CN111970238A - Reliable method for controlling safe transmission of near space airship load instruction - Google Patents

Reliable method for controlling safe transmission of near space airship load instruction Download PDF

Info

Publication number
CN111970238A
CN111970238A CN202010659003.1A CN202010659003A CN111970238A CN 111970238 A CN111970238 A CN 111970238A CN 202010659003 A CN202010659003 A CN 202010659003A CN 111970238 A CN111970238 A CN 111970238A
Authority
CN
China
Prior art keywords
instruction
time
commander
command
load
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010659003.1A
Other languages
Chinese (zh)
Other versions
CN111970238B (en
Inventor
罗喜伶
周泽全
郑昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN202010659003.1A priority Critical patent/CN111970238B/en
Publication of CN111970238A publication Critical patent/CN111970238A/en
Application granted granted Critical
Publication of CN111970238B publication Critical patent/CN111970238B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Traffic Control Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Radio Relay Systems (AREA)

Abstract

The invention relates to a reliable method for controlling safe transmission of a load instruction of an aircraft, which adopts the technical means of public key encryption, digital signature, integrity verification and the like based on identity and aims to solve the problems of reliability, safety and the like of the transmission of the load instruction of the aircraft. When the airship load interacts with a commander, the aircraft approaching load A updates the instruction packet according to the flight mission, and carries out digital signature by using a signature private key of the commander B, so that the two parties have unified time. The commander B issues a command within a certain time T and encrypts the command by using an identity-based encryption system. And A receives the encryption instruction, decrypts the encryption instruction by using the public key of the commander, checks whether a specific condition is met, and encrypts and replies by using the symmetric secret key. And after receiving the reply of the airship load, the commander B decrypts the airship by using the symmetric secret key and responds to the decrypted reply. Therefore, the invention has strong guarantee on safety and reliability.

