[1]周星,刘军,董春冻,等.基于身份的卫星网络密钥管理方案[J].计算机技术与发展,2013,(11):148-151.
 ZHOU Xing[],LIU Jun[],DONG Chun-dong[],et al.A Scheme of Identity-based Satellite Network Key Management[J].,2013,(11):148-151.
点击复制

基于身份的卫星网络密钥管理方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2013年11期
页码:
148-151
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
A Scheme of Identity-based Satellite Network Key Management
文章编号:
1673-629X(2013)11-0148-04
作者:
周星1刘军1董春冻2张玉静1
[1]解放军理工大学 指挥信息系统学院;[2]解放军理工大学 通信工程学院
Author(s):
ZHOU Xing[1]LIU Jun[1]DONG Chun-dong[2]ZHANG Yu-jing[1]
关键词:
卫星网络密钥管理基于身份串空间
Keywords:
satellite networkkey managementidentity-basedstrand space
文献标志码:
A
摘要:
为进一步提高卫星网络密钥管理的效率,文中假设地面控制中心(Telluric Control Center,TCC)作为PKG(Private Key Generation)是完全可信且性能强大的,由TCC为卫星计算私钥,并利用Shamir秘密共享方案将私钥分片传送给各卫星节点,在会话密钥协商过程中利用节点私钥加密时间戳和位置信息以保证新鲜性和认证性。文中利用串空间证明了该方案密钥传输过程的机密性和认证性以及会话密钥的认证性,并和现有的协议进行性能对比,结果表明在假设条件下,该方案是可行的,且性能消耗小。因此文中方案具有较强的实用性
Abstract:
To further improve the efficiency of satellite network key management,assume TCC ( Telluric Control Center) as PKG ( Pri-vate Key Generation) is totally trustable and has a strong computing ability,using TCC to calculate private key for each satellite and Shamir secret sharing scheme to transfer private key to each satellite node in piece,it uses each node's private key to encrypt timestamp and location information of the node to guarantee freshness and authentication. In this paper,use strand space model to prove security and authentication in the key transfer process,and the authentication of session key. Compared with the current protocols,it turns out that,un-der the assuming condition,the scheme can be thought of as practical and has less efficiency consuming,thus it is practical in actual use

相似文献/References:

[1]沈武 王天芹 杨帅.基于门限完全分布式密钥管理方案[J].计算机技术与发展,2010,(02):175.
 SHEN Wu,WANG Tian-qin,YANG Shuai.Fully- Distributed Key Management Scheme Based on Threshold[J].,2010,(11):175.
[2]叶晓国 肖甫 孙力娟 王汝传.基于NS-2的航空器通信仿真模块的设计与实现[J].计算机技术与发展,2009,(07):28.
 YE Xiao-guo,XIAO Fu,SUN Li-juan,et al.Design and Implementation of Aircraft Communication Simulation Module Based on NS- 2[J].,2009,(11):28.
[3]王华顺 孙力娟 肖甫 王汝传.卫星网络传输层协议分析与改进[J].计算机技术与发展,2009,(08):58.
 WANG Hua-shun,SUN Li-juan,XIAO Fu,et al.Improvement and Analysis of Transport Layer Protocol on Satellite Network[J].,2009,(11):58.
[4]赵晓峰 叶震.几种数据库加密方法的研究与比较[J].计算机技术与发展,2007,(02):219.
 ZHAO Xiao-feng,YE Zhen.Research and Comparison of Several Database Encryption Technologies[J].,2007,(11):219.
[5]郑彦 王汝传 高冉 孙力娟.无线传感器网络中密钥管理机制约束因素研究[J].计算机技术与发展,2006,(10):118.
 ZHENG Yan,WANG Ru-chuan,GAO Ran,et al.Constrains of Key Management in Wireless Sensor Network[J].,2006,(11):118.
[6]吴杨 矫文成 潘艳辉 李华.卫星网络加密算法安全性分析与攻击建模[J].计算机技术与发展,2011,(06):140.
 WU Yang,JIAO Wen-cheng,PAN Yan-hui,et al.Analysis of Cipher Security and Cipher Attack Modeling in Satellite Network[J].,2011,(11):140.
[7]张毅 肖四友.X-IDEA算法在手机图文信息安全传输中应用研究[J].计算机技术与发展,2012,(04):250.
 ZHANG Yi,XIAO Si-you.Study on Mobile Communication Image-Text Security Transport Based on X-IDEA Algorithm[J].,2012,(11):250.
[8]周星,刘军,董春冻,等.卫星网络安全路由目标研究[J].计算机技术与发展,2013,(07):163.
 ZHOU Xing,LIU Jun,DONG Chun-dong,et al.Research on Satellite Network Secure Routing Objectives[J].,2013,(11):163.
[9]陈亚东,张涛,曾荣,等.密钥管理系统研究与实现[J].计算机技术与发展,2014,24(02):156.
 CHEN Ya-dong,ZHANG Tao,ZENG Rong,et al.Research and Implementation of Key Management System[J].,2014,24(11):156.
[10]鲁蔚锋,尚春雷. 一种基于攻击概率的分布式传感网密钥管理方案[J].计算机技术与发展,2016,26(09):129.
 LU Wei-feng,SHANG Chun-lei. A Key-management Scheme with Node Compromise Probability in Wireless Sensor Network[J].,2016,26(11):129.
[11]周林 矫文成 吴杨.卫星网络密钥管理仿真平台的设计及性能测试[J].计算机技术与发展,2012,(09):217.
 ZHOU Lin,JIAO Wen-cheng,WU Yang.Design and Performance Test of Key Management Simulation Platform of Satellite Network[J].,2012,(11):217.

更新日期/Last Update: 1900-01-01