Space information network roaming and trusted security access method

An aerospace information network and secure access technology, applied in the field of secure access, can solve problems such as inability to measure terminal integrity and credibility

Active Publication Date: 2014-03-12
BEIHANG UNIV
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be used to solve the defect that the integrity and credibility of the t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Space information network roaming and trusted security access method
  • Space information network roaming and trusted security access method
  • Space information network roaming and trusted security access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The implementation manner of the trusted security access method will be described in detail below with reference to the accompanying drawings.

[0054] Description of the main cryptography knowledge, trusted computing technology and security assumptions used in this method:

[0055] 1. Bilinear pairing: let G 1 , G 2 They are respectively the additive cyclic group and the multiplicative cyclic group whose prime number is q in the elliptic curve, and P is the group G 1 the generator of G , and G 1 The discrete logarithm problem on is intractable. Then the bilinear map e:G between two groups 1 ×G 1 →G 2 satisfy the following properties.

[0056] (1) Bilinearity: e(aP,bQ)=e(P,Q) ab , for all P,Q∈G 1 ;a, b∈Z are all established;

[0057] (2) Non-degenerate: there is P, Q∈G 1 , making e(P,Q)≠1;

[0058] (3) Computability: For P, Q∈G1 , there exist efficient algorithms to compute e(P,Q).

[0059] 2. PCR is the value of some registers in the TPM chip that represen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a space information network roaming and trusted security access method. The space information network roaming and trusted security access method includes a node registration stage, a request access stage, an identity authentication stage, an integrity verification stage and a key generation stage. Session key negotiation among terminal access nodes MN and a non-local security domain authentication server FA is completed, procedures of the integral space information network roaming and trusted security access method are completely completed at the moment, mutual identity authentication and integrity measurement among the terminal access nodes MN and the non-local security domain authentication server FA are implemented, and the terminal access nodes MN, the non-local security domain authentication server FA and a local security domain authentication server HA participate in the session key negotiation among the terminal access nodes MN and the non-local security domain authentication server FA. The space information network roaming and trusted security access method has the advantages that the interaction round number is low, session keys are high in security, a trusted computing related technology is utilized, the integrity of the terminal access nodes can be measured, and the problem of easy network attack due to poor integrity and trustworthiness of terminals can be solved.

Description

technical field [0001] The present invention provides a trusted and secure access method for aerospace information network roaming, which relates to a trusted and secure network access method for terminal nodes in an aerospace information network environment. The method introduces the concept of trusted computing into the space In the Sky Information Network, the integrity measurement and trusted authentication of the terminal are realized, which belongs to the field of security access technology. Background technique [0002] Space Information Network (SIN) is a comprehensive information system based on satellite systems for navigation, communication, information support and security. Spacecraft (such as satellites, space shuttles, etc.), aircraft (such as airplanes, hot air balloons, etc.) and ground station systems with space communication capabilities are linked. like figure 1 shown. At the same time, the security issues caused by the openness of SIN transmission have...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/08H04W84/06H04W12/041H04W12/0431H04W12/069H04W12/10
Inventor 刘建伟张雷童丹
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products