Distributed access authentication management method in LEO satellite network

A technology for access authentication and satellite network, which is applied to network topology, usage of multiple keys/algorithms, and key distribution, which can solve problems such as high computing and communication overhead, and achieve performance bottleneck avoidance, high scalability, and computing avoidance The effect of overhead and computing power waste

Active Publication Date: 2017-09-08
NANJING UNIV OF SCI & TECH
View PDF3 Cites 58 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, the authentication method used in the traditional satellite network generally has a large calculation and communication overhead, and it is not suitable for the LEO satellite network with the characteristics of dynamic topology and frequent switching of communication links. Motorola Corporation of the United Stat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed access authentication management method in LEO satellite network
  • Distributed access authentication management method in LEO satellite network
  • Distributed access authentication management method in LEO satellite network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The distributed access authentication management method in the LEO satellite network of the present invention mainly has the following steps: for the convenience of description, all the methods for encryption and decryption using public and private keys involved in this method are designated to use the IBC encryption and decryption method, and the protocol involves All received message packets will contain a timestamp. When any node in the system receives a message packet, it will perform a timestamp check. The time stamp will not be described in the following description of the principle and process.

[0027] For the convenience of specific elaboration, first indicate the meaning of the following symbols:

[0028]

[0029]

[0030] Among them, KGC is used to calculate the user's public and private key pairs and issue authorization tokens (Authorization Token ) trusted center. If the user has registered and obtained his own public-private key pair and authorizati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed access authentication management method in an LEO satellite network. By adoption of an identity-based cryptosystem, the public and private key pair of a user and a satellite node is rapidly generated by utilization of the private key of a key generation centre; furthermore, identity information is appointed in an identification field, so that role differentiation in a system is realized; simultaneously, on the basis of a chain distributed storage technology of a blockchain, a trusted chain taking the key generation centre and a satellite as trust main bodies is constructed; the identity authentication function for rapid access authentication and inter-satellite rapid switching of users can be realized; the method is suitable for dynamic topology and frequent switching of a satellite-to-earth link in the LEO satellite network; on the other hand, the distributed storage technology of the blockchain is adopted in the method; the trusted chain is used as a consensus mechanism; related information, such as user registration, cancel, login, logout and switching, can be recorded; the accuracy, the integrity, the consistency, the retrospective property and the non-tampering property of user logs can be ensured; and thus, bottleneck restriction of centre nodes on the access function and the authentication property can be avoided.

Description

technical field [0001] The present invention relates to encryption and decryption, identity authentication and distributed database technology, in particular, a database applicable to LEO satellite networks that can realize security authentication, fast switching, and distributed recording and storage of information such as registration, logout, login, logout, and switching. method. Background technique [0002] The identity-based cryptosystem (IBC) was first proposed by Shamir in 1984. Its biggest advantage is that each node can use its own identity to generate a public key, which can be calculated by the key generation center (KGC) accordingly. Private key, when a user needs to securely send information to another user, he only needs to use the receiver's identity to calculate its public key and use it for encryption, and the receiver uses KGC to calculate and return to his own private key for decryption , avoiding the overhead of key management and digital certificate is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/14H04L29/08H04L9/06
CPCH04L9/0847H04L9/14H04L67/1097H04L9/0643H04L9/3239H04W12/08H04L2209/80H04W84/06H04W36/0038H04L9/50
Inventor 魏松杰李帅程浩时召伟
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products