An identity authentication method for UAV and base station communication based on elliptic curve encryption

An elliptic curve encryption and elliptic curve technology, which is applied in wireless communication, user identity/authority verification, and key distribution, can solve communication security communication delays and other issues, and achieve the effects of preventing replay attacks, ensuring communication security, and ensuring identity privacy

Active Publication Date: 2021-11-19
HENAN UNIVERSITY
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, there is an urgent need for a method to solve the communication security and communication delay problems caused by the communication between the UAV and the road base station

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity authentication method for UAV and base station communication based on elliptic curve encryption
  • An identity authentication method for UAV and base station communication based on elliptic curve encryption
  • An identity authentication method for UAV and base station communication based on elliptic curve encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033]The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0034] The trusted center TA (Trusted Authority) is the most trusted device by default in this method. It is responsible for generating various data parameters for the system. TA stores the identity information of the drone and the road base station, and is responsible for providing The base station is used as identity proof, and it is a trusted middleman for the communication between the drone and the ground base station.

[0035] Such as figure 1 Shown, the present invention comprises the following steps:

[0036] S1: TA initializes the parameters of each UAV in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The purpose of the present invention is to design a UAV and base station communication identity authentication method based on elliptic curve encryption, including: the system is initialized, the trusted center generates system parameters and broadcasts them to the UAV network; Each drone is authenticated and registered by the trusted center; the road base station and the drone initiate an authentication request; after the authentication is successful, the road base station sends an instruction packet to the drone, and the drone receives the instruction and executes the instruction task. The authentication method is mainly based on the theory of elliptic curve cryptography, based on the Elliptic Curve Discrete Logarithm Problem (ECDLP) to ensure the difficulty of deciphering the communication data; The communication security of the drone ensures the identity privacy of the road base station and the drone, and can effectively prevent replay attacks, man-in-the-middle attacks, prevent malicious attacks from causing the drone to perform malicious tasks, and ensure the communication security of the drone.

Description

technical field [0001] The invention belongs to the technical field of encrypted communication, and in particular relates to an identity authentication method for communication between a drone and a base station based on elliptic curve encryption. Background technique [0002] With the development of UAV technology, the potential risks and security problems of UAVs have gradually become prominent, and UAVs are also more vulnerable to malicious attacks. Threats to drone safety may come from flight controllers and ground controllers, wireless data links, sensor road infrastructure. Since the UAV communicates through the wireless network, the attack is generally carried out through the wireless channel. During the data communication of the UAV, it will also cause man-in-the-middle attacks, replay attacks, and denial-of-service attacks. At present, most drones do not consider malicious attacks when communicating, so no authentication is required during the data transmission pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04L9/32H04L9/30H04L9/08H04L9/06
CPCH04L9/0643H04L9/0866H04L9/0869H04L9/3066H04L9/3297H04W12/02
Inventor 杜晓玉李茵茵周素芳郭启程张延宇李伟
Owner HENAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products