| With the rapid development of e-government, e-commerce and e-payment, originalsensitive information system, using the means such as physical isolation, can no longerfulfill the need of application requirements today, and are inevitably transmitted throughnetwork. So research of transmission of sensitive information in open network haspotential application and theoretical significance. Because of the mobile communicationnetwork, public communication network, wireless network and the Internet coexistingin open network environment in the future, it is imperative to study secure transmissionproblem of sensitive information. This paper mainly studies key management schemeand communication protocol of sensitive information in the open network. Details are asfollows:Firstly, we defined and characterized the open network. We analyzed thevulnerabilities and security threats of the Internet, mobile networks and wirelessnetworks. Then we classified the security requirements transmission of sensitiveinformation in the open network.Second, we proposed a typical application scheme of sensitive informationsystemsunder the open network environment, and on this basis, we proposedan off-linedistribution encryption key management scheme under the ECC, through the analysis ofthe program’s performance and security, the results showed that it meet the securityneeds of sensitive information transmitted over open networks.Finally, we presented the secure transmission scheme between a mobile terminalandthe sensitive information network, or between the network and the network ofsensitive information, and then we gave a brief description of the IKEv2in the IPSecauthentication key agreement protocol, on this basis, we proposed improvedcommunication protocols based on IKEv2,and we used the communication pro tocolformal analysis tool SVO logic to formal prove the protocol. |