An identity-based authentication method for space-based networks

An authentication method and network technology, applied in the field of space network security communication, can solve the problems of high network transmission delay, high cost, inapplicability, etc., and achieve the effects of reducing interaction, ensuring security, and reducing size

Active Publication Date: 2022-01-21
NAT UNIV OF DEFENSE TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (2) High network transmission delay
[0006] (3) Limited network bandwidth resources
[0007] (4) The computing and storage capacity of the ground terminal and on-board is limited
In this method, both communication parties need to send their own digital certificates to each other, and the overhead of communication and calculation is relatively large, which is not suitable for the current space-based network environment with limited communication bandwidth.
[0010] (2) The source authentication method based on the extended broadcast authentication protocol certificate refers to using the satellite as the authentication center to generate the extended broadcast authentication protocol certificate and run the source authentication protocol. This method reduces the overhead brought by the traditional digital certificate transmission, but High requirements for on-board computing and storage capacity, high cost, not conducive to promotion
But there is no public literature on the use of identity-based signature algorithm with message recovery function for mutual authentication and session key agreement between satellites and ground terminals in space-based networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity-based authentication method for space-based networks
  • An identity-based authentication method for space-based networks
  • An identity-based authentication method for space-based networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0109] figure 1 It is an overall flowchart of the present invention; the present invention comprises the following steps:

[0110] The first step is to build an identity-based authentication system for space-based networks. like figure 2 As shown, the identity-based authentication system for space-based networks consists of three types of network entities: ground terminals (denoted as TE), key generation centers (denoted as KGC), and low-orbit satellites (denoted as LEO). The KGC is connected to multiple TEs and LEOs through wireless links.

[0111] Before mutual authentication between TE and LEO, KGC uses an identity-based signature scheme with message recovery proposed by Kyung-Ah Shim (see Shim K-A. Basis: A Practical Multi-User Broadcast Authentication Scheme for Wireless Sensor Networks[J] .IEEE Information Forensics and Security Transactions.2017,PP:1-1.The English literature index is Shim K-A.BASIS:APractical Multi-User Broadcast Authentication Scheme in Wireless Se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity-based authentication method oriented to a space-based network, and aims to solve the problem of security authentication between ground terminals and satellites in the space-based network and improve the security of space-based network communication. The technical solution is to build a space-based network-oriented identity-based authentication system composed of ground terminals, key generation center KGC, and low-orbit satellites; KGC's initialization calculation module calculates the system's master key and public parameters; KGC's private key calculation module Calculate the corresponding private key, and distribute the private key and public parameters to ground terminals and satellites. Terminal TE A Perform current overhead satellite LEO when accessing A and TE A mutual authentication and session key negotiation, then LEO A and TE A Normal communication, LEO A If the LEO is predicted at the end of the service A If you are about to leave the current area, you need to perform inter-satellite switching authentication. If you predict LEO A do not leave, the LEO A and TE A Go ahead and communicate. The invention effectively reduces the size of the transmission message, and realizes fast switching authentication and session key agreement while ensuring security.

Description

technical field [0001] The invention relates to the field of space network security communication, in particular to an identity-based authentication method for a space-based network. Background technique [0002] As a powerful supplement to traditional terrestrial networks, space-based networks can provide access services to special areas such as deserts, achieving true global interconnection. However, due to the natural open environment of satellite communications, it is easy for malicious attackers to obtain communication data between satellites and ground or pretend to be legitimate users to issue malicious instructions. These behaviors pose a great challenge to the security of space-based networks. Therefore, the space-based network needs an authentication scheme to ensure its own operation security; authentication has two main functions: one is to identify the legitimacy of the ground terminal, to ensure that only legal terminals can send the acquired data to the satell...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/40H04B7/185
CPCH04L9/3247H04L9/3242H04L9/0861H04L9/0838H04L63/08H04B7/18519
Inventor 赵宝康苏金树王宝生陈曙晖虞万荣毛席龙宋光磊原玉磊韩彪魏子令刘谱光苏晓乾穆凡
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products