Description

Reliable method for controlling safe transmission of near space airship load instruction
Technical Field
The invention relates to the field of traffic instruction safe transmission control, in particular to a reliable method for controlling safe transmission of a load instruction of an aircraft airship.
Background
The development of aerospace technology greatly changes the structure of transportation, airplanes provide people with a quick, convenient, economic, safe and comfortable transportation means, international flights have replaced ocean passenger ships, become main tools for people to come and go between continents, and closely link all countries in the world. An airship is a lighter-than-air craft, and is largely distinguished from a hot air balloon by having means for propelling and controlling flight conditions. The airship consists of a huge streamline hull, a nacelle positioned below the hull, a tail surface for stabilizing and controlling and a propelling device. The special shape of the airship also determines a plurality of special purposes, and the airship is lifted by buoyancy generated by buoyancy gas with density lower than that of air filled in the air bag of the airship body. The gondola is used for passengers to take and load cargo. The tail surface is used for controlling and maintaining the stability of course and pitching.
The airship in the adjacent space has a large amount of helium filled into the air bag to make the density of the whole airship lower than that of air below 2 ten thousand meters, so that no extra power consumption is needed to maintain the height of two thousand meters. Because the low earth orbit satellite has the characteristics of needing to orbit around the earth, the low earth orbit satellite cannot be resident and monitored in a certain area for a long time, and the geosynchronous satellite is too far away from the ground, the monitoring range is wide, and the monitoring resolution is not high. The air airship can be parked for a long time or fly to an empty adjacent space area 20 kilometers above the ground, so that the concerned area can be parked and monitored for a long time, a high-resolution monitoring effect is obtained, and the air airship can be widely applied to monitoring of traffic conditions, natural disasters and the like in the area in a large range.
The aircraft needs to be matched with different loads in order to realize specific functions. How to ensure safe and reliable control and management of the load of the air airship is a difficult problem which needs to be solved urgently, for example, lawless persons may tamper with a control instruction of the load, and then hijack and control the air airship to implement illegal attacks and other behaviors, so that huge economic loss and social harm are caused. At present, all schemes for controlling the load of the air airship only stay in the aspect of enhancing the reliability of communication and flight control protocols for the airship, but lack how to ensure the information security of control command transmission, and once the control command is invaded, tampered or forged by illegal molecules, great loss is brought.
Therefore, aiming at the problem of the transmission method of the load instruction of the blinker, the invention provides a reliable method for safely transmitting the load instruction of the blinker, and the safety and the reliability of controlling the transmission of the load instruction of the blinker are ensured.
Disclosure of Invention
The invention provides a method for reliably controlling safe transmission of a load instruction of an aircraft airship. The method adopts technical means such as public key encryption based on identity, digital signature, integrity verification and the like, and aims to solve the problems of reliability, safety and the like of the transmission of the load instruction of the blinker in the air at present.
A method for reliably controlling safe transmission of load instructions of an aircraft airship comprises the following steps:
s1: the invention relates to two participants of a load A and a commander B of a flight airship, wherein the commander B runs an identity-based key generation algorithm to generate a public key pair (pk, sk), a digital signature key pair (spk, ssk) and a symmetric encryption key k.
S2: and updating the instruction packet by the load A of the aircraft airship according to the flight mission, and digitally signing by the signature private key of the commander B, wherein the two parties share the same time.
S3: command B issues command m within a certain time TiI denotes the ith command issued in sequence, m being paired with the encryption key skiAnd the time t of the current time1Carry out encryption C ═ Esk(miPiPt1) And E denotes encryption.
S4: a receives the encrypted instruction C and then decrypts the encrypted instruction C by using the public key pk of the commander to obtain the command miSequence number i and time t1. When the following four conditions are met simultaneously, A replies that the instruction r is received and the time t at the moment2And using symmetric encryption R ═ Ek(rPt2)。
(1) Receiving an instruction within time T;
(2) compare the instruction packet, when miConforming to the content of the instruction packet;
(3) when the sequence numbers i are arranged in sequence;
(4) when time t is1When correctness is satisfied.
Otherwise, replying error instruction wrong and time t at the time2And encrypting R ═ E with a symmetric keyk(wrongPt2) The instructions are detailed in table 1.
TABLE 1 error feedback code representation
Type of error Instruction mismatch Index error Timestamp error Not receiving instruction in T time
Wrong instruction II IE TE NR
S5: and after receiving the reply of the airship load, the commander B decrypts the airship by using the symmetric secret key. If r is received, sending the next instruction within the time T; if wrong is received, the last instruction is retransmitted.
The invention provides a reliable method for controlling safe transmission of a load instruction of an aircraft airship.
Drawings
Fig. 1 is a simplified flowchart of a method for reliably controlling safe transmission of a load command of an aircraft airship according to the present invention.
Detailed Description
In order to make the objects, aspects and effects of the embodiments of the present invention clearer and clearer, the present invention is further described in detail below by way of examples with reference to the accompanying drawings.
The method comprises the following specific implementation steps:
s1: the invention relates to two participants of a load A and a commander B of an aircraft flight airship, wherein the commander B runs an IBE cryptosystem to generate a public key and a secret key pair (pk, sk) based on an identity key method; the digital signature adopts a BLS short signature to generate a key pair (spk, ssk); symmetric encryption adopts AES cipher constitution to generate a secret key k.
S2: and updating the instruction packet by the load A of the aircraft airship according to the flight mission, and digitally signing by the signature private key of the commander B, wherein the two parties share the same time.
S3: command B issues command m within a certain time TiI denotes the ith command issued in sequence, m being paired with the encryption key skiAnd the time t of the current time1Carry out encryption C ═ Esk(miPiPt1) And E denotes encryption.
S4: a receives the encrypted instruction C and then decrypts the encrypted instruction C by using the public key pk of the commander to obtain the command miSequence number i and time t1. When the following four conditions are met simultaneously, A replies that the instruction r is received and the time t at the moment2And using symmetric encryption R ═ Ek(rPt2)。
(1) Receiving an instruction within time T;
(2) compare the instruction packet, when miConforming to the content of the instruction packet;
(3) when the sequence numbers i are arranged in sequence;
(4) when time t is1When correctness is satisfied.
Otherwise, replying error instruction wrong and time t at the time2And encrypting R ═ E with a symmetric keyk(wrongPt2) The instructions are detailed in table 1.
TABLE 1 error feedback code representation
Type of error Instruction mismatch Index error Timestamp error Not receiving instruction in T time
Wrong instruction II IE TE NR
S5: and after receiving the reply of the airship load, the commander B decrypts the airship by using the symmetric secret key. If r is received, sending the next instruction within the time T; if wrong is received, the last instruction is retransmitted.

