CN109861743B - Data safety transmission method based on Beidou short message positioning information transmission protocol - Google Patents

Data safety transmission method based on Beidou short message positioning information transmission protocol Download PDF

Info

Publication number
CN109861743B
CN109861743B CN201910177964.6A CN201910177964A CN109861743B CN 109861743 B CN109861743 B CN 109861743B CN 201910177964 A CN201910177964 A CN 201910177964A CN 109861743 B CN109861743 B CN 109861743B
Authority
CN
China
Prior art keywords
message
positioning information
positioning
key
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910177964.6A
Other languages
Chinese (zh)
Other versions
CN109861743A (en
Inventor
杜建超
周一廷
李卫斌
肖清
赵兵兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201910177964.6A priority Critical patent/CN109861743B/en
Publication of CN109861743A publication Critical patent/CN109861743A/en
Application granted granted Critical
Publication of CN109861743B publication Critical patent/CN109861743B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a data security transmission method based on a Beidou short message positioning information transmission protocol, which mainly solves the problems that the existing Beidou short message transmission-based positioning information transmission is not standard and the encryption cost is high; the implementation scheme is as follows: acquiring current positioning information of a user; formulating the protocol content and structure of the positioning information transmission message and generating a positioning message containing positioning information; encrypting a positioning message by using a logistic chaotic mapping method according to a given key parameter; the sender sends the data composed of the key parameter and the encrypted positioning message; the receiving party receives and decrypts the data to obtain a received message; and judging the validity of the received message, if the validity is valid, finishing the transmission, and otherwise, waiting for the next data of the sender. The Beidou satellite positioning system meets the Beidou standard, can transmit user positioning information in a standard, safe and low-cost manner on the basis of the existing Beidou system, and can be used for safe transmission of positioning information based on Beidou short messages.

