Beidou second-generation system anti-cheating method based on domestic password and spread spectrum information protection

A technology of information protection and domestic encryption, which is applied in the field of information security and can solve problems such as navigation system threats and information deception attacks

Inactive Publication Date: 2019-07-09
CIVIL AVIATION UNIV OF CHINA
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Both pose serious threats to navigation systems
If the page time authentication is successful, it means that the information in the group is continuous and reliable; otherwise, it means that the information in the group may be subject to spoofing attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Beidou second-generation system anti-cheating method based on domestic password and spread spectrum information protection
  • Beidou second-generation system anti-cheating method based on domestic password and spread spectrum information protection
  • Beidou second-generation system anti-cheating method based on domestic password and spread spectrum information protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0097] The software platform of the system test of the present invention is mainly based on these two parts of Visual Studio-OPENSSL (cipher part) and MATLAB (information transmitting and receiving part). Among them, computer 1 simulates the plaintext encryption process, ciphertext decryption process, signature information generation process, and signature information authentication process based on Visual Studio-OPENSSL, and computer 2 simulates the noise-adding channel based on MATLAB and the information of the transmitter and receiver The process is simulated. In the experiment, other relevant parameters are shown in Table 10.

[0098] Table 10 Experimental Instrument Related Parameters

[0099]

[0100]

[0101] In order to verify the validity of the scheme of the present invention, the specific simulation process is as follows Figure 10 The experimental framework shown was carried out. The specific experimental process and experimental results are as follows:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information security, and designs a beidou D2 navigation message anti-cheating scheme based on domestic passwords and spread spectrum information protection. In recent years, the Beidou navigation system serves as a new member of the GNSS, and the positioning principle of the Beidou navigation system is similar to that of the GPS. Signal parameters and information structures of civil signals are disclosed to the public through related files, so that a deception party can easily manufacture the deception signal and initiate a deception attack, thereby controlling a positioning result of a receiver and causing extremely serious consequences. According to the invention, domestic cryptographic algorithms (SM2, SM3 and SM4) are adopted to generateauthentication information, so that spoofing attacks are detected. In addition, the signature and other authentication information are subjected to information protection in a spread spectrum modulation mode, and therefore the authentication information is prevented from being tampered. According to the invention, a simulation experiment is carried out through MATLAB and OpenSSL platforms, and experiment results show that the method can resist spoofing attacks.

Description

technical field [0001] The invention relates to the technical field of information security, and is a safety authentication scheme of Beidou second-generation navigation message based on a domestic cipher and a spread spectrum code. Background technique [0002] The Beidou navigation system is a global satellite navigation system independently established and developed by my country. With the improvement of Beidou system construction and service capabilities, related products have been widely used in all walks of life, gradually penetrated into all aspects of social production and people's lives, and injected new vitality into my country's economic and social development. Therefore, it is very important for users to ensure the safety of satellite navigation signals. [0003] 1. Satellite navigation information spoofing attack [0004] But in recent years, with the continuous development of science and technology, the global satellite navigation system has been gradually af...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30
CPCH04L9/3066
Inventor 吴志军刘如森罗煊
Owner CIVIL AVIATION UNIV OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products