Claims (6)

1. A method for reliably controlling safe transmission of load instructions of an aircraft airship is characterized by comprising the following steps:
s1: the invention relates to two participants of a load A and a commander B of an aircraft flight vehicle, wherein the commander B runs an identity-based key generation algorithm to generate a public key pair (pk, sk), a digital signature key pair (spk, ssk) and a symmetric encryption key k;
s2: updating the instruction packet by the load A of the aircraft airship according to the flight mission, and digitally signing by a signature private key of a commander B, wherein the two parties have the same time;
s3: command B issues command m within a certain time TiI denotes the ith command issued in sequence, m being paired with the encryption key skiAnd the time t of the current time1Carry out encryption C ═ Esk(mi PiPt1) And E represents encryption;
s4: a, after receiving the encrypted instruction C, uses the commanderDecrypting the public key pk to obtain the command miSequence number i and time t1. When the following four conditions are met simultaneously, A replies that the instruction r is received and the time t at the moment2And using symmetric encryption R ═ Ek(rPt2),
(1) Receiving an instruction within time T;
(2) compare the instruction packet, when miConforming to the content of the instruction packet;
(3) when the sequence numbers i are arranged in sequence;
(4) when time t is1When correctness is satisfied.
Otherwise, replying error instruction wrong and time t at the time2And encrypting R ═ E with a symmetric keyk(wrongPt2) The instructions are detailed in Table 1,
TABLE 1 error feedback code representation
Type of error Instruction mismatch Index error Timestamp error Not receiving instruction in T time Wrong instruction II IE TE NR
S5: and after receiving the reply of the airship load, the commander B decrypts the airship by using the symmetric secret key. If r is received, sending the next instruction within the time T; if wrong is received, the last instruction is retransmitted.
2. The method according to claim 1, wherein the commander B employs an identity-based cryptosystem, that is, the cryptographic key and the digital signature key of the commander are both related to the identity information of the commander, the identity information includes a user identification number, a mobile phone number, a mailbox, an address, biometric information (fingerprint, iris) and the like, and a symmetric cryptosystem is employed.
3. The method of claim 1, wherein the blimp load A updates the command packet based on the mission and is digitally signed with the private signature key of the commander B, both parties being time-aligned, the digital signature being used to ensure that the flight command cannot be destroyed, the time-aligned ensuring the immediacy of the flight command.
4. The method of claim 1, wherein commander B encrypts commands, command order and issued command time with an identity-based password for airship load judgment command correctness.
5. The method of claim 1, wherein the airship load A decrypts the received commands, obtains the commands, the command sequence and the command issuing time, verifies the correctness of the commands, and replies by using a symmetric cipher if the airship load A does not receive the commands within the time T.
6. The method of claim 1, wherein commander B confirms whether the instruction is safely delivered and determines the next action for the received reply of a.
CN202010659003.1A 2020-07-09 2020-07-09 Reliable method for controlling safe transmission of near space airship load instruction Active CN111970238B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010659003.1A CN111970238B (en) 2020-07-09 2020-07-09 Reliable method for controlling safe transmission of near space airship load instruction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010659003.1A CN111970238B (en) 2020-07-09 2020-07-09 Reliable method for controlling safe transmission of near space airship load instruction

Publications (2)

Publication Number Publication Date
CN111970238A true CN111970238A (en) 2020-11-20
CN111970238B CN111970238B (en) 2022-06-10

Family

ID=73361256

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010659003.1A Active CN111970238B (en) 2020-07-09 2020-07-09 Reliable method for controlling safe transmission of near space airship load instruction

Country Status (1)

Country Link
CN (1) CN111970238B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107066898A (en) * 2016-04-21 2017-08-18 泰雷兹公司 For method, computer program product, related electronic device and the system of the avionic device more new file for handling aircraft
CN107154854A (en) * 2017-05-19 2017-09-12 李维刚 A kind of unmanned plane instruction is reinforced and discrimination method and system
CN107452198A (en) * 2016-04-08 2017-12-08 空中客车运营简化股份公司 The transmission method of surface units, aircraft and flight directive
CN108966174A (en) * 2018-07-27 2018-12-07 长春草莓科技有限公司 A kind of communication encryption method of unmanned plane and earth station
US10365645B1 (en) * 2015-04-14 2019-07-30 Zipline International Inc. System and method for human operator intervention in autonomous vehicle operations
CN110932812A (en) * 2019-11-13 2020-03-27 深圳供电局有限公司 Task sending method, task receiving method and system based on time synchronization
CN111031535A (en) * 2019-11-15 2020-04-17 华中科技大学 Secure communication method and system for smart card system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10365645B1 (en) * 2015-04-14 2019-07-30 Zipline International Inc. System and method for human operator intervention in autonomous vehicle operations
CN107452198A (en) * 2016-04-08 2017-12-08 空中客车运营简化股份公司 The transmission method of surface units, aircraft and flight directive
CN107066898A (en) * 2016-04-21 2017-08-18 泰雷兹公司 For method, computer program product, related electronic device and the system of the avionic device more new file for handling aircraft
CN107154854A (en) * 2017-05-19 2017-09-12 李维刚 A kind of unmanned plane instruction is reinforced and discrimination method and system
CN108966174A (en) * 2018-07-27 2018-12-07 长春草莓科技有限公司 A kind of communication encryption method of unmanned plane and earth station
CN110932812A (en) * 2019-11-13 2020-03-27 深圳供电局有限公司 Task sending method, task receiving method and system based on time synchronization
CN111031535A (en) * 2019-11-15 2020-04-17 华中科技大学 Secure communication method and system for smart card system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
梅风华等: "一种高误码率信道条件下的无人机载光电吊舱操控指令传输策略", 《光学与光电技术》 *
梅风华等: "一种高误码率信道条件下的无人机载光电吊舱操控指令传输策略", 《光学与光电技术》, vol. 15, no. 04, 10 August 2017 (2017-08-10), pages 69 - 71 *

Also Published As

Publication number Publication date
CN111970238B (en) 2022-06-10

Similar Documents

Publication Publication Date Title
ES2681919T3 (en) Security Certificate Management
CN104484199B (en) Aircraft IFE system datas update method and device
CN110233869B (en) Passenger boarding data sharing method based on block chain and related equipment
CN109474594B (en) Ship-side data light-weight device, shore-side data reduction device, ship-shore integrated data light-weight transmission system and transmission method
CN106888096B (en) Secure broadcast multi-signature method based on obfuscation
US8341413B2 (en) Method of communicating a digital signature to certify a transmission, associated system and aircraft
CN107438989A (en) Certification message between unmanned vehicle
CN106487504B (en) Lightweight network secure two-way aircraft communication addressing and reporting system transmission
CN102833265A (en) Network theory based signature scheme and secure linear network encoding method thereof
WO2007115246A1 (en) Secure ads-b authentication system and method
CN111148073B (en) Secret key management method and system for train-ground communication transmission information
EP3576367A1 (en) Systems and methods for authenticating data transmissions to vehicles
CN108540198A (en) The anti-tamper recording method of civil aviaton's flying quality based on block chain technology and device
Hessami A systems framework for safety and security: the holistic paradigm
CN104426908A (en) System and method for trusted mobile communications
CN111970238B (en) Reliable method for controlling safe transmission of near space airship load instruction
CN110267266A (en) A kind of improved train control system secure data exchange method
CN114339632A (en) SM4 packet encryption algorithm-based Beidou short message encryption and decryption method
Berthier et al. SAT: Security in the air using Tesla
CN106850529A (en) Using redundant circuit replaceable unit(“LRU”)Information can be changed with compound aircraft(“AMI”)Aircraft Identity Management
CN117676562B (en) Data safety communication method
CN106411527A (en) Data authentication method in very-high-frequency data chain transmission
CN113806807B (en) Network vehicle-booking system and method based on privacy contract
Castelvecchi China’s quantum satellite clears major hurdle on way to ultrasecure communications
KR102493780B1 (en) System and method for monitoring the ground using hybrid unmanned airship

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant