CN111970238B - Reliable method for controlling safe transmission of near space airship load instruction - Google Patents

Reliable method for controlling safe transmission of near space airship load instruction Download PDF

Info

Publication number
CN111970238B
CN111970238B CN202010659003.1A CN202010659003A CN111970238B CN 111970238 B CN111970238 B CN 111970238B CN 202010659003 A CN202010659003 A CN 202010659003A CN 111970238 B CN111970238 B CN 111970238B
Authority
CN
China
Prior art keywords
instruction
load
encryption
commander
command
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010659003.1A
Other languages
Chinese (zh)
Other versions
CN111970238A (en
Inventor
罗喜伶
周泽全
郑昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN202010659003.1A priority Critical patent/CN111970238B/en
Publication of CN111970238A publication Critical patent/CN111970238A/en
Application granted granted Critical
Publication of CN111970238B publication Critical patent/CN111970238B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Radio Relay Systems (AREA)
  • Traffic Control Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a reliable method for controlling safe transmission of a load instruction of an aircraft, which adopts the technical means of public key encryption, digital signature and symmetric encryption based on identity and aims to solve the problems of reliability, safety and the like of the transmission of the load instruction of the aircraft. When the airship load interacts with the commander, the aircraft approaching load A updates the instruction packet according to the flight mission and encrypts the instruction packet by using a digital signature encryption key containing the identity information of the commander B, and the two parties share the same time. And the commander B issues an instruction within a certain time T and encrypts the instruction by using a public key encryption key based on the identity information. After the load A of the aircraft approaching the sky receives the encryption instruction, the public key decryption key of the commander B is used for decryption to confirm whether the specific condition is met, and the symmetric key is used for encryption reply. And after receiving the reply of the load A of the aircraft in the sky, the commander B decrypts the load A by using the symmetric key and makes corresponding response according to different decrypted replies. Therefore, the invention has strong guarantee on safety and reliability.

Description

Method for reliably controlling safe transmission of near space airship load instructions
Technical Field
The method relates to the field of traffic instruction safe transmission control, in particular to a reliable method for controlling safe transmission of a load instruction of an aircraft airship.
Background
The development of aerospace technology greatly changes the structure of transportation, airplanes provide people with a quick, convenient, economic, safe and comfortable transportation means, international flights have replaced ocean passenger ships, become main tools for people to come and go between continents, and closely link all countries in the world. An airship is a lighter-than-air craft, and is largely distinguished from a hot air balloon by having means for propelling and controlling flight conditions. The airship consists of a huge streamline hull, a nacelle positioned below the hull, a tail surface for stabilizing and controlling and a propelling device. The special shape of the airship also determines a plurality of special purposes, and the airbag of the airship body is filled with buoyancy gas with density smaller than that of air so as to generate buoyancy force to lift the airship off. The gondola is used for passengers to take and load cargo. The tail surface is used for controlling and maintaining the stability of course and pitching.
The airship in the adjacent space has a large amount of helium filled into the air bag to make the density of the whole airship lower than that of air below 2 ten thousand meters, so that no extra power consumption is needed to maintain the height of two thousand meters. Because the low earth orbit satellite has the characteristics of needing to orbit around the earth, the low earth orbit satellite cannot be resident and monitored in a certain area for a long time, and the geosynchronous satellite is too far away from the ground, the monitoring range is wide, and the monitoring resolution is not high. The air airship can reside for a long time or in a near space area 20 kilometers above the ground, so that the concerned area can be monitored and resided for a long time, a high-resolution monitoring effect is obtained, and the air airship can be widely applied to monitoring of regional traffic conditions, natural disasters and the like in a large range.
The aircraft needs to be matched with different loads in order to realize specific functions. How to ensure safe and reliable control and management of the load of the air airship is a difficult problem which needs to be solved urgently, for example, lawless persons may tamper with a control instruction of the load, and then hijack and control the air airship to implement illegal attacks and other behaviors, so that huge economic loss and social harm are caused. At present, all schemes for controlling the load of the air airship only stay in the aspect of enhancing the reliability of communication and flight control protocols for the airship, but lack how to ensure the information security of control command transmission, and once the control command is invaded, tampered or forged by illegal molecules, great loss is brought.
Therefore, aiming at the problem of the method for transmitting the load instruction of the blinker, the method provides a reliable method for safely transmitting the load instruction of the blinker, and the safety and the reliability of controlling the transmission of the load instruction of the blinker are ensured.
Disclosure of Invention
The method provides a reliable method for controlling safe transmission of the load instruction of the aircraft airship. The method adopts technical means such as public key encryption based on identity, digital signature, integrity verification and the like, and aims to solve the problems of reliability, safety and the like of the transmission of the load instruction of the blinker in the air at present.
A method for reliably controlling safe transmission of load instructions of an aircraft airship comprises the following steps:
s1: the method involves two participants, an airborne airship payload a and a commander B running an identity-based key generation algorithm to generate a public key pair (pk, sk), a digital signature key pair (spk, ssk) and a symmetric key k, where p represents encrypted, the second s of sk and ssk represents decrypted, the first s of spk and ssk represents a digital signature;
s2: updating the command packet by the load A of the aircraft airship according to the flight mission, and encrypting the command packet by using a digital signature encryption key spk of a commander B, wherein the command packet and the commander B share the same time;
s3: command B issues instruction m within a certain time TiAnd i represents the ith instruction issued in sequence, m is encrypted by the public key encryption key pkiAnd time t at that time1Carrying out public key encryption to obtain an encryption command C ═ Epk(mi||i||t1) Wherein E represents encryption;
s4: after the load A of the aircraft approaching the sky receives the encrypted instruction C, the instruction m is obtained by decrypting the encrypted instruction sk by using the public key decryption key sk of the commander BiInstruction sequence number i and time t1. When the following four conditions are met simultaneously, the load A of the aircraft approaching to the sky replies the received instruction r and the time t at the moment2And for r and t2Obtaining an encryption command R ═ E by adopting symmetric encryptionk(r||t2):
(1) Receiving an instruction within time T;
(2) compare the instruction packet, when miConforming to the content of the instruction packet;
(3) when the sequence numbers i are arranged in sequence;
(4) when time t is1When correctness is satisfied;
otherwise, return error instruction wrongg and time t at the moment2And for wrong and t2Obtaining an encryption command R ═ E by adopting symmetric encryptionk(wrong||t2) The instructions are detailed in table 1:
TABLE 1 error feedback code representation
Type of error Instruction mismatch Sequence number error Timestamp error Not receiving instruction within time T
wrong instruction II IE TE NR
S5: after receiving the reply of the load A of the aircraft in the sky, the commander B decrypts by adopting a symmetric key; if r is received, sending the next instruction within the time T; if wrong is received, the previous instruction is retransmitted.
The method provides a reliable method for controlling safe transmission of the load instruction of the aircraft airship, the integrity of the instruction is guaranteed by adopting a digital signature technology, and the safety is guaranteed by adopting an identity-based encryption technology.
Drawings
Fig. 1 is a simplified flow chart of a method for implementing reliable control of safe transmission of a load command of an aircraft blinker, provided by the method.
Detailed Description
In order to make the objects, schemes and effects of the embodiments of the method clearer and clearer, the method is further described in detail by way of example with reference to the attached figure 1.
The method comprises the following specific implementation steps:
s1: the method relates to two participants of an aircraft airship load A and a commander B, wherein the commander B generates a public key pair (pk, sk), a digital signature key pair (spk, ssk) and a symmetric key k by adopting an identity-based key generation algorithm according to an IBE cryptosystem; wherein, the digital signature adopts BLS short signature to generate a digital signature key pair (spk, ssk); symmetric encryption adopts AES cryptosystem to generate a symmetric key k, wherein p represents encrypted, the second s of s and ssk in sk represents decrypted, and the first s of s and ssk in spk represents digital signature;
s2: updating the command packet by the load A of the aircraft airship according to the flight mission, and encrypting the command packet by using a digital signature encryption key spk of a commander B, wherein the command packet and the commander B share the same time;
s3: command B issues instruction m within a certain time TiAnd i represents the ith instruction issued in sequence, and m is encrypted by using a public key encryption key pkiAnd time t at this time1Carrying out public key encryption to obtain an encryption command C ═ Epk(mi||i||t1) Wherein E represents encryption;
s4: after the load A of the aircraft approaching the sky receives the encrypted instruction C, the instruction m is obtained by decrypting the encrypted instruction sk by using the public key decryption key sk of the commander BiInstruction sequence number i and time t1. When the following four conditions are met, the load A of the aircraft approaching the sky replies to receive the command r and the time t at the moment2And for r and t2Obtaining an encryption command R ═ E by adopting symmetric encryptionk(r||t2):
(1) Receiving an instruction within time T;
(2) compare the instruction packet, when miConforming to the content of the instruction packet;
(3) when the sequence numbers i are arranged in sequence;
(4) when time t is1When correctness is satisfied;
otherwise, return error instruction wrongg and time t at the moment2And for wrong and t2Obtaining an encryption command R ═ E by adopting symmetric encryptionk(wrong||t2) The instructions are detailed in table 1:
TABLE 1 error feedback code representation
Type of error Instruction mismatch Sequence number error Timestamp error Not receiving instruction within time T
wrong instruction II IE TE NR
S5: after receiving the reply of the load A of the aircraft in the sky, the commander B decrypts by adopting a symmetric key; if r is received, sending the next instruction within the time T; if wrong is received, the previous instruction is retransmitted.

Claims (6)

1. A method for reliably controlling safe transmission of load instructions of an aircraft airship is characterized by comprising the following steps:
s1: the method involves two participants, an airborne airship payload a and a commander B running an identity-based key generation algorithm to generate a public key pair (pk, sk), a digital signature key pair (spk, ssk) and a symmetric key k, where p represents encrypted, the second s of sk and ssk represents decrypted, the first s of spk and ssk represents a digital signature;
s2: updating the command packet by the load A of the aircraft airship according to the flight mission, and encrypting the command packet by using a digital signature encryption key spk of a commander B, wherein the command packet and the commander B share the same time;
s3: the commander B issues within a certain time TCloth order miAnd i represents the ith instruction issued in sequence, m is encrypted by the public key encryption key pkiAnd time t at this time1Carrying out public key encryption to obtain an encryption command C ═ Epk(mi||i||t1) Wherein E represents encryption;
s4: after the load A of the aircraft approaching the sky receives the encrypted instruction C, the instruction m is obtained by decrypting the encrypted instruction sk by using the public key decryption key sk of the commander BiInstruction sequence number i and time t1When the following four conditions are met, the load A of the aircraft flying in the sky replies to the received command r and the time t at the moment2And for r and t2Obtaining an encryption command R ═ E by adopting symmetric encryptionk(r||t2):
(1) Receiving an instruction within time T;
(2) compare the instruction packet, when miConforming to the content of the instruction packet;
(3) when the sequence numbers i are arranged in sequence;
(4) when time t is1When correctness is satisfied;
otherwise, return error instruction wrongg and time t at the moment2And for wrong and t2Obtaining an encryption command R ═ E by adopting symmetric encryptionk(wrong||t2) The instructions are detailed in table 1:
TABLE 1 error feedback code representation
Type of error Instruction mismatch Sequence number error Timestamp error Not receiving instruction in T time wrong instruction II IE TE NR
S5: after receiving the reply of the load A of the aircraft approaching the sky, the commander B decrypts by adopting a symmetric key; if r is received, the next instruction is sent within the time T; if wrong is received, the previous instruction is retransmitted.
2. The method according to claim 1, characterized in that before sending the instruction, 3 types of keys, namely a public key pair, a digital signature key pair and a symmetric key, are generated between the commander B and the airship load A, and the encryption is carried out for 3 times in total; the public key pair and the digital signature key pair adopt a key system based on identity, namely, the public key pair and the digital signature key pair of the commander B are both related to identity information of the commander B, and the identity information comprises a user identity number, a mobile phone number, a mailbox, an address and biological characteristic information.
3. The method of claim 1, wherein the blimp load A updates the command packet according to the mission and digitally signs the command packet using a digitally signed encryption key of the commander B, the two parties unifying time, the digital signature being used to ensure that the flight command cannot be destroyed, the unification ensuring the immediacy of the flight command.
4. The method of claim 1, wherein commander B encrypts the commands, the command sequence number and the command issuing time by using an identity-based encryption key for judging the correctness of the commands of the airship load A, wherein the command issuing time t for verifying the conditions1And t2Are all time instants.
5. The method according to claim 1, characterized in that the Critical airship load A decrypts the received encrypted command to obtain the command, the command sequence number and the command issuing time, and verifies the correctness of the command, the command sequence number and the command issuing time; in the face of different conditions, the oncoming airship carries out encryption reply by adopting the symmetric key k, and if the load A of the oncoming airship does not receive an instruction within the time T, the load A of the oncoming airship carries out encryption reply by adopting the symmetric key.
6. The method according to claim 1, characterized in that the execution subject of the 3 encryptions performed in the process is different, according to the flight mission update instruction packet, the airborne airship load A is firstly encrypted with a digital signature, and the execution subject is the airborne airship load A; then, the commander B performs public key encryption on the sent instruction according to the instruction, the instruction sequence number and the instruction issuing time, wherein the public key encryption is secondary encryption, and the execution main body is the commander B; after receiving the instruction of the commander B, the load A of the aircraft flying in the sky carries out different replies according to conditions, the replies are symmetrically encrypted for three times, and the execution main body is the load A of the aircraft flying in the sky; and the commander B confirms whether the command is safely delivered or not according to the received reply of the load A of the aircraft approaching the sky, determines the next action and encrypts by adopting a symmetric key during the reply.
CN202010659003.1A 2020-07-09 2020-07-09 Reliable method for controlling safe transmission of near space airship load instruction Active CN111970238B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010659003.1A CN111970238B (en) 2020-07-09 2020-07-09 Reliable method for controlling safe transmission of near space airship load instruction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010659003.1A CN111970238B (en) 2020-07-09 2020-07-09 Reliable method for controlling safe transmission of near space airship load instruction

