as a second random key. And the first ground control terminal receives the second random key sent by the first key management server. It should be noted that the first ground control terminal may obtain the first random key and the second random key at the same time, or may generate the first random key and the second random key sequentially, which is not specifically limited in this embodiment of the application.
Optionally, if the first ground control terminal is a ground control terminal of a first station of the plurality of stations corresponding to the VOBC, the predetermined random number is used as the first random key. The ground control terminals of each station are configured with pre-generated random numbers, and correspondingly, the VOBC stores the pre-set random numbers of the ground control terminals of each station in advance. When the first ground control terminal is used as a ground control terminal of an originating station of a train, the first ground control terminal takes a preset random number as a first random key. And the first key management server and a second key management server of a station corresponding to the second ground control terminal negotiate the quantum key. The quantum key serves as a second random key. And the first ground control terminal receives the second random key sent by the first key management server, and the second ground control terminal receives the second random key sent by the second key management server.
Step 202, the first ground control terminal encrypts the first communication key and the second random key according to the first random key.
Before the VOBC drives into the range of the corresponding station of the first ground control terminal along with the train, the first ground control terminal encrypts the first communication key and the second random key according to the first random key. The first communication key is used for encrypting communication data of the Automatic Train Control (ATC) system.
And step 203, the second ground control terminal acquires a second random key and a third random key.
The manner of the second ground control terminal obtaining the second random key and the third random key is the same as the manner of the first ground control terminal obtaining the first random key and the second random key. The second ground control terminal does not act as a ground control terminal for the origination station of the train. And the second key management server of the station corresponding to the second ground control terminal negotiates the quantum key with the first key management server. The quantum key serves as a second random key. And the second key management server sends a second random key, and accordingly, the second ground control terminal receives the second random key. The key management server group generates a third random key. The second key management server and a third key management server of a next site of the sites corresponding to the second ground control terminal negotiate the quantum key. The quantum key serves as a third random key. And the second ground control terminal receives the second random key sent by the second key management server, and the third ground control terminal receives the second random key sent by the third key management server. It should be noted that step 203 may occur simultaneously with step 201 or after step 201, and the embodiment of the present application is not particularly limited.
And step 204, the second ground control terminal encrypts the second communication key and the third random key according to the second random key.
And before the VOBC drives into the range of the corresponding station of the second ground control terminal along with the train, the second ground control terminal encrypts the second communication key and the third random key according to the second random key. The second communication key is used for encrypting communication data of the Automatic Train Control (ATC) system.
And step 205, the first ground control terminal sends the encrypted first communication key and the encrypted second random key.
And before the VOBC drives into the range of the corresponding station of the first ground control terminal along with the train, the first ground control terminal sends the encrypted first communication key and the encrypted second random key. The first ground control terminal may simultaneously transmit the encrypted first communication key and the encrypted second random key, or may separately encrypt and transmit the first communication key and the second random key.
The VOBC receives and decrypts the encrypted first communications key and the second random key, step 206.
And the VOBC receives the encrypted first communication key and the second random key and obtains the first communication key and the second random key by decryption according to the first random key. And after the train enters the driving range of the station corresponding to the first ground control terminal and the VOBC acquires the first communication key, the VOBC performs encrypted communication with the first ground control terminal by adopting the first communication key.
And step 207, when the VOBC is located in the preset position interval, the second ground control terminal sends the encrypted second communication key and the third random key.
When the train runs in the running range of the station corresponding to the first ground control terminal, the train gradually gets away from the first ground control terminal and gradually gets close to the second ground control terminal. The driving range of the station corresponding to the first ground control terminal and the driving range of the station corresponding to the second ground control terminal have an overlapping area, namely the overlapping area of the signal coverage areas of the first ground control terminal and the second ground control terminal. The position section of the train running track in the overlapping area is a preset position section. And when the VOBC is positioned in the preset position interval, the second ground control terminal sends the encrypted second communication key and the encrypted third random key. The second ground control terminal may simultaneously send the encrypted second communication key and the encrypted third random key, or may separately encrypt and send the second communication key and the third random key.
The vobc receives and decrypts the encrypted second communication key and the third random key, step 207.
And the VOBC receives the encrypted second communication key and the third random key and obtains the second communication key and the third random key by decryption according to the second random key. When entering the preset position interval, although the second ground control terminal transmits the encrypted second communication key and the third random key, time is required for transmitting and receiving data and decrypting the key by the VOBC. Therefore, after entering the preset position interval and when the VOBC does not obtain the decrypted second communication key, the VOBC still performs encrypted communication with the first ground control terminal by using the first communication key. And after entering the preset position interval and the VOBC acquires the second communication key, the VOBC carries out encrypted communication with the second ground control terminal by adopting the second communication key.
Optionally, if the first ground control terminal is a ground control terminal of a last station in the plurality of stations corresponding to the VOBC, the last two key management servers in the key management server group generate the first random key. And the last key management server in the key management server group sends the first random key, and correspondingly, the first ground control terminal receives the first random key. And the first ground control terminal encrypts a first communication key according to the first random key and sends the encrypted first communication key, and the VOBC receives and decrypts the encrypted first communication key.
In the method provided by the embodiment of the application, the communication key encrypts the communication data, and the random key encrypts the communication key and the random key of the next site, so that the security of the communication between the VOBC and the ground terminal is improved through double encryption.
The above-mentioned embodiments, objects, technical solutions and advantages of the embodiments of the present application are further described in detail, it should be understood that the above-mentioned embodiments are only specific embodiments of the present application, and are not intended to limit the scope of the embodiments of the present application, and any modifications, equivalent substitutions, improvements and the like made on the basis of the technical solutions of the embodiments of the present application should be included in the scope of the embodiments of the present application.

