Security scheme for time-critical TRDP message

As train communication technology advanced, the environment of train control networks became increasingly complex, with more network bandwidth being demanded by on-board devices and greater complexity emerging in network topology. Consequently, the physical layer carrier for train internet gradually...

Full description

Saved in:
Bibliographic Details
Main Authors: CUI Yulong, WU Xuechao, CHENG Youlin, LU Xiang
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2025-06-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2025028
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849421476406493184
author CUI Yulong
WU Xuechao
CHENG Youlin
LU Xiang
author_facet CUI Yulong
WU Xuechao
CHENG Youlin
LU Xiang
author_sort CUI Yulong
collection DOAJ
description As train communication technology advanced, the environment of train control networks became increasingly complex, with more network bandwidth being demanded by on-board devices and greater complexity emerging in network topology. Consequently, the physical layer carrier for train internet gradually transitioned from serial communication bus networks to Ethernet. To ensure the normal operation of the Ethernet protocol stack in the train internet and meet the unique requirements of the train internet, the TRDP protocol was proposed by the TCN alliance and has now become an essential part of data transmission for on-board devices. However, with the introduction of the Ethernet architecture, traditional computer network security risks were also brought into the train communication network. The TRDP protocol, built upon Ethernet, lacked effective security protection mechanisms and faced a series of risks such as malicious attacks, data leakage, and denial of service. Based on the TRDP protocol, the differences and requirements of its two protocol modes, message data and process data, were analyzed. Suitable encryption protocols in line with the actual situation of the train internet were selected, protocol details were improved, and a security scheme based on encryption protocols was designed. Furthermore, a model system was constructed on this foundation. The system demonstrates how these key security technologies can be combined to build a secure TRDP train information system and proves that it can meet the performance requirements of the train internet for the TRDP protocol while ensuring the security of the protocol.
format Article
id doaj-art-4a0468ba5cd74aca8add98917bca8f45
institution Kabale University
issn 2096-109X
language English
publishDate 2025-06-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-4a0468ba5cd74aca8add98917bca8f452025-08-20T03:31:27ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2025-06-01118197113007811Security scheme for time-critical TRDP messageCUI YulongWU XuechaoCHENG YoulinLU XiangAs train communication technology advanced, the environment of train control networks became increasingly complex, with more network bandwidth being demanded by on-board devices and greater complexity emerging in network topology. Consequently, the physical layer carrier for train internet gradually transitioned from serial communication bus networks to Ethernet. To ensure the normal operation of the Ethernet protocol stack in the train internet and meet the unique requirements of the train internet, the TRDP protocol was proposed by the TCN alliance and has now become an essential part of data transmission for on-board devices. However, with the introduction of the Ethernet architecture, traditional computer network security risks were also brought into the train communication network. The TRDP protocol, built upon Ethernet, lacked effective security protection mechanisms and faced a series of risks such as malicious attacks, data leakage, and denial of service. Based on the TRDP protocol, the differences and requirements of its two protocol modes, message data and process data, were analyzed. Suitable encryption protocols in line with the actual situation of the train internet were selected, protocol details were improved, and a security scheme based on encryption protocols was designed. Furthermore, a model system was constructed on this foundation. The system demonstrates how these key security technologies can be combined to build a secure TRDP train information system and proves that it can meet the performance requirements of the train internet for the TRDP protocol while ensuring the security of the protocol.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2025028train communication networkTRDPethernetnetwork securitycryptographic protocol design
spellingShingle CUI Yulong
WU Xuechao
CHENG Youlin
LU Xiang
Security scheme for time-critical TRDP message
网络与信息安全学报
train communication network
TRDP
ethernet
network security
cryptographic protocol design
title Security scheme for time-critical TRDP message
title_full Security scheme for time-critical TRDP message
title_fullStr Security scheme for time-critical TRDP message
title_full_unstemmed Security scheme for time-critical TRDP message
title_short Security scheme for time-critical TRDP message
title_sort security scheme for time critical trdp message
topic train communication network
TRDP
ethernet
network security
cryptographic protocol design
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2025028
work_keys_str_mv AT cuiyulong securityschemefortimecriticaltrdpmessage
AT wuxuechao securityschemefortimecriticaltrdpmessage
AT chengyoulin securityschemefortimecriticaltrdpmessage
AT luxiang securityschemefortimecriticaltrdpmessage