Identity-based unmanned aerial vehicle key management and networking authentication system and method

An authentication method and key management technology, applied in the field of identity-based UAV key management and networking authentication system, can solve the problems of frequent topology changes, unsuitable deployment of UAV networks, and high communication delay.

Active Publication Date: 2019-01-15
XIDIAN UNIV +1
View PDF12 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantages of this invention are: first, it does not take into account the strong mobility of drones, and it is feasible for mobile drones to find multiple one-hop neighbor service nodes; second, the serial execution between service nodes The process of distributing keys can cause synchronization issues and high communication latency
[0004] (1) Existing technology-there are service nodes that provide trusted platforms in the network, and the computing inequality between common UAV nodes and service nodes. The service nodes undertake the main computing tasks, but the topology of the UAV network changes frequently. The service node cannot provide effective services
[0005] (2) The serial execution process of distributing keys between service nodes in the prior art will lead to synchronization problems and high communication delay, which is not suitable for deployment in UAV networks
[0007] There is a lack of infrastructure in the UAV network, and the topology changes frequently. The key management suitable for the UAV network must be completed by the UAV self-organization. Key Management Service
In addition, the computing power of the UAV is limited, and the wireless link is unstable. The communication overhead and computing overhead generated by the key management scheme need to be within the range of the UAV.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based unmanned aerial vehicle key management and networking authentication system and method
  • Identity-based unmanned aerial vehicle key management and networking authentication system and method
  • Identity-based unmanned aerial vehicle key management and networking authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0104] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0105] In view of the key management of the existing UAV network, there are service nodes, and there is a problem of unequal calculation between ordinary UAV nodes and service nodes; the serial execution key distribution process between service nodes will cause synchronization problems and communication time. The problem of high delay; the present invention provides an identity-based UAV key management and networking authentication system and method, which can make the nodes in the UAV network distributed in the absence of a trusted third party. Generate key pairs used by nodes for network authentication, realize network au...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of a device for verifying the identity or credentials of a system user, and discloses an identity-based unmanned aerial vehicle key management and networking authentication system and a method thereof. The ground authentication server is responsible for generating and distributing system parameters, identity information and keys required by the unmannedaerial vehicle for key management and network authentication. UAV authentication client is the main body of the system; Through mutual cooperation, the key pairs of UAV for network authentication canbe generated in a distributed manner, and the identity authentication and key agreement between UAV can be realized by using the key pairs. The invention improves the problem of unequal calculation of nodes in the key management of the UAV network existing in the prior art, enhances the reliability of the system, and realizes the key management of the UAV self-organization. The two-way authentication between UAV nodes ensures the credibility and authenticity of both sides of the communication. Using identity public key and bilinear pairing implementation, the computational overhead is less and the implementation efficiency is improved.

Description

technical field [0001] The invention belongs to the technical field of devices for checking the identity or credentials of system users, and in particular relates to an identity-based UAV key management and networking authentication system and method. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: UAVs, as a member of modern air military forces, have the advantages of no casualties, few use restrictions, and good concealment, and they are playing an increasingly important role in modern warfare. status. The research on the confrontation of UAVs has become the focus of the research of various military powers today. With the complexity of the electromagnetic environment and the increasing trend of communication confrontation, the problems faced by drones in the process of information transmission such as deception, interference and eavesdropping by attackers have also become more serious. Cryptography technol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32H04L29/06
CPCH04L9/0822H04L9/0825H04L9/0838H04L9/0861H04L9/3073H04L9/3247H04L63/08H04L63/0869
Inventor 朱辉张业平张之义李晖武衡于攀王枫为赵海强
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products