Claims (4)

1. A secret key distribution method for encrypted communication in rail transit is characterized by comprising the following steps:
a first ground control terminal acquires a first random key and a second random key, wherein the first random key and the second random key are keys used for encrypting keys;
the first ground control terminal encrypts a first communication key and the second random key according to the first random key, wherein the first communication key is used for encrypting communication data of an Automatic Train Control (ATC) system;
the second ground control terminal acquires the second random key and the third random key;
the second ground control terminal encrypts a second communication key and the third random key according to the second random key, wherein the second communication key is used for encrypting communication data of the ATC system;
the first ground control terminal sends the encrypted first communication key and the encrypted second random key;
the vehicle-mounted controller VOBC receives and decrypts the encrypted first communication key and the encrypted second random key;
when the VOBC is located in a preset position interval, the second ground control terminal sends the encrypted second communication key and the encrypted third random key;
the VOBC receives and decrypts the encrypted second communication key and the third random key.
2. The method according to claim 1, wherein the first ground control terminal obtaining the first random key and the second random key comprises:
if the first ground control terminal is the ground control terminal of the first station in the plurality of stations corresponding to the VOBC, using a preset random number as a first random key;
if the first ground control terminal is not the ground control terminal of the first station in the plurality of stations corresponding to the VOBC, a key management server group generates the first random key, wherein the key management server group comprises at least one key management server;
a first key management server corresponding to the first ground controller in the key management server group sends the first random key;
the first ground control terminal receives the first random secret key;
the key management server group generates the second random key;
the second random key of the first key management server in the key management server group;
and the first ground control terminal receives the second random secret key.
3. The method of claim 1, wherein the first ground control terminal and the second ground control terminal are ground control terminals of two adjacent stations of a plurality of stations corresponding to the VOBC.
4. The method according to claim 1, characterized in that it comprises:
if the first ground control terminal is the ground control terminal of the last station in the plurality of stations corresponding to the VOBC, the last two key management servers in the key management server group generate the first random key;
the last key management server in the key management server group sends the first random key;
the first ground control terminal receives the first random secret key;
the first ground control terminal encrypts the first communication key according to the first random key;
the first ground control terminal sends the encrypted first communication key;
and the VOBC receives and decrypts the encrypted first communication key.
CN202211186141.8A 2022-09-28 2022-09-28 Quantum key distribution method for rail transit system Active CN115297475B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211186141.8A CN115297475B (en) 2022-09-28 2022-09-28 Quantum key distribution method for rail transit system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211186141.8A CN115297475B (en) 2022-09-28 2022-09-28 Quantum key distribution method for rail transit system

