Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for private network access authentication and key negotiation of space vehicle and earth track

A technology for access authentication and key negotiation, which is applied in the field of access authentication and key negotiation of aerospace information network, access authentication and key agreement protocol for the track dedicated network of aerospace, vehicle and ground information integration, and can solve the problem of Problems such as large amount of calculation, inapplicability, and reduced efficiency of the access process achieve the effect of long replacement cycle, easy actual operation, and efficient access to authentication protocols

Active Publication Date: 2021-03-23
XIDIAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In other words, a large number of public key encryption and decryption calculations for transmitting authentication data require terminal computing capabilities, and the calculation time is increased, and the efficiency of the access process is reduced
[0007] The existing aerospace information network access authentication scheme solves the problem of mutual authentication and establishment of secure communication between mobile terminals under the coverage area of ​​the space-based platform, but has a low degree of fit with the dedicated network for aerospace-vehicle-ground information integration, and does not involve the core The authentication and key agreement method of the network part; even for the improvement scheme of the LTE security authentication protocol, the global public key cryptosystem is used to solve the security vulnerability, but it introduces a large amount of calculation, and the access efficiency of the user equipment is low, so it is not necessary Applicable to the dedicated network application scenario of air-sky-vehicle-ground information integration

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for private network access authentication and key negotiation of space vehicle and earth track
  • System and method for private network access authentication and key negotiation of space vehicle and earth track
  • System and method for private network access authentication and key negotiation of space vehicle and earth track

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] The space-space-vehicle-ground information integrated track special network is to use single or multiple stratospheric airships placed in the adjacent space above 20-50 kilometers to form a static stagnant platform, and to install communication signal receiving, processing and exchange platforms, which are convenient for ground high-speed rail users and Wayside sensor equipment provides wireless broadband point-to-multipoint services.

[0029] In this network, all network nodes use wireless communication. The openness of the wireless channel makes the transmission information easy to be monitored, and the limited wireless bandwidth resources make it difficult to apply complex security algorithms. In addition, since this system involves my country's railway transportation infrastructure, including key equipment such as high-speed rail, airships, ground mobile measurement and control stations, and safety operation guarantee centers, once an information security accident oc...

Embodiment 2

[0040] The composition of the access authentication and key agreement protocol for the space-aerospace-vehicle-ground information integration private network is the same as that in Embodiment 1. In the present invention, the symmetric key K is obtained through negotiation after the identity authentication is completed by the core network configuration authentication subsystem, and is applied to the user In the access authentication subsystem, the encryption of the link between the airship and the security and operation guarantee center in the user equipment access process is realized to ensure the safe transmission of communication data.

[0041] The improvement of the present invention avoids the problem of plaintext transmission in the original LTE security authentication mechanism. Compared with other LTE improvement schemes based on the global encryption method of public key cryptography, the symmetric encryption mechanism in the present invention has a smaller calculation a...

Embodiment 3

[0043] The composition of the access authentication and key agreement protocol for the dedicated network of aerospace, vehicle, and ground information integration is the same as that of Embodiment 1-2, and the access authentication is completed between the airship and the safety and operation support center, and the symmetric key obtained through negotiation K, establish a secure channel, as follows:

[0044] (1.a) The airship obtains the public key of the safety and operation assurance center;

[0045] (1.b) The airship uses the public key ground security and operation support center to send an access request;

[0046] (1.c) The Ground Security and Operation Support Center obtains the public key of the airship;

[0047] (1.d) The Ground Safety and Operation Support Center sends a request response to the airship;

[0048] (1.e) The airship verifies the authenticity of the safety and operation assurance center;

[0049] (1.f) After the security and operation support center v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access authentication and key agreement protocol and a method of a special network for space-aeronautics-vehicle-ground tracks. An authentication system consists of a core network configuration authentication subsystem and a user access authentication subsystem, which completes authentication and key agreement between an airship and a security and operation guarantee center and authentication and key agreement between a user and the airship respectively. In view of the structure and communication characteristics of the special network for space-aeronautics-vehicle-ground tracks, a core network configuration subsystem is constructed. Authentication and key agreement between the airship and the security and operation guarantee center is completed with a public key password to get symmetric keys. Symmetric keys used between the user and the airship are mutually authenticated on the basis of an LTE protocol to get a session key. The problem on secure communication and key updating is solved. There is no need for an authentication center to participate in user access authentication and key agreement. The use of symmetric keys ensures light workload and high efficiency. The method is used in access authentication of airship, high-speed rail and trackside equipment users and key agreement, and ensures secure transmission of a wireless communication link from the user to the airship and to the security and operation guarantee center.

Description

technical field [0001] The invention belongs to the field of communication technology, and relates to access authentication and key negotiation of an aerospace information network, in particular to an access authentication and key negotiation protocol and method for a dedicated orbital network oriented to aerospace, vehicle, and ground information integration. It is used for access authentication and key negotiation of user equipment such as airships, high-speed railways, and trackside equipment to ensure safe transmission of wireless communication links from user equipment to airships to security and operation support centers. Background technique [0002] Space-Sky-Vehicle-Ground Information Integrated Track Special Network uses the stratospheric airship as a relay platform, and provides wireless broadband point-to-point communication for user equipment such as ground high-speed rail, trackside sensors, and drones by installing communication signal receiving, processing, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04W12/02H04W12/03H04W12/0431H04W12/06H04B7/185
CPCH04B7/18504H04B7/18506H04L9/0838H04L9/0844H04W12/02H04W12/04H04W12/06
Inventor 朱晓妍王上庆贾鑫张海林
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products