CN113079016B - Identity-based authentication method facing space-based network - Google Patents
Identity-based authentication method facing space-based network Download PDFInfo
- Publication number
- CN113079016B CN113079016B CN202110306820.3A CN202110306820A CN113079016B CN 113079016 B CN113079016 B CN 113079016B CN 202110306820 A CN202110306820 A CN 202110306820A CN 113079016 B CN113079016 B CN 113079016B
- Authority
- CN
- China
- Prior art keywords
- authentication
- leo
- private key
- satellite
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/185—Space-based or airborne stations; Stations for satellite systems
- H04B7/1851—Systems using a satellite or space-based relay
- H04B7/18519—Operations control, administration or maintenance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Physics & Mathematics (AREA)
- Astronomy & Astrophysics (AREA)
- Aviation & Aerospace Engineering (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Radio Relay Systems (AREA)
Abstract
The invention discloses an identity-based authentication method facing a space-based network, which aims to solve the problem of security authentication between a ground terminal and a satellite in the space-based network and improve the security of space-based network communication. The technical scheme is that an identity-based authentication system facing a space-based network, which consists of a ground terminal, a key generation center KGC and a low-orbit satellite, is constructed; the KGC initialization calculation module calculates a system master key and public parameters; the KGC private key calculation module calculates a corresponding private key and distributes the private key and the public parameters to the ground terminal and the satellite. Terminal TEAPerforming current over-the-top satellite LEO upon accessAAnd TEAMutual authentication and session key agreement, then LEOAAnd TEANormal communication, LEOAPredicting LEO at end of service ifAThe user is about to leave the current area, inter-satellite switching authentication is carried out, and if LEO is judged in advanceANot leave, then LEOAAnd TEAThe communication is continued. The invention effectively reduces the size of the transmission message, and realizes the fast switching authentication and the session key negotiation while ensuring the safety.
Description
Technical Field
The invention relates to the field of space network security communication, in particular to an identity-based authentication method facing a space-based network.
Background
As a powerful supplement to the traditional ground network, the space-based network can provide access service to special areas such as desert, and real global interconnection is realized. However, due to the natural open environment of satellite communication, a malicious attacker can easily acquire communication data between satellites and the ground or pretend that a legitimate user issues malicious instructions, and these behaviors pose a great challenge to the security of the space-based network. Therefore, the space-based network needs an authentication scheme to ensure the self-operation safety; the main roles of authentication are two: firstly, the legality of the ground terminal is identified, and it is guaranteed that only a legal terminal can send acquired data to a satellite; and secondly, the terminal authenticates the legality of the satellite to ensure that the satellite sending the control command is legal. The space-based network is a concept which is created in recent years, research on security technologies in the space-based network is relatively few at home and abroad, in the existing research on the security technologies of the space-based network, authentication between a user and a network control center is mostly considered in an authentication method, however, in the space-based network, a satellite needs to send a control instruction to a ground terminal, and the ground terminal needs to upload collected data to the satellite, so that authentication between the satellite and the ground terminal in the space-based network is an extremely important link. Currently, the research on the authentication between the satellite and the ground terminal is poor, and therefore, a mutual authentication method between the satellite and the ground terminal in the space-based network needs to be designed to ensure the secure communication between the sky and the ground.
When designing the authentication method, the characteristics of the space-based network need to be considered:
(1) the network topology changes highly. Since the satellites move around the earth at a high speed with time, each satellite only has a few minutes of time to provide service for the ground terminal in a specific area, and therefore, the authentication method in the space-based network should enable the ground terminal to perform bidirectional authentication quickly when switching from the current service satellite to the next satellite.
(2) The network transmission delay is high. The link transmission rate in the space-based network is kbps level, which is limited by the development of the ground platform terminal, and the interaction times required by the authentication between the satellite and the ground terminal are as small as possible in order to reduce the total time consumed by the authentication.
(3) Network bandwidth resources are limited. The space-based network depends on a low-orbit narrow-band satellite constellation, and the network bandwidth is very limited, so the message size involved in the authentication process is as small as possible.
(4) Ground terminals and on-board computing storage capabilities are limited. Under the influence of satellite payload technology and terminal infrastructure, the computation storage capacities of both the satellite and the terminal are very limited, and the computation operations required to complete the authentication process cannot be very complex.
The traditional space-based network security authentication method comprises an authentication method based on a traditional digital certificate, a source authentication method based on an extended broadcast identity verification protocol certificate, a lightweight authentication method based on identity identification, a distributed authentication method based on an identity-based cryptography technology and a block chain technology, and a dynamic access method based on a token. However, the traditional space-based network security authentication method has the following technical problems:
(1) the authentication method based on the traditional digital certificate refers to bidirectional authentication and session key negotiation in a space-based network by using a public key encryption algorithm. In the method, both communication parties need to send own digital certificates to each other, the communication and calculation costs are high, and the method is not suitable for the space-based network environment with limited communication bandwidth.
(2) The source authentication method based on the extended broadcast identity authentication protocol certificate is characterized in that a satellite is used as an authentication center to generate the extended broadcast identity authentication protocol certificate and operate a source authentication protocol.
(3) The lightweight authentication method based on the identity identification refers to a symmetric encryption algorithm is used for transmitting a user ID and a session key between a user and a network control center. However, by adopting the method, once the attacker obtains the key once in the data transmission process, the key of the subsequent session can be obtained from the message, thereby causing serious potential safety hazard.
(4) A distributed authentication method based on an identity-based cryptography technology and a block chain technology is characterized in that the identity-based cryptography is used to avoid complex certificate management and reduce communication overhead caused by certificate transmission, and the block chain is used in the authentication process to prevent the authentication bottleneck problem caused by a centralized authentication protocol. However, the block chain technique adopted in the method has higher requirements on the calculation and storage capacities of the satellite loads, the space-based network is influenced by the satellite payload technique and the terminal infrastructure, and the calculation and storage capacities of the satellite and the terminal are very limited, so that the method is not suitable for the current space-based network environment.
(5) A dynamic access method based on a token is characterized in that a pre-authentication vector is constructed by utilizing the certainty of a satellite running track in a low-orbit satellite network and the high synchronism of clocks of all communication nodes, and a user does not need to interact with a network control center except an initial access process by utilizing the pre-authentication vector, so that the authentication delay is effectively reduced. However, with the method, an attacker can pass authentication as long as acquiring the true identity authentication value (ID value) of the user, and then access the space-based network to implement attacks such as impersonation, replay, tampering and the like.
In view of this, how to solve the problem of security authentication between the ground terminal and the satellite in the space-based network environment, and effectively improving the security of the space-based network communication become problems to be urgently solved by researchers in the field.
Generally, in order to ensure the resistance of a message (which means that some mechanisms are used so that two communication parties cannot deny the behavior of sending information and the content of the information by themselves), a sender of the message uses a private key to generate a signature for the message, and sends an original message and the signature together, and after a receiver receives the message (including the original message and the signature), the receiver verifies the validity of the signature according to a public key of the sender and the original message. