A UAV-assisted terminal access authentication method, system, device and application

An authentication method and terminal access technology, applied in the field of communication network security, can solve problems such as attacks, affecting the execution of protocols, and threats to the security of entities to be authenticated, and achieve the effects of avoiding leakage and preventing computational overhead and communication overhead.

Active Publication Date: 2022-03-11
XIDIAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (2) Regardless of whether it is a satellite or a UAV device, its communication links are open and the network topology changes dynamically, which may lead to attacks such as channel eavesdropping, message tampering, and replay during the communication process.
[0011] (3) UAVs have the characteristics of strong mobility and limited endurance. During the authentication process of the ground terminal through the UAV, if the UAV leaves its designated coverage area, the terminal will need to repeat the authentication process, resulting in additional The signaling overhead and computing overhead affect the authentication efficiency
[0012] (4) Both ground terminal equipment and UAVs may be subject to physical attacks. After the opponent captures them through physical attacks, they may obtain the secret information stored in their memory chips, thereby forging identities to participate in authentication, illegally obtaining private information and Various permissions
Specifically: in the above communication scenario, if an attacker can obtain the identity information or other authentication information of the entity to be authenticated by monitoring the open link, it will pose a threat to the security of the entity to be authenticated and leak the communication content
Second, if a lightweight authentication process cannot be implemented, a large number of authentication requests will cause excessive computing loads on drones and satellites, resulting in unresponsive situations, which will affect the implementation of the protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A UAV-assisted terminal access authentication method, system, device and application
  • A UAV-assisted terminal access authentication method, system, device and application
  • A UAV-assisted terminal access authentication method, system, device and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0109] Aiming at the problems existing in the prior art, the present invention provides a method and application for terminal access authentication assisted by a drone in a space-ground integrated information network.

[0110] The present invention is achieved in this way, a terminal access authentication method assisted by a drone in a space-ground integrated information network, the terminal access authentication method assisted by a drone in a space-ground integrated information network includes the following steps:

[0111] In the first step, after adding a hardware-based physical unclonable function (PUF) to the memory of the UAV, terminal, and network control center, the UAV and terminal interact with the network control center through a secure channel to complete the registration;

[0112] In the second step, after both the drone and the terminal are registered, the drone performs access authentication;

[0113] In the third step, after the UAV access authentication is ...

Embodiment 2

[0168] Aiming at the problems existing in the prior art, the present invention provides a UAV-assisted terminal access authentication method and application suitable for space-ground integrated information network. The present invention will be described in detail below with reference to the accompanying drawings. Previously, a supplementary explanation was made for the Physically Unclonable Function (PUF):

[0169] PUF is a physical stimulus-response function, whose input is called stimulus, which can be identified by x∈X, and the response corresponding to each stimulus can be represented by y∈Y. Usually a stimulus and its corresponding response are called a stimulus-response pair (Challenge Response pair, CRP), which can be represented by CRP(x,y). The following formula is used to describe the relationship of a physical unclonable function response to a specific stimulus: PUF:X→Y:PUF(x)=y. When queried with incentive x, the PUF produces a response It depends on x and the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of communication network security, and discloses a UAV-assisted terminal access authentication method, system, equipment and application. The UAV-assisted terminal access authentication method includes: the terminal, the UAV through The secure channel interacts with the network control center to complete the registration; after both the UAV and the terminal are registered, the UAV performs access authentication; after the UAV access authentication is completed, the terminal performs access authentication with the assistance of the UAV ; When the UAV deviates from the designated airspace due to force majeure and the authentication is interrupted, multiple UAVs cooperate quickly to continue to assist the terminal to complete the access authentication. The invention can efficiently complete the authentication of different entity identities in real time with the assistance of UAVs, quickly establish a stable and reliable mobile communication network, and provide technical support for scenarios such as UAV emergency communication, military operations, fire rescue and so on; in realizing anonymity At the same time, it avoids the complicated certificate management process in the public key system and achieves stronger security capabilities.

Description

technical field [0001] The invention belongs to the technical field of communication network security, and in particular relates to a terminal access authentication method, system, equipment and application assisted by a drone. Background technique [0002] At present, with the popularization of 5G communication technology and the rapid growth of Internet of Things devices, people's demand for mobile communication services continues to increase. Satellite communication networks can be used to cover mountainous, ocean-going, and other areas, and at the same time cooperate with UAVs for collaborative operations. It provides technical support for the military, electric power, rescue and other fields. The space-ground integrated information network constructed thus greatly promotes the development of mobile devices in the direction of full-scenario collaboration and high-reliability interconnection, which is conducive to the realization of the global information network. Deep in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/122H04L9/32
CPCH04W12/06H04L9/3278
Inventor 曹进关键李晖马如慧赵兴文
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products