Publications (2)

Publication Number Publication Date
CN111970238A CN111970238A (en) 2020-11-20
CN111970238B true CN111970238B (en) 2022-06-10

Family

ID=73361256

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010659003.1A Active CN111970238B (en) 2020-07-09 2020-07-09 Reliable method for controlling safe transmission of near space airship load instruction

Country Status (1)

Country Link
CN (1) CN111970238B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107066898A (en) * 2016-04-21 2017-08-18 泰雷兹公司 For method, computer program product, related electronic device and the system of the avionic device more new file for handling aircraft
CN107154854A (en) * 2017-05-19 2017-09-12 李维刚 A kind of unmanned plane instruction is reinforced and discrimination method and system
CN107452198A (en) * 2016-04-08 2017-12-08 空中客车运营简化股份公司 The transmission method of surface units, aircraft and flight directive
CN108966174A (en) * 2018-07-27 2018-12-07 长春草莓科技有限公司 A kind of communication encryption method of unmanned plane and earth station
US10365645B1 (en) * 2015-04-14 2019-07-30 Zipline International Inc. System and method for human operator intervention in autonomous vehicle operations
CN110932812A (en) * 2019-11-13 2020-03-27 深圳供电局有限公司 Task sending method, task receiving method and system based on time synchronization

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111031535A (en) * 2019-11-15 2020-04-17 华中科技大学 Secure communication method and system for smart card system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10365645B1 (en) * 2015-04-14 2019-07-30 Zipline International Inc. System and method for human operator intervention in autonomous vehicle operations
CN107452198A (en) * 2016-04-08 2017-12-08 空中客车运营简化股份公司 The transmission method of surface units, aircraft and flight directive
CN107066898A (en) * 2016-04-21 2017-08-18 泰雷兹公司 For method, computer program product, related electronic device and the system of the avionic device more new file for handling aircraft
CN107154854A (en) * 2017-05-19 2017-09-12 李维刚 A kind of unmanned plane instruction is reinforced and discrimination method and system
CN108966174A (en) * 2018-07-27 2018-12-07 长春草莓科技有限公司 A kind of communication encryption method of unmanned plane and earth station
CN110932812A (en) * 2019-11-13 2020-03-27 深圳供电局有限公司 Task sending method, task receiving method and system based on time synchronization

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种高误码率信道条件下的无人机载光电吊舱操控指令传输策略;梅风华等;《光学与光电技术》;20170810;第15卷(第04期);正文第69-71、82页 *

Also Published As

Publication number Publication date
CN111970238A (en) 2020-11-20

Similar Documents

Publication Publication Date Title
US20090058682A1 (en) Aircraft data network access for personal electronic devices
US7466980B2 (en) In-flight communications system
EP3136680B1 (en) Lightweight cyber secure bi-directional aircraft communications addressing and reporting system (acars) transmission
EP2768275B1 (en) Secure transmission of an aircraft trajectory
US7099752B1 (en) Safelander
US20080102824A1 (en) Message transmission in onboard and off board aircraft communications networks
WO2011128832A2 (en) Use of a meta language for processing of aviation related messages
CN104484199B (en) Aircraft IFE system datas update method and device
Dumas et al. MAAT cruiser/feeder project: criticalities and solution guidelines
CN106888096B (en) Secure broadcast multi-signature method based on obfuscation
CN111970238B (en) Reliable method for controlling safe transmission of near space airship load instruction
CN109698721A (en) A kind of satellite laser communications system
Tumino et al. The IXV experience, from the mission conception to the flight results
Chu et al. Feasibility of quantum key distribution from high altitude platforms
CN106411527A (en) Data authentication method in very-high-frequency data chain transmission
CN111006659A (en) Navigation system with multi-navigation-source information fusion function
Amin et al. Design of a cyber security framework for ADS-B based surveillance systems
Castelvecchi China’s quantum satellite clears major hurdle on way to ultrasecure communications
CN102723981A (en) Space Internet technology in-orbit verification system based on artificial satellite constellation
WO2023031432A1 (en) Aircraft collision avoidance method and device
Risley et al. Experimental encryption of aircraft communications addressing and reporting system (ACARS) aeronautical operational control (AOC) messages
Dorn et al. Airships in un humanitarian and peace operations: Ready for service?
Haya-Ramos et al. Validation of the IXV mission analysis and flight mechanics design
CN108768492A (en) Aerial target tracking method based on satellite-borne ADS-B special telegraph text
Arora et al. Aerodynamic shape optimization of a re-entry capsule

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant