Scientific and technical journal

«Automation and Informatization of the fuel and energy complex»

ISSN 0132-2222

INFORMATION SECURITY OF DATA TRANSFER UNDER CONDITIONS OF LIMITED ENERGY CONSUMPTION

UDC: 004.056
DOI: 10.33285/0132-2222-2021-3(572)-27-34

Authors:

KRASNOV ANDREY NIKOLAEVICH 1,
PRAKHOVA MARINA YURIEVNA 1,
NOVIKOVA YULIA VIKTOROVNA 1

1 Ufa State Petroleum Technological University, Ufa, Russian Federation

Keywords: asymmetric encryption/decryption algorithm, Diffie - Hellman algorithm, RSA Algorithm, information security module, wireless transmission of measurement data

Annotation:

The paper discusses the information security module for the automated process control system of gas fields located in the Far North. A specific feature of the module is its limited power consumption. Studies of its energy efficiency for various encryption/decryption algorithms have shown that the Diffie - Hellman algorithm is optimal from the point of view of this criterion. The introduction of this module into the existing software will increase the level of information security of the industrial process control system by protecting the transmitted data from third parties.

Bibliography:

1. Краснов А.Н., Прахова М.Ю., Хорошавина Е.А. Использование беспроводных сетей в системах автоматизации газовых месторождений // Электрон. науч. журн. "Нефтегазовое дело". - 2016. - № 4. - С. 205-221.
2. Регистратор технологических параметров РТП-04М / Завод "ТИЗПРИБОР". - URL: http://tizpribor.com/files/docs/catalog/gazokonskvazhin/rtp_04m1.pdf
3. ГОСТ Р ИСО/МЭК 27002-2012. Информационная технология (ИТ). Методы и средства обеспечения безопасности. Свод норм и правил менеджмента информационной безопасности. - Введ. 2014-01-01. - М.: Стандартинформ, 2014. - 198 с.
4. Об информации, информационных технологиях и о защите информации: федер. закон от 27.07.2006 № 149-ФЗ // Собр. законодательства РФ. - 2006. - 34 с.
5. Diffie W., Hellman M. New directions in cryptography // IEEE Transactions on Information Theory. - 1976. - Vol. 22, Issue 6. - С. 644-654. - DOI: 10.1109/TIT.1976.1055638
6. Терехов А.Н., Тискин А.В. Криптография с открытым ключом: от теории к стандарту // Программирование. - 1994. - № 5. - С. 17-22.
7. Goldwasser S., Bellare M. Lecture Notes on Cryptography. - Cambridge, MА., 2008. - 289 p.
8. Cryptology ePrint Archive: Report 2012/064. - URL: https://eprint.iacr.org/2012/064
9. Measure app performance with Android Profiler. - URL: https://developer.android.com/studio/profile/android-profiler
10. Energy Profiler. - URL: https://www.silabs.com/community/software/simplicity-studio/forum.topic.html /energy_profiler