Description

Data safety transmission method based on Beidou short message positioning information transmission protocol
Technical Field
The invention relates to the technical field of communication, in particular to a data security transmission method which can be used for transmitting and encrypting satellite navigation positioning information.
Technical Field
Navigation positioning is the most basic and primary function of a satellite navigation system. With the development of satellite navigation technology, positioning and navigation operations performed by using the satellite technology are not only limited to military applications, but also relate to fine agriculture, vehicle navigation, environmental monitoring, route planning, emergencies and the like. There are four more sophisticated global satellite navigation systems in the world: the GPS system in the united states, the guroney system in russia, the galileo system in the european union, and the beidou system in china. The first three satellite navigation systems except the Beidou system in the four navigation systems adopt RNSS passive positioning power, and only a one-way transmission mode that the satellite provides information for users can be realized. When mobile signals of disasters, earthquakes and the like are interrupted and distresses are met in areas without signal coverage and the like, the one-way transmission mode is not beneficial to the help seeking of users, the transmission of positioning information and the timely rescue of related rescue units. The Beidou satellite navigation system also realizes the short message transmission function of the active positioning RDSS besides the RNSS passive positioning function, and can realize the two-way communication between users and between the users and the ground central station. However, the Beidou short message information is transmitted in a plaintext form, and the risk of leakage of transmission information is caused. There are some research directions for the transmission of positioning information and the security of short message information in the prior art, but there is no solution scheme which is especially mature and standardized:
the patent document "Android system-based portable built-in Beidou communication and navigation device" (application number: CN201810815775.2, application publication number: CN108646276A) of electronic information system GmbH provides a portable built-in Beidou communication and navigation device based on the Android system. The method adopts a Beidou RDSS and RNSS dual-mode module design, has functions of surfing the Internet, photographing, timely communication and the like of a universal panel, simultaneously applies a Beidou satellite navigation system, and has the RDSS short message communication and active positioning functions and the real-time navigation, accurate positioning and position reporting functions of RNSS. The system only combines the existing active positioning module and the passive positioning module for application by using a dual-mode module design, does not realize design on a transmission protocol of positioning information in a short message, does not provide a uniform positioning information transmission standard, and does not provide transmission safety guarantee.
Fujianfu big dipper communication technology limited company proposed an encryption transmission device applied to big dipper short messages in its applied patent document "encryption transmission device applied to big dipper short messages" (application number: CN201721256235.2, application publication number: CN 207675946U). The method relates to an encryption transmission device applied to Beidou short messages. The Beidou second-generation RDSS short message encryption device comprises a core controller and a security encryption chip connected with the core controller, wherein the encryption chip is used for carrying out short message data encryption transmission with the Beidou second-generation RDSS, and can realize daily positioning and message communication operation. Use encryption chip to encrypt big dipper message in this patent application, nevertheless do not standardize the positioning data transmission protocol format to the hardware that also can increase equipment when improving the security of encryption chip realizes the cost.
In summary, most existing methods related to Beidou navigation positioning short message transmission do not make specific standard design on positioning data transmission protocol formats, and influence the actual engineering application of the methods. In addition, some of the methods directly transmit the positioning information without adopting a security encryption measure, so that the positioning information has no security guarantee and has a security problem; the other part of the method adopts a mode of adding a safe encryption chip to encrypt and transmit the positioning information, thereby improving the safety of the positioning information transmission, but increasing the realization cost at the same time.
Disclosure of Invention
The invention aims to provide a data security transmission method based on a Beidou short message positioning information transmission protocol, aiming at overcoming the defects of the prior art, so as to formulate the positioning information transmission protocol using Beidou short message transmission, improve the positioning information transmission security and reduce the implementation cost.
In order to achieve the above purpose, the implementation steps of the invention comprise the following steps:
(1) a user terminal A of a sender acquires positioning information s of the current position of a user transmitted by a navigation satellite1Positioning information s1The method comprises three kinds of information of time, longitude and latitude;
(2) formulating positioning information s1Transmitting message protocol content to generate positioning message s2
(2a) Setting positioning information s according to policy standard made by China satellite navigation positioning application management center1The transmission of the message comprises: the method comprises six parts of instruction, length, user address, key parameter, position parameter and checksum verification, wherein the byte length occupied by each part is as follows: 4, 1, 3, 2, 27, 1;
(2b) generating an initial positioning information instruction message b containing (2a) the 6 parts0The identifier of the "instruction" part thereof is set to $ BDM "Length "part values are 38, and other part values are 0; when message b0When any part of the data is filled, replacing original data 0 by the filled data;
(2c) a user terminal A of a sender applies for user machine detection to a satellite, obtains an ID number of the user machine through feedback data of the satellite, and fills a positioning data transmission message b0The 'user address' part of the system obtains the positioning information address message b1
(2d) The positioning information s obtained in (1) is processed1Filling in location information address message b1The 'location parameter' part in the positioning information, the location message b2
(2e) User-given two key parameters k1And k2Wherein k is1∈[0,9999],k2∈[0,9999]The two numbers are integers, and the two given key parameters are filled into the positioning information position message b2The key parameter part in the positioning information is used for obtaining a positioning information key message b3
(2f) Message b of positioning information key3Each datum in the positioning information key message is sequentially converted into an ASCII code number by inquiring an ASCII code table to obtain an ASCII code sequence b 'of the positioning information key message'3
(2g) ASCII code sequence b 'for positioning information key message'3Performing CRC operation on the numerical value to obtain a checksum h, and filling the checksum h into a positioning information key message b3The 'checksum' part in the method obtains the positioning message s2
(2h) Replacing ASCII code sequence b 'of positioning information key message by h'3The last byte of the positioning message is obtained, and the ASCII code sequence b of the positioning message is obtained4
(3) Encryption of positioning message s by using logistic chaotic mapping method2And obtaining a positioning ciphertext sequence C:
(3a) respectively generating two initial value table1, table2 and two control parameter table3 and table4, wherein the first initial value table1 randomly stores 10000 nonrepeating integers from 0 to 9999, and the second initial value table2 randomly stores 10000 nonrepeating integers from 0 to 9999; wherein 5440 non-repeating integers belonging to 4560 to 9999 are randomly stored in the first control parameter table3, and 4301 non-repeating integers belonging to 5699 to 9999 are randomly stored in the second control parameter table 4;
(3b) using two key parameters k in (2e)1And k2First, a first initial value coefficient t is obtained by querying a first initial value table11Obtaining the second initial value coefficient t by querying the second initial value table22Then passes through two initial value coefficients t1And t2Calculating to obtain an iteration initial value X required by logistic chaotic mapping iteration0
(3c) Using two key parameters k in (2e)1And k2First, the coefficient t of the first control parameter is obtained by querying the first control parameter table33The second control parameter table parameter t is obtained by querying the second control parameter table44Then through two control parameter coefficients t3And t4Calculating to obtain an iteration control parameter mu required by logistic chaotic mapping iteration;
(3d) according to the initial value X of the iteration0And after the iteration control parameter mu iterates the logistic chaotic mapping formula for M times, obtaining a key, and encrypting the ASCII code sequence b of the positioning message by using the key4Obtaining a ciphertext sequence C, wherein C ═ { C ═ C0,c1,…ci,…c37},ciRepresents the ith ciphertext value in the ciphertext sequence, i being an integer from 0 to 37;
(4) two key parameters k in (2e)1,k2Data k combined with ciphertext sequence C1,k2C, and sending the data to a receiving party user terminal B through the short message transmission function of the sending party user terminal A;
(5) the receiving party user terminal B receives the data sent by the sending party terminal A, decomposes the received data and obtains two key parameters k1,k2And the ciphertext sequence C;
(6) the receiver is based on two key parametersk1,k2And decrypting the ciphertext sequence C to obtain a decrypted received message sequence P, wherein P is { P ═ P0,p1,…,pj,…p37},pjRepresents the j sequence value in the received message sequence P, j is an integer from 0 to 37;
(7) for the first 37 data P in the positioning message sequence P0,p1,…p36Checking to obtain a checking result F;
(8) judging the checking result F ═ p37Whether the transmission is established or not, if so, the transmission is finished; if not, the receiving user terminal B waits for the sending user terminal A to transmit the next piece of data.
Compared with the prior art, the invention has the following advantages:
