Enhanced inter-satellite networking authentication method based on location key

A technology of inter-satellite networking and authentication method, which is applied in the field of satellite communication, can solve the problems of high exposure of satellite network links, inability to guarantee the security of inter-satellite session keys, and low protocol efficiency, and achieve an efficient inter-satellite authentication mechanism, Realize the effect of fast networking between satellites and reduce communication delay

Pending Publication Date: 2022-07-29
XIDIAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, the links of the satellite network are highly exposed, so the information in the satellite network is vulnerable to illegal eavesdropping and malicious tampering
On the other hand, the satellite network topology is complex and dynamically changing, making it difficult to maintain a stable satellite link
[0006] Therefore, researchers have proposed a variety of authentication methods in satellite communication networks. However, in most authentication schemes, satellites act as relay nodes, forwarding and processing messages for ground users, base stations or servers, and do not realize the integration between satellites. Web authentication
In addition to these schemes, the existing inter-satellite network authentication methods mainly have the following problems: digital signature, public key cryptosystem or symmetric key technology is used to realize inter-satellite end-to-end authentication, the number of interaction rounds is large and the calculation is complicated, and the signaling overhead The calculation cost is high, and it is not suitable for satellites with limited computing power; the certification of low-orbit satellites in the low-orbit satellite network method relies on the gateway station on the ground, and the communication delay between the satellite and the ground is long, the protocol efficiency is low, and the certification takes time. Too long; the security is not high, the inter-satellite network authentication method relies on the shared authentication key, if the key is leaked, the security of the inter-satellite session key cannot be guaranteed, and forward security cannot be achieved; there is no security for the satellite The identity information of the satellite is protected for privacy, and the identity information of the satellite may be leaked during the authentication process of the inter-satellite network, which may lead to attacks on the identity information of the satellite.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enhanced inter-satellite networking authentication method based on location key
  • Enhanced inter-satellite networking authentication method based on location key
  • Enhanced inter-satellite networking authentication method based on location key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] See figure 1 and figure 2 , figure 1 A schematic flowchart of an enhanced inter-satellite networking authentication method based on a location key provided by an embodiment of the present invention, figure 2 This is an architecture diagram of an enhanced satellite security networking authentication method based on a location key under a sky-earth integrated network provided by an embodiment of the present invention.

[0061] The method of this embodiment implements identity authentication and key negotiation based on the location key, and almost all satellites can meet the needs of the inter-satellite networking method. Specifically, the method in this embodiment can be applied to various types of satellites, including any two satellites among the low-orbit satellite LEO, the medium-orbit satellite MEO, and the high-orbit satellite GEO, such as figure 2 shown, and satellites launched by different organizations; in the case where the two networked satellites do not...

Embodiment 2

[0114] On the basis of Embodiment 1, this embodiment provides an inter-satellite networking authentication method in which the orbital parameters of the satellites do not change after the initial inter-satellite networking authentication stage, and the inter-satellite networking is disconnected and reconnected. In this embodiment, the fact that the orbital parameters of the satellites have not changed means that the orbital parameters of the first satellite and the second satellite have not changed.

[0115] Specifically, the method includes the steps:

[0116] S1. The ground control center generates a real identity and a long-term shared key between the satellite and the ground for each satellite.

[0117] S2. According to the networking authentication request information sent by any satellite, the ground control center uses the real identity of each satellite and the long-term shared key between satellites to generate the temporary identity of each satellite, and generates t...

Embodiment 3

[0148] On the basis of Embodiment 1 and Embodiment 2, this embodiment provides an inter-satellite networking authentication method in which the orbital parameters of the satellites change after the initial inter-satellite networking authentication stage, and the inter-satellite networking is disconnected and reconnected . In this embodiment, the change in the orbit parameter of the satellite means that the orbit parameter of any one of the first satellite and the second satellite changes.

[0149] Specifically, the method includes the steps:

[0150] S1. The ground control center generates a real identity and a long-term shared key between the satellite and the ground for each satellite.

[0151] S2. According to the networking authentication request information sent by any satellite, the ground control center uses the real identity of each satellite and the long-term shared key between satellites to generate the temporary identity of each satellite, and generates the long-te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an enhanced inter-satellite networking authentication method based on a position key. The method comprises the steps that a ground control center generates a real identity and a satellite-ground long-term shared key for each satellite; the ground control center generates a temporary identity label of each satellite and a long-term shared key between the satellites, and obtains orbit parameters of each satellite; each satellite calculates a first position key of the first satellite and calculates a first message verification code of the first satellite according to the calculated first position key so as to realize authentication of the second satellite to the first satellite; and each satellite calculates a second position key of the second satellite according to the orbit parameter of the second satellite, and calculates a second message verification code of the second satellite according to the calculated second position key so as to realize authentication of the first satellite to the second satellite. According to the inter-satellite networking authentication method, a safe and efficient inter-satellite authentication mechanism is realized, and inter-satellite rapid networking is realized.

Description

technical field [0001] The invention belongs to the technical field of satellite communication, in particular to an enhanced inter-satellite networking authentication method based on a location key. Background technique [0002] With the continuous development of science and technology and the popularization of intelligent terminals, mobile communication technology has developed to the fifth generation (5G) to meet people's increasing communication needs. However, in many places, such as oceans, deserts, polar regions, mountains and valleys, terrestrial network coverage cannot be achieved due to expensive construction costs. Recent reports show that global mobile subscribers have reached 5.27 billion, with mobile services covering approximately 67% of the population. Subject to technical limitations and huge economic costs, only 20% of the land area is covered by mobile services, which is less than 6% of the earth's surface area. In this case, satellite networks have attra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/63H04W12/69H04W84/06H04B7/185
CPCH04W12/06H04W12/63H04W12/69H04W84/06H04B7/18521
Inventor 曹进杨元元李晖任雄鹏马如慧
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products