A trusted and secure access method for aerospace information network roaming

An aerospace information network and secure access technology, applied in the field of secure access, can solve problems such as inability to measure terminal integrity and credibility

Active Publication Date: 2017-02-01
BEIHANG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be used to solve the defect that the integrity and credibility of the terminal cannot be measured in the aerospace information network access protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A trusted and secure access method for aerospace information network roaming
  • A trusted and secure access method for aerospace information network roaming
  • A trusted and secure access method for aerospace information network roaming

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The implementation manner of the trusted security access method will be described in detail below with reference to the accompanying drawings.

[0054] Description of the main cryptography knowledge, trusted computing technology and security assumptions used in this method:

[0055] 1. Bilinear pairing: let G 1 , G 2 They are respectively the additive cyclic group and the multiplicative cyclic group whose prime number is q in the elliptic curve, and P is the group G 1 the generator of G , and G 1 The discrete logarithm problem on is intractable. Then the bilinear map e:G between two groups 1 ×G 1 →G 2 satisfy the following properties.

[0056] (1) Bilinearity: e(aP,bQ)=e(P,Q) ab , for all P,Q∈G 1 ;a, b∈Z are all established;

[0057] (2) Non-degenerate: there is P, Q∈G 1 , making e(P,Q)≠1;

[0058] (3) Computability: For P, Q∈G1 , there exist efficient algorithms to compute e(P,Q).

[0059] 2. PCR is the value of some registers in the TPM chip that represen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A trusted and secure access method for aerospace information network roaming, including five stages: node registration stage; request access stage; identity authentication stage; integrity verification stage; key generation stage; terminal access node MN and foreign security The domain authentication server FA completes the negotiation of the session key. At this time, the process of the entire aerospace information network roaming trusted security access method is completed, and the mutual identity authentication between the terminal access node MN and the foreign security domain authentication server FA is realized. and integrity measurement, and realize the session key exchange between the terminal access node MN and the foreign security domain authentication server FA involving the terminal access node MN, the foreign security domain authentication server FA, and the local domain security domain authentication server HA. negotiate. It has fewer interaction rounds, high session key security, uses trusted computing related technologies, and realizes the integrity measurement of terminal access points, and solves the attack on the network that is prone to occur due to terminal integrity and credibility. .

Description

technical field [0001] The present invention provides a trusted and secure access method for aerospace information network roaming, which relates to a trusted and secure network access method for terminal nodes in an aerospace information network environment. The method introduces the concept of trusted computing into the space In the Sky Information Network, the integrity measurement and trusted authentication of the terminal are realized, which belongs to the field of security access technology. Background technique [0002] Space Information Network (SIN) is a comprehensive information system based on satellite systems for navigation, communication, information support and security. Spacecraft (such as satellites, space shuttles, etc.), aircraft (such as airplanes, hot air balloons, etc.) and ground station systems with space communication capabilities are linked. like figure 1 shown. At the same time, the security issues caused by the openness of SIN transmission have...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/08H04W84/06H04W12/041H04W12/0431H04W12/069H04W12/10
Inventor 刘建伟张雷童丹
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products