Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

An inter-satellite network authentication system and method suitable for a two-layer satellite network

A double-layer satellite network and inter-satellite networking technology, applied in the field of information security, can solve problems such as not adapting to satellite network networking scenarios, difficult satellite independence, independent trust establishment and secure communication, self-identity information protection, etc.

Active Publication Date: 2020-10-27
XIDIAN UNIV +1
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (1) Inter-satellite identity authentication requires ground participation. Without the participation of trusted third parties such as ground stations, it is difficult to achieve independent and independent trust establishment and secure communication between satellites, which is not suitable for satellite network groups with massive nodes. network scene;
[0010] (2) Inter-satellite identity authentication does not protect its own identity information, so that attackers can use the intercepted plaintext identity information to forge access requests, thereby carrying out attacks such as denial of service and interfering with satellite networking;
[0011] (3) The calculation overhead of inter-satellite identity authentication will affect the authentication delay. Compared with the satellite network with a small number of nodes, in the satellite network with a large number of nodes, due to the more frequent network authentication, the inter-satellite network will be due to the satellite network. Authentication delay due to computer computing power problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An inter-satellite network authentication system and method suitable for a two-layer satellite network
  • An inter-satellite network authentication system and method suitable for a two-layer satellite network
  • An inter-satellite network authentication system and method suitable for a two-layer satellite network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] In order to make the objectives, technical solutions, and advantages of the present invention clearer and more comprehensible, the present invention will be further described in detail below in conjunction with embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.

[0090] The prior art cannot realize trust establishment and secure communication between satellites without the participation of a trusted third party. The present invention provides an inter-satellite networking authentication method suitable for double-layer satellite networks, including:

[0091] LEO completes the identity authentication of GEO by judging whether the locally calculated XMAC is equal to the MAC in the Token; GEO completes the identity authentication of LEO by judging whether the locally stored XRES and the returned RES are equal; when performing identity authentication, GEO and T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information safety, and discloses an inter-satellite networking authentication system and method suitable for a double-layer satellite network. The system comprises a ground authentication server, a high-orbit satellite authentication client and a low-orbit satellite authentication client, wherein the ground authentication server is used for completing initialization of a satellite authentication system, namely generating and distributing identity information, a secret key and track parameters which are needed for authentication between the satellites; the high-orbit satellite authentication client and the low-orbit satellite authentication client are main bodies of inter-satellite networking authentication, and the inter-satellite identity authentication and key negotiation are realized through the interaction of authentication parameters. An authentication precomputation mechanism is designed by utilizing the characteristics that a satellite network clock is highly synchronous and a node operation trajectory can be predicted, so that the authentication efficiency between the satellites is effectively improved. According to the system and the method, safe and efficient identity authentication and secret key negotiation of a high-orbit satellite and a low-orbit satellite in a networking stage can be realized, and the system and the method can be applied to networking authentication between the high-orbit satellite and the low-orbit satellite.

Description

Technical field [0001] The invention belongs to the technical field of information security, and particularly relates to an inter-satellite networking authentication system and method suitable for a double-layer satellite network. It can be used to provide satellite identity authentication services for commercial satellite networks in satellite networking, and can achieve trust establishment and secure communication between satellites without the participation of a trusted third party. Background technique [0002] At present, the existing technology commonly used in the industry is as follows: [0003] As the current satellite network contains a small number of satellites, such as Iridium (66) and GPS (24), the satellite network is mainly controlled by the ground station. Satellite network authentication usually adopts the method that the ground station directly allocates authentication parameters and session keys to the satellite. In this kind of control structure, the satellit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04B7/185H04L9/08H04L9/32H04L29/06
CPCH04B7/18521H04L9/0863H04L9/3213H04L9/3297H04L63/083
Inventor 朱辉武衡张之义李晖赵海强王宇辉
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products