YANG Li, WEI Xiukun, WEN Chenglin. A Security Defense Method Against Eavesdroppers in the Communication-Based Train Control System[J]. Chinese Journal of Electronics, 2023, 32(5): 992-1001. DOI: 10.23919/cje.2022.00.248
Citation: YANG Li, WEI Xiukun, WEN Chenglin. A Security Defense Method Against Eavesdroppers in the Communication-Based Train Control System[J]. Chinese Journal of Electronics, 2023, 32(5): 992-1001. DOI: 10.23919/cje.2022.00.248

A Security Defense Method Against Eavesdroppers in the Communication-Based Train Control System

  • The communication-based train control system is the safety guarantee for automatic train driving. Wireless communication brings network security risks to the communication-based train control system. The eavesdropping of the transmitted information by unauthorized third-party personnel will lead to the leakage of the estimated value of the system state, which will lead to major accidents. This paper focuses on solving the problem of defense against eavesdropping threats and proposes an eavesdropping defense architecture. This defense architecture includes a coding mechanism based on punishing eavesdroppers, an information upload trigger mechanism based on contribution, and a random information transmission strategy, and provides a guarantee for the privacy protection of information. This research makes three contributions. First, it is the first attempt to construct an information encoding mechanism with punishing eavesdroppers as the objective function; Second, for the first time, an information upload trigger mechanism based on contribution is proposed; Third, the strategy of random transmission of information is proposed. The proposed method in this paper is verified by taking the medium and low-speed maglev train as the object. The experimental results show that, compared with Gaussian noise and non-Gaussian noise mechanisms, the coding mechanism proposed in this paper can not only protect the security of information but also make the estimation error of eavesdroppers tend to be infinite. Using the state estimation error as a metric, the average growth rate of the state estimation error of the system using the trigger mechanism in this paper is less than 2% while improving the security of the system. The transmission strategy in this paper does not increase the system state estimation error while improving the security of the system.
  • loading

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return