Font Size: a A A

Research On Security Strategy Of LKJ Data Management Technology

Posted on:2018-02-26Degree:MasterType:Thesis
Country:ChinaCandidate:N ZhangFull Text:PDF
GTID:2322330512493282Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Train operation monitoring and recording device(hereinafter referred to as LKJ)is important driving equipment that is used to prevent train overrun,burst-out,exceeding the speed limit and assit locomotive driver to improve the handling capacity.The basic work of the LKJ device is to pre-store the operating parameters for monitoring the train as the basis in the host.Therefore,the accuracy of the LKJ basic data has a significant impact on the safe operation of the train.Beacuae of the LKJ basic data management is complex and the management of all aspects are not perfect,the railway bureau is still in the exploration about the LKJ basic data management.In order to improve the status that the management of the basic data in LKJ is relatively messy,and can not update the data in time,and the different bureau can not share resources,Jinan Railway Bureau and Beijing Jiaotong University applied for China Railway Corporation's key project(the key technology of railway operation and deepen the research foundation-LKJ basic data management technology research),the topic of this paper is based on this background.To design and implement a variety of security measures that protectint every link's security of the LKJ basic data in the process of modification,storage and transmission is one of the LKJ basic data management aspects.This paper will discuss the security of LKJ basic data management system from three aspects:LKJ database security,software dongle and data security verification rule.The details are as follows:(1)Design a method that is based on AES algorithm,which has co-key dynamic selection rules on the LKJ database between server and client and selects field for the granularity of encryption,and protects the data storage and transmission process security.(2)Design and implement a software dongle that based on ATSHA204A chip,which is used for LKJ basic database authentication.Only with a software donle users have permissions to change the database,effectively preventing LKJ from being tampered by illegal users.(3)According to the characteristics of LKJ basic data,design a series of data security verification rules,which are established on the basis of sorting relationships between the relevant data.Software can automatically verify the legitimate users's operation is correct or not when add,modify,delete data.This rules can prevent users mistakenly fill or fill out the data which may cause immeasurable impact.
Keywords/Search Tags:LKJ basic data, Security, Software dongle, Data rules
PDF Full Text Request
Related items