Inter-satellite networking authentication system and method suitable for double-layer satellite network

A dual-layer satellite network and inter-satellite networking technology, applied in the field of information security, can solve the problems of incompatibility with satellite network networking scenarios, denial of service, difficulty in satellite independence, independent trust establishment, and secure communication.

Active Publication Date: 2018-09-21
XIDIAN UNIV +1
View PDF10 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (1) Inter-satellite identity authentication requires ground participation. Without the participation of trusted third parties such as ground stations, it is difficult to achieve independent and independent trust establishment and secure communication between satellites, which is not suitable for satellite network groups with massive nodes. network scene;
[0010] (2) Inter-satellite identity authentication does not protect its own identity information, so that attackers can use the intercepted plaintext identity information to forge access requests, thereby carrying out attacks such as denial of service and interfering with satellite networking;
[0011] (3) The calculation overhead of inter-satellite identity authentication will affect the authentication delay. Compared with the satellite network with a small number of nodes, in the satellite network with a large number of nodes, due to the more frequent network authentication, the inter-satellite network will be due to the satellite network. Authentication delay due to computer computing power problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Inter-satellite networking authentication system and method suitable for double-layer satellite network
  • Inter-satellite networking authentication system and method suitable for double-layer satellite network
  • Inter-satellite networking authentication system and method suitable for double-layer satellite network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0090] The existing technology cannot realize trust establishment and secure communication between satellites without the participation of a trusted third party. The present invention provides an inter-satellite networking authentication method applicable to a double-layer satellite network, comprising:

[0091] LEO completes the identity authentication of GEO by judging whether the locally calculated XMAC is equal to the MAC in Token; GEO completes the identity authentication of LEO by judging whether the locally stored XRES is equal to the returned RES; when performing identity authentication, GEO and The authentication ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information safety, and discloses an inter-satellite networking authentication system and method suitable for a double-layer satellite network. The system comprises a ground authentication server, a high-orbit satellite authentication client and a low-orbit satellite authentication client, wherein the ground authentication server is used for completing initialization of a satellite authentication system, namely generating and distributing identity information, a secret key and track parameters which are needed for authentication between the satellites; the high-orbit satellite authentication client and the low-orbit satellite authentication client are main bodies of inter-satellite networking authentication, and the inter-satellite identity authentication and key negotiation are realized through the interaction of authentication parameters. An authentication precomputation mechanism is designed by utilizing the characteristics that a satellite network clock is highly synchronous and a node operation trajectory can be predicted, so that the authentication efficiency between the satellites is effectively improved. According to the system and the method, safe and efficient identity authentication and secret key negotiation of a high-orbit satellite and a low-orbit satellite in a networking stage can be realized, and the system and the method can be applied to networking authentication between the high-orbit satellite and the low-orbit satellite.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an inter-satellite network authentication system and method suitable for a double-layer satellite network. It can be used to provide satellite identity authentication services for commercial satellite networks during satellite networking, and can realize trust establishment and secure communication between satellites without the participation of a trusted third party. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] Since the current satellite network contains a small number of satellites, such as Iridium (66) and GPS (24), the satellite network is mainly controlled by the ground station. Satellite network authentication usually adopts the way that the ground station directly assigns authentication parameters, session keys, etc. to the satellite. In this control structure, satelli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04B7/185H04L9/08H04L9/32H04L29/06
CPCH04B7/18521H04L9/0863H04L9/3213H04L9/3297H04L63/083
Inventor 朱辉武衡张之义李晖赵海强王宇辉
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products