1) according to the method, the positioning information transmission message protocol content and the structure thereof based on Beidou short message transmission are set according to the policy standard formulated by the China satellite navigation positioning application management center, the obtaining mode of each part of the content is explained, the normalization of the transmission of the positioning information on the Beidou short message is improved, and the engineering application of the positioning information transmission technology based on the Beidou short message transmission is facilitated;
2) the invention adopts the mode of combining the logistic chaotic mapping algorithm with the positioning information transmission message protocol to carry out the safe encryption operation on the positioning message, and compared with the existing method for carrying out the safe operation by using an encryption chip, the invention improves the information transmission safety and reduces the realization cost.
Drawings
FIG. 1 is a general flow chart of an implementation of the present invention;
fig. 2 is a sub-flow diagram of secure encryption of a location message in accordance with the present invention.
Detailed Description
Embodiments and effects of the present invention are described in further detail below with reference to the accompanying drawings.
Referring to fig. 1, the implementation steps of the present invention are as follows:
step 1, sender user terminal A obtains positioning information s1
The existing positioning information content mainly comprises three parameters of time, longitude and latitude, in the embodiment, a user terminal A is used as a sending party of positioning information transmission, a user terminal B is used as a receiving party of the positioning information transmission, and the user terminal A of the sending party is used for obtaining the current position information of a user transmitted by a navigation satellite in a passive positioning or active positioning mode to obtain positioning information s1Time, longitude and latitude of the user;
step 2, formulating positioning information s1Transmitting message protocol content to generate positioning message s2
(2a) Setting positioning information s according to policy standard made by China satellite navigation positioning application management center1The transmission of the message comprises: six parts of instruction, length, user address, key parameter, position parameter and sum check, wherein positioning information s is formed1The structure of these six parts of the transmission message is as follows:
"Instructions" are positioning information s1Transmitting a first part consisting of messages, wherein the first part occupies 4 bytes in length;
"Length" is positioning information s1Transmitting a second part consisting of the messages, wherein the second part occupies 1 byte length;
"user address" as positioning information s1Transmitting a third part consisting of messages, wherein the third part occupies 3 bytes in length;
the "key parameter" being the positioning information s1Transmitting a fourth part formed by messages, wherein the fourth part occupies 2 bytes in length;
"location parameter" is positioning information s1A fifth part consisting of transmission messages occupies 27 bytes in length;
"and check" as positioning information s1A sixth part consisting of the transmission message occupies 1 byte length;
(2b) generating an initial positioning information instruction message b containing (2a) the six parts0Setting the identifier of the 'instruction' part to be $ BDM, the value of the 'length' part to be 38 and the values of the other parts to be 0; when message b0When any part of the data is filled in, the original data is filled in by the filling data0 is replaced;
(2c) a user terminal A of a sender applies for user machine detection to a satellite, obtains an ID number of the user machine through feedback data of the satellite, and fills a positioning data transmission message b0The 'user address' part of the system obtains the positioning information address message b1
(2d) Positioning information s obtained in step 11Filling in location information address message b1The 'location parameter' part in the positioning information, the location message b2
(2e) User-given two key parameters k1And k2Wherein k is1∈[0,9999],k2∈[0,9999]The two numbers are integers, and the two given key parameters are filled into the positioning information position message b2The key parameter part in the positioning information is used for obtaining a positioning information key message b3
(2f) Message b of positioning information key3Each datum in the positioning information key message is sequentially converted into an ASCII code number by inquiring an ASCII code table to obtain an ASCII code sequence b 'of the positioning information key message'3
(2g) ASCII code sequence b 'for positioning information key message'3Performing CRC operation on the numerical value to obtain a checksum h, which is realized as follows:
(2g1) setting the initial value of the checksum h as 0, and setting m as 0, wherein m is an integer from 0 to 36;
(2g2) to ASCII code sequence b'3Performing exclusive-or operation on the m-th and m + 1-th sequence values to obtain an intermediate value h':
Figure GDA0002763425320000061
wherein b'3(m)ASCII code sequence b 'representing positioning information key message'3M-th sequence value of (1, b'3(m+1)ASCII code sequence b 'representing positioning information key message'3The m +1 th sequence value in (a);
(2g3) judging whether the value of m after the current cycle operation is equal to 36:
if m is equal to 36, get the final checksum h ═ h', perform (2 h);
if m is not equal to 36, making m equal to m +1, and returning to (2g 2);
(2h) filling the checksum h into the positioning information key message b3The 'sum check' part in the step (a) obtains a positioning message s2
(2f) Replacing ASCII code sequence b 'of positioning information key message by checksum h'3The last byte of the positioning message is obtained, and the ASCII code sequence b of the positioning message is obtained4
Step 3, encrypting the positioning message s by using a logistic chaotic mapping method2And obtaining a positioning ciphertext sequence C.
Referring to fig. 2, this step is implemented as follows:
(3a) respectively generating two initial value table1, table2 and two control parameter table3 and table4, wherein the first initial value table1 randomly stores 10000 nonrepeating integers from 0 to 9999, and the second initial value table2 randomly stores 10000 nonrepeating integers from 0 to 9999; the first control parameter table3 stores 5440 non-repeating integers belonging to 4560 to 9999 in a random manner, and the second control parameter table4 stores 4301 non-repeating integers belonging to 5699 to 9999 in a random manner;
(3b) using two key parameters k in (2e)1And k2First, a first initial value coefficient t is obtained by querying a first initial value table11Obtaining the second initial value coefficient t by querying the second initial value table22Then passes through two initial value coefficients t1And t2Calculating to obtain an iteration initial value X required by logistic chaotic mapping iteration0
X0=(t1×104+t2)÷108 X0∈[0,1);
(3c) Using two key parameters k in (2e)1And k2First, the coefficient t of the first control parameter is obtained by querying the first control parameter table33The second control parameter table4 is queried to obtain the second control parameter tableTwo control parameter table parameter t4Then through two control parameter coefficients t3And t4Calculating to obtain an iteration control parameter mu required by logistic chaotic mapping iteration:
μ=3+[(t4×104+t3)÷108] μ∈(3.5699456,4);
(3d) according to the initial value X of the iteration0And obtaining a ciphertext sequence C of the positioning message by iteration control parameter mu:
(3d1) let i have an initial value of 0, i ═ 0, i is an integer from 0 to 37;
(3d2) according to the initial value X of the iteration0And performing M iterations on the logistic chaotic mapping formula by the iteration control parameter mu to obtain a result X after the iteration is performed for M timesM
XM=μ·XM-1·(1-XM-1) XM,XM-1∈[0,1],M≥1,
Wherein, XM-1For the iteration result after M-1 times of iteration, "g" represents multiplication;
(3d3) at XMThe number num on the 1 st digit is sequentially taken out1Number num in the 3 rd position2And the number num at position 53These three values are then used to form an integer Q:
Q=num1·100+num2·10+num3
(3d4) complementation is carried out by using integers Q and 256 to obtain a keyi
keyi=Q%256,
Wherein "%" represents a remainder operation;
(3d5) using keyiASCII code sequence b of positioning message4Number i of (2)4iPerforming XOR operation to obtain ciphertext ciWherein c isiRepresents the ith value in ciphertext sequence C:
ci=keyi∧b4i
wherein ^ represents an exclusive-or operation;
(3d6) judging whether the value i is smaller than 37:
if the value of i is less than 37, keeping mu unchanged, and enabling X0=XMI ═ i +1, return (3d 2);
if the value of i is not less than 37, obtaining the ciphertext sequence C of the positioning message as { C ═ C }0,c1,…ci,…c37And executing the step 4.
And 4, generating a transmission data sequence data.
Two key parameters k in (2e)1,k2Combining with the cipher text sequence C of the positioning message to generate a transmission data sequence data, data ═ k1,k2,C}={k1,k2,c0,c1,…ci,…c37And transmitting the transmission data sequence data to a receiver user terminal B through a short message transmission function of a sender user terminal A.
And 5, receiving the transmission data sequence data and splitting the data.
A receiving party user terminal B receives the transmission data sequence data sent by the sending party terminal A, splits the received transmission data sequence data and obtains two key parameters k1,k2And a ciphertext sequence C, wherein the first key parameter k1For the first sequence value in data, the second key parameter k2The ciphertext sequence C is the third to the fortieth sequence values in the data.
And 6, carrying out decryption operation on the ciphertext sequence C to obtain a received message sequence P.
The receiving user terminal B is based on two key parameters k1,k2Performing (3b) to (3d) on the ciphertext sequence C to obtain a decrypted received message sequence P, where P is { P ═ P0,p1,…,pj,…p37},pjIndicating the jth sequence value in the positioning message sequence P, j being an integer from 0 to 37.
And 7, checking the received message sequence P to obtain a checking result F, and judging the transmission result.
(7a) For the first 37 numbers in the received message sequence PAccording to p0,p1,…p36And (5) checking to obtain a checking result F:
F=p0∧p1∧…∧pk∧…∧p36
wherein p iskRepresenting the k-th sequence value in the received sequence of messages P after decryption, k being an integer from 0 to 36.
(7b) Judging the checking result F ═ p37Whether or not:
if yes, positioning information transmission is completed;
if not, the receiving user terminal B waits for the sending user terminal A to transmit the next piece of data.
The foregoing description is only an example of the present invention and is not intended to limit the invention, so that it will be apparent to those skilled in the art that various changes and modifications in form and detail may be made therein without departing from the spirit and scope of the invention.

Claims (7)

1. A data security transmission method based on a Beidou short message positioning information transmission protocol is characterized by comprising the following steps:
(1) a user terminal A of a sender acquires positioning information s of the current position of a user transmitted by a navigation satellite1Positioning information s1The method comprises three kinds of information of time, longitude and latitude;
(2) formulating positioning information s1Transmitting message protocol content to generate positioning message s2
(2a) Setting positioning information s according to policy standard made by China satellite navigation positioning application management center1The transmission of the message comprises: the method comprises the following steps of instruction, length, user address, key parameter, position parameter and sum check;
(2b) generating an initial positioning information instruction message b containing (2a) the 6 parts0Setting the identifier of the "instruction" part thereof toThe BDM, the numerical value of the length part is 38, and the numerical values of other parts are 0; when message b0When any part of the data is filled, replacing original data 0 by the filled data;
(2c) a user terminal A of a sender applies for user machine detection to a satellite, obtains an ID number of the user machine through feedback data of the satellite, and fills a positioning data transmission message b0The 'user address' part of the system obtains the positioning information address message b1
(2d) The positioning information s obtained in (1) is processed1Filling in location information address message b1The 'location parameter' part in the positioning information, the location message b2
(2e) User-given two key parameters k1And k2Wherein k is1∈[0,9999],k2∈[0,9999]The two numbers are integers, and the two given key parameters are filled into the positioning information position message b2The key parameter part in the positioning information is used for obtaining a positioning information key message b3
(2f) Message b of positioning information key3Each datum in the positioning information key message is sequentially converted into an ASCII code number by inquiring an ASCII code table to obtain an ASCII code sequence b 'of the positioning information key message'3
(2g) ASCII code sequence b 'for positioning information key message'3Performing CRC operation on the numerical value to obtain a checksum h, and filling the checksum h into a positioning information key message b3The 'checksum' part in the method obtains the positioning message s2
(2h) Replacing ASCII code sequence b 'of positioning information key message by h'3The last byte of the positioning message is obtained, and the ASCII code sequence b of the positioning message is obtained4
(3) Encryption of positioning message s by using logistic chaotic mapping method2And obtaining a positioning ciphertext sequence C:
(3a) respectively generating two initial value table1, table2 and two control parameter table3 and table4, wherein the first initial value table1 randomly stores 10000 nonrepeating integers from 0 to 9999, and the second initial value table2 randomly stores 10000 nonrepeating integers from 0 to 9999; wherein 5440 non-repeating integers belonging to 4560 to 9999 are randomly stored in the first control parameter table3, and 4301 non-repeating integers belonging to 5699 to 9999 are randomly stored in the second control parameter table 4;
(3b) using two key parameters k in (2e)1And k2First, a first initial value coefficient t is obtained by querying a first initial value table11Obtaining the second initial value coefficient t by querying the second initial value table22Then passes through two initial value coefficients t1And t2Calculating to obtain an iteration initial value X required by logistic chaotic mapping iteration0
(3c) Using two key parameters k in (2e)1And k2First, the coefficient t of the first control parameter is obtained by querying the first control parameter table33The second control parameter table parameter t is obtained by querying the second control parameter table44Then through two control parameter coefficients t3And t4Calculating to obtain an iteration control parameter mu required by logistic chaotic mapping iteration;
(3d) according to the initial value X of the iteration0And after the iteration control parameter mu iterates the logistic chaotic mapping formula for M times, obtaining a key, and encrypting the ASCII code sequence b of the positioning message by using the key4Obtaining a ciphertext sequence C, wherein C ═ { C ═ C0,c1,…ci,…c37},ciRepresents the ith ciphertext value in the ciphertext sequence, i being an integer from 0 to 37;
(4) two key parameters k in (2e)1,k2Data k combined with ciphertext sequence C1,k2C, and sending the data to a receiving party user terminal B through the short message transmission function of the sending party user terminal A;
(5) the receiving party user terminal B receives the data sent by the sending party terminal A, decomposes the received data and obtains two key parameters k1,k2And the ciphertext sequence C;
(6) the receiving party is according to two key parameters k1,k2And decrypting the ciphertext sequence C to obtain a decrypted received message sequence P, wherein P is { P ═ P0,p1,…,pj,…p37},pjRepresents the j sequence value in the received message sequence P, j is an integer from 0 to 37;
(7) for the first 37 data P in the positioning message sequence P0,p1,…p36Checking to obtain a checking result F;
(8) judging the checking result F ═ p37Whether the transmission is established or not, if so, the transmission is finished; if not, the receiving user terminal B waits for the sending user terminal A to transmit the next piece of data.
2. The method of claim 1, wherein the positioning information s is formed in (2a)1The structure of the six parts of the transmission message is as follows:
"Instructions" are positioning information s1Transmitting a first part consisting of messages, wherein the first part occupies 4 bytes in length;
"Length" is positioning information s1Transmitting a second part consisting of the messages, wherein the second part occupies 1 byte length;
"user address" as positioning information s1Transmitting a third part consisting of messages, wherein the third part occupies 3 bytes in length;
the "key parameter" being the positioning information s1Transmitting a fourth part formed by messages, wherein the fourth part occupies 2 bytes in length;
"location parameter" is positioning information s1A fifth part consisting of transmission messages occupies 27 bytes in length;
"and check" as positioning information s1The sixth part of the transmission message occupies 1 byte in length.
3. The method of claim 1, wherein the ASCII code sequence b 'in (2 g)'3Performs a CRC check operation on the values in (a) and (b), which is implemented as follows:
(2g1) setting the initial value of the checksum h as 0, and setting m as 0, wherein m is an integer from 0 to 36;
(2g2) to ASCII code sequence b'3Performing exclusive-or operation on the m-th and m + 1-th sequence values to obtain an intermediate value h':
Figure FDA0002910554680000031
wherein b'3(m)ASCII code sequence b 'representing positioning information key message'3M-th sequence value of (1, b'3(m+1)ASCII code sequence b 'representing positioning information key message'3The m +1 th sequence value in (a);
(2g3) judging whether the value of m after the circulation operation is equal to 36 or not, and if m is equal to 36, obtaining the final checksum h as h'; if m is not equal to 36, let m be m +1, return (2g 2).
4. The method of claim 1, wherein the step (3b) is performed by using two initial coefficients t1And t2Calculating to obtain an iteration initial value X required by logistic chaotic mapping iteration0The implementation formula is as follows:
X0=(t1×104+t2)÷108 X0∈[0,1)。
5. the method of claim 1, wherein the parameter t in (3c) is controlled by two control parameter coefficients3And t4Calculating to obtain an iteration control parameter mu required by logistic chaotic mapping iteration, wherein the realization formula is as follows:
μ=3+[(t4×104+t3)÷108] μ∈(3.5699456,4)。
6. the method of claim 1, wherein (3d) is based on the initial value X of the iteration0And after the iteration control parameter mu iterates the logistic chaotic mapping formula for M times, obtaining a key, and encrypting the ASCII code sequence b of the positioning message by using the key4And obtaining the encrypted text sequence C,the implementation is as follows:
(3d1) setting the initial value of i as 0, and setting i as 0;
(3d2) according to the initial value X of the iteration0And performing M iterations on the logistic chaotic mapping formula by the iteration control parameter mu to obtain a result X after the iteration is performed for M timesM
XM=μ·XM-1·(1-XM-1) XM,XM-1∈[0,1],M≥1
Wherein XM-1For the iteration result after the formula iterates M-1 times, "·" represents multiplication operation;
(3d3) at XMThe number num on the 1 st digit is sequentially taken out1Number num in the 3 rd position2And the number num at position 53These three values are then used to form an integer Q:
Q=num1·100+num2·10+num3
(3d4) complementation is carried out by using integers Q and 256 to obtain a keyi
keyi=Q%256
Wherein "%" represents a remainder operation;
(3d5) using keyiASCII code sequence b of positioning message4Number i of (2)4iPerforming XOR operation to obtain ciphertext ci
ci=keyi∧b4i
Wherein ^ represents an exclusive-or operation;
(3d6) judging whether the value of i is less than 37, if i is less than 37, making X0=XMμ is unchanged, i ═ i +1, return (3d 2); if the value of i is not less than 37, obtaining the positioning ciphertext sequence C ═ { C ═ C0,c1,…ci,…c37}。
7. The method of claim 1, wherein (7) is performed on the first 37 data P in the received message sequence P0,p1,…p36And carrying out verification operation to obtain a verification result F, wherein the formula is as follows:
F=p0∧p1∧…∧pk∧…∧p36
wherein p iskRepresenting the k-th sequence value in the received sequence of messages P after decryption, k being an integer from 0 to 36.
CN201910177964.6A 2019-03-10 2019-03-10 Data safety transmission method based on Beidou short message positioning information transmission protocol Active CN109861743B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910177964.6A CN109861743B (en) 2019-03-10 2019-03-10 Data safety transmission method based on Beidou short message positioning information transmission protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910177964.6A CN109861743B (en) 2019-03-10 2019-03-10 Data safety transmission method based on Beidou short message positioning information transmission protocol

Publications (2)

Publication Number Publication Date
CN109861743A CN109861743A (en) 2019-06-07
CN109861743B true CN109861743B (en) 2021-03-23

Family

ID=66900342

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910177964.6A Active CN109861743B (en) 2019-03-10 2019-03-10 Data safety transmission method based on Beidou short message positioning information transmission protocol

Country Status (1)

Country Link
CN (1) CN109861743B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110505346B (en) * 2019-08-23 2021-04-27 中勍科技有限公司 Personal portable informing terminal equipment
CN111092649B (en) * 2019-12-25 2021-09-28 武汉中原电子集团有限公司 Single big dipper location fairway buoy based on global low orbit satellite communication
WO2023011603A1 (en) * 2021-08-06 2023-02-09 华为技术有限公司 Position reporting method and system in beidou communication system, and related apparatus
CN114051208A (en) * 2021-11-17 2022-02-15 中车工业研究院(青岛)有限公司 Method and device for vehicle-ground secure communication and computer readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105873033A (en) * 2016-05-16 2016-08-17 北京鼎合信安科技有限公司 Encryption and decryption method for short message communication
CN107566999A (en) * 2017-09-15 2018-01-09 山东东进航空科技有限公司 A kind of Big Dipper short message data compression encryption method, device and processor
CN108964870A (en) * 2018-07-05 2018-12-07 西南交通大学 The safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8539232B2 (en) * 2002-06-26 2013-09-17 Sony Corporation Information terminal apparatus, information processing apparatus and information communication system
CN105262593B (en) * 2015-09-25 2018-07-13 长春理工大学 Based on the cross-domain anonymous Identity authentication method of the encrypted spatial network of hyperchaos
CN106301753B (en) * 2016-07-29 2019-03-19 武汉大学 Multi-state variable space-time chaos plural number pseudo-noise code generator realization method and system
CN106656486A (en) * 2016-12-06 2017-05-10 北京鼎合思锐软件技术有限公司 Network security authentication and data protection device using Beidou communication satellite
CN108471348A (en) * 2018-02-09 2018-08-31 西南交通大学 A kind of safe decoding method of railway transponder message based on light weight chaos authenticated encryption
CN108683511A (en) * 2018-05-22 2018-10-19 国网陕西省电力公司 A kind of secure accessing platform based on Big Dipper short message communication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105873033A (en) * 2016-05-16 2016-08-17 北京鼎合信安科技有限公司 Encryption and decryption method for short message communication
CN107566999A (en) * 2017-09-15 2018-01-09 山东东进航空科技有限公司 A kind of Big Dipper short message data compression encryption method, device and processor
CN108964870A (en) * 2018-07-05 2018-12-07 西南交通大学 The safe Enhancement Method of railway transponder message based on motor synchronizing chaos cipher

Also Published As

Publication number Publication date
CN109861743A (en) 2019-06-07

Similar Documents

Publication Publication Date Title
CN109861743B (en) Data safety transmission method based on Beidou short message positioning information transmission protocol
US8654974B2 (en) Apparatus and method to provide secure communication over an insecure communication channel for location information using tracking devices
JP6684967B2 (en) Method, sender and receiver for authentication and integrity protection of message content
US6169805B1 (en) System and method of operation for providing user's security on-demand over insecure networks
CN104025498A (en) Methods and apparatus for sharing real-time user context information
CN110224976B (en) Encrypted communication method, device and computer readable storage medium
CN101317357B (en) Key management
CN110572828A (en) internet of things security authentication method, system and terminal based on state cryptographic algorithm
CN113259106B (en) Data processing method and system
CN101980327A (en) Sending method and device and receiving method and device for spatial position, and terminal
CN110188558A (en) A kind of data processing method and relevant device
CN111368336B (en) Secret sharing-based training method and device, electronic equipment and storage medium
CN101153910B (en) Method and system for safe transmission of GPS locating information and GPS receiver
WO2014030706A1 (en) Encrypted database system, client device and server, method and program for adding encrypted data
CN110581838A (en) Method for continuously requesting data stream, electronic device and computer equipment
CN105527630B (en) A kind of satellite navigation chip and its application process of integrated data security function
CN105228114A (en) A kind of Encrypted short message receive-transmit system based on power failure navigation system and method
CN110278077B (en) Method, device, equipment and storage medium for acquiring data information of electric energy meter
CN116488919A (en) Data processing method, communication node and storage medium
Hu et al. A security transmission system for Beidou short message based on SM9
Liao et al. A location-dependent data encryption approach for enhancing mobile information system security
CN106899600A (en) The data processing method and device of water purifier
CN114697117A (en) Verification method, device, scrambler and system based on positioning information
CN113162678B (en) Method, terminal, electronic device and medium for key switching and data transmission
CN110138811B (en) Encryption method for data transmission of Internet of things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant