Elliptic curve encryption-based unmanned aerial vehicle and base station communication identity authentication method

An elliptic curve encryption and elliptic curve technology, which is applied in wireless communication, user identity/authority verification, and key distribution, can solve communication security communication delays and other issues, and achieve the effects of preventing malicious tasks, protecting communication security, and low latency

Active Publication Date: 2020-12-11
HENAN UNIVERSITY
View PDF11 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, there is an urgent need for a method to solve the communication security and commu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Elliptic curve encryption-based unmanned aerial vehicle and base station communication identity authentication method
  • Elliptic curve encryption-based unmanned aerial vehicle and base station communication identity authentication method
  • Elliptic curve encryption-based unmanned aerial vehicle and base station communication identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033]The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0034] The trusted center TA (Trusted Authority) is the most trusted device by default in this method. It is responsible for generating various data parameters for the system. TA stores the identity information of the drone and the road base station, and is responsible for providing The base station is used as identity proof, and it is a trusted middleman for the communication between the drone and the ground base station.

[0035] Such as figure 1 Shown, the present invention comprises the following steps:

[0036] S1: TA initializes the parameters of each UAV in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims to design an elliptic curve encryption-based unmanned aerial vehicle and base station communication identity authentication method, which comprises the following steps that: in an initialization stage of a system, a trusted center generates system parameters and broadcasts the system parameters to an unmanned aerial vehicle network; each unmanned aerial vehicle in the unmanned aerial vehicle group is authenticated and registered by the trusted center; the pavement base station and the unmanned aerial vehicle initiate an authentication request; and after successful authentication, the pavement base station sends an instruction packet to the unmanned aerial vehicle, and the unmanned aerial vehicle receives the instruction and executes an instruction task. The authentication method is mainly based on the elliptic curve cryptography theory, and based on the elliptic curve discrete logarithm problem (ECDLP), it is guaranteed that communication data are difficult to crack;the flow of identity authentication between the unmanned aerial vehicle and the pavement base station effectively protects the communication security of the pavement base station and the unmanned aerial vehicle, ensures the identity privacy of the pavement base station and the unmanned aerial vehicle, can effectively prevent replay attacks and man-in-the-middle attacks, prevents the unmanned aerial vehicle from executing malicious tasks due to malicious attacks, and ensures the communication security of the unmanned aerial vehicle.

Description

technical field [0001] The invention belongs to the technical field of encrypted communication, and in particular relates to an identity authentication method for communication between a drone and a base station based on elliptic curve encryption. Background technique [0002] With the development of UAV technology, the potential risks and security problems of UAVs have gradually become prominent, and UAVs are also more vulnerable to malicious attacks. Threats to drone safety may come from flight controllers and ground controllers, wireless data links, sensor road infrastructure. Since the UAV communicates through the wireless network, the attack is generally carried out through the wireless channel. During the data communication of the UAV, it will also cause man-in-the-middle attacks, replay attacks, and denial-of-service attacks. At present, most drones do not consider malicious attacks when communicating, so no authentication is required during the data transmission pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04L9/32H04L9/30H04L9/08H04L9/06
CPCH04L9/0643H04L9/0866H04L9/0869H04L9/3066H04L9/3297H04W12/02
Inventor 杜晓玉李茵茵周素芳郭启程张延宇李伟
Owner HENAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products