Publications (2)

Publication Number Publication Date
CN115297475A true CN115297475A (en) 2022-11-04
CN115297475B CN115297475B (en) 2023-01-06

Family

ID=83834066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211186141.8A Active CN115297475B (en) 2022-09-28 2022-09-28 Quantum key distribution method for rail transit system

Country Status (1)

Country Link
CN (1) CN115297475B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103459234A (en) * 2011-04-05 2013-12-18 西门子公司 Key management system and method for a train protection system
CN109005028A (en) * 2018-11-02 2018-12-14 美的集团股份有限公司 Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system
CN109688585A (en) * 2018-12-28 2019-04-26 卡斯柯信号有限公司 Vehicle-ground wireless communication encryption method and device applied to train monitoring system
CN112799379A (en) * 2021-01-04 2021-05-14 中车青岛四方车辆研究所有限公司 Distributed automatic test system based on OPC UA architecture Pub-Sub mode
CN113225179A (en) * 2021-04-07 2021-08-06 卡斯柯信号有限公司 Encryption method for train controller

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103459234A (en) * 2011-04-05 2013-12-18 西门子公司 Key management system and method for a train protection system
CN109005028A (en) * 2018-11-02 2018-12-14 美的集团股份有限公司 Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system
CN109688585A (en) * 2018-12-28 2019-04-26 卡斯柯信号有限公司 Vehicle-ground wireless communication encryption method and device applied to train monitoring system
CN112799379A (en) * 2021-01-04 2021-05-14 中车青岛四方车辆研究所有限公司 Distributed automatic test system based on OPC UA architecture Pub-Sub mode
CN113225179A (en) * 2021-04-07 2021-08-06 卡斯柯信号有限公司 Encryption method for train controller

Also Published As

Publication number Publication date
CN115297475B (en) 2023-01-06

Similar Documents

Publication Publication Date Title
EP2039583B1 (en) Railway radio control system
CN104994112A (en) Method for encrypting communication data chain between unmanned aerial vehicle and ground station
CN111148073B (en) Secret key management method and system for train-ground communication transmission information
US7107051B1 (en) Technique to establish wireless session keys suitable for roaming
CN107204847B (en) System and method for access authentication and key agreement of air overhead traveling crane ground track private network
CN106961682A (en) A kind of group based on mobile relay is to path mobile handoff authentication method
CN109005539B (en) Privacy protection method for vehicle node positions in VANETs based on encrypted Mix-Zone
CN116471587B (en) Method for generating and updating intra-train communication key under V2V communication
KR102282633B1 (en) Method of linkage certification between railway control system and multiple radio-blocking devices
CN104254999A (en) Encryption communication system, communication device, key distribution device, encryption communication method
JP6092548B2 (en) Radio system and train control system
JP2012227672A (en) Inter-vehicle/road-to-vehicle communication system
Verma et al. SeGCom: secure group communication in VANETs
Lakshminarayana et al. Signal jamming attacks against communication-based train control: Attack impact and countermeasure
CN105812131A (en) Vehicle node certificate updating method based on Vehicle to X (V2X) network
JP5016394B2 (en) Wireless control security system
CN115396887A (en) Rapid and safe switching authentication method, device and system for high-speed mobile terminal
CN104883372A (en) Anti-cheating and anti-attack data transmission method based on wireless Ad Hoc network
CN112565285B (en) Communication encryption method suitable for rail transit
CN115297475B (en) Quantum key distribution method for rail transit system
EP3219575B1 (en) Method for securing the exchange of authentication keys and associated key management module
CN111479237B (en) Decentralized distributed VANET system based on block chain and deep learning
CN1756149B (en) Cipher key updating method of dispersible environment and its system
Arsuaga et al. A framework for vulnerability detection in European train control railway communications
JP2000233750A (en) Digital communication system of train control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant