Inter-satellite authentication method, system, medium, equipment, terminal and application

An authentication method and authentication method technology, applied in the field of satellite network communication, can solve problems such as high authentication overhead, reduce communication cost and communication time, and realize the effect of fast authentication between satellites

Active Publication Date: 2022-02-08
XIDIAN UNIV
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Generally speaking, the longer the key, the higher the security, but the authentication overhead is also increasing. How to reasonably balance the length of the key with the security and reliability of authentication is one of the difficulties in solving the above problems.
At present, the commonly used authentication methods between satellites are not fully suitable for satellite scenarios with diverse topologies and dynamic topologies. How to design a robust inter-satellite authentication method is the second difficulty in solving the problem of satellite authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Inter-satellite authentication method, system, medium, equipment, terminal and application
  • Inter-satellite authentication method, system, medium, equipment, terminal and application
  • Inter-satellite authentication method, system, medium, equipment, terminal and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0131] Such as image 3 As shown, the satellite network deploys the blockchain, and the formation process of the blockchain includes the following steps:

[0132] (1) Obtain satellite identity and authentication certificates;

[0133] Each satellite uses unique identity information as proof of identity to issue and sign an identity certificate for its own identity. Each satellite node communicates with its own neighbor nodes, each satellite node and other satellite nodes within the communication distance of itself, through information-based Make interactive authentication, issue authentication certificates of recognized identities to each other, and the block chain obtains the certificate information of each satellite node;

[0134] (2) According to the authentication result and certificate information, as a transaction, the satellite node packs and generates a block;

[0135] The identity and authentication information of each satellite node, as transaction information, is ...

Embodiment 2

[0142] Such as figure 1As shown, the inter-satellite authentication method provided by the present invention includes the following steps:

[0143] S101: The satellite node initiates an authentication request;

[0144] S102: Query whether the local ledger has information about relevant satellite nodes;

[0145] S103: The local account book information is not queried, and the satellite node performs authentication based on signaling interaction;

[0146] S104: Query the local ledger information, and the satellite node queries the complete trust chain based on the blockchain for authentication;

[0147] S105: According to the certificate information, verify whether a complete certificate chain is formed between the satellite nodes;

[0148] S106: A complete certificate chain is formed between the satellite nodes, and the fast authentication of the satellite nodes is completed;

[0149] S107: A complete certificate chain is not formed between the satellite nodes, and the sate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of satellite network communication, and discloses an inter-satellite authentication method, system, medium, equipment, terminal and application. The satellite node obtains the identity and the certificate for authentication between the required satellite nodes, and the certificate information is packaged and generated as a transaction. Block, the generated block is added to the blockchain after consensus verification, the satellite initiates an authentication request, and the satellite node queries the local ledger information; if the relevant satellite information is not queried, the satellite authentication is completed using the signaling-based interactive authentication method and the authentication result Packaged in a new block; if the relevant satellite information is queried, the authentication method based on the blockchain verification trust chain is adopted to verify whether there is a complete certificate chain between the satellite nodes; if the verification is successful, the satellite node completes the authentication, and if no complete certificate is formed If the chain is not used, the satellites will complete the satellite authentication based on the mutual authentication of signaling. The present invention reduces the time and expense of encryption and identity authentication by means of block chain technology.

Description

technical field [0001] The invention belongs to the technical field of satellite network communication, and in particular relates to an inter-satellite authentication method, system, medium, equipment, terminal and application. Background technique [0002] At present: the medium and low orbit satellite network plays an important role in the field of communication because of its wide coverage, high transmission bandwidth, flexible networking and easy maintenance. Followed by a large number of satellite nodes, complex satellite topology, and more and more applications of satellite networks, satellite communication networks and ground networks have similar network vulnerabilities and face various attacks. It is very important for the security mechanism to provide security protection for the satellite network. Secure identity authentication technology can effectively avoid attacks such as entity counterfeiting, unauthorized access, and authentication deception. Therefore, auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04B7/185H04W12/06H04W12/069
Inventor 侯蓉晖黄晨李晖吕锡香曹进朱辉
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products