Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A distributed access authentication management method in a leo satellite network

A technology for access authentication and satellite network, which is applied to network topology, usage of multiple keys/algorithms, and key distribution, which can solve problems such as high computing and communication overhead, and achieve performance bottleneck avoidance, high scalability, and computing avoidance The effect of overhead and computing power waste

Active Publication Date: 2019-10-18
NANJING UNIV OF SCI & TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, the authentication method used in the traditional satellite network generally has a large calculation and communication overhead, and it is not suitable for the LEO satellite network with the characteristics of dynamic topology and frequent switching of communication links. Motorola Corporation of the United States Take the Iridium system as an example, the user can see a satellite for about 10 minutes, so it is necessary to develop a method that can quickly perform authentication, and at the same time, when frequent link switching occurs, it can realize user nodes between different satellites Fast Switching Security Authentication Method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A distributed access authentication management method in a leo satellite network
  • A distributed access authentication management method in a leo satellite network
  • A distributed access authentication management method in a leo satellite network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The distributed access authentication management method in the LEO satellite network of the present invention mainly has the following steps: for the convenience of description, specify that all the encryption and decryption methods using public and private keys involved in this method use the IBC encryption and decryption method, and the protocol involves All received message packets will contain a timestamp. When any node in the system receives a message packet, it will perform a timestamp check. The time stamp will not be described in the following description of the principle and process.

[0027] For the convenience of specific elaboration, first indicate the meaning of the following symbols:

[0028]

[0029]

[0030] Among them, KGC is used to calculate the user's public and private key pairs and issue authorization tokens (Authorization Token ) trusted center. If the user has registered and obtained his own public-private key pair and authorization token,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed access authentication management method in a LEO satellite network, which adopts an identity-based cryptographic system, uses the private key of the key generation center to quickly generate the public-private key pair of the user and the satellite node, and stores the public-private key pair in the identification field The identity information is agreed in the system to realize the role distinction in the system; at the same time, based on the chain distributed storage technology of the blockchain, a trusted chain with the key generation center and the satellite as the main body of trust is constructed to realize rapid access authentication of users and fast inter-satellite The handover identity verification function adapts to the characteristics of dynamic topology and frequent handover of satellite-ground links in the LEO satellite network. On the other hand, this method adopts the distributed storage technology of the block chain, and uses the trust chain as the consensus mechanism to record relevant information such as user registration, logout, login, logout, and switching, and to ensure the accuracy, integrity, and accuracy of user logs. Consistency, traceability and non-tampering, avoiding the bottleneck of the central node in the access function and authentication performance.

Description

technical field [0001] The present invention relates to encryption and decryption, identity authentication and distributed database technology, in particular, a database applicable to LEO satellite networks that can realize security authentication, fast switching, and distributed recording and storage of information such as registration, logout, login, logout, and switching. method. Background technique [0002] The identity-based cryptosystem (IBC) was first proposed by Shamir in 1984. Its biggest advantage is that each node can use its own identity to generate a public key, which can be calculated by the key generation center (KGC) accordingly. Private key, when a user needs to securely send information to another user, he only needs to use the receiver's identity to calculate its public key and use it for encryption, and the receiver uses KGC to calculate and return to his own private key for decryption , avoiding the overhead of key management and digital certificate is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/14H04L29/08H04L9/06
CPCH04L9/0847H04L9/14H04L67/1097H04L9/0643H04L9/3239H04W12/08H04L2209/80H04W84/06H04W36/0038H04L9/50
Inventor 魏松杰李帅程浩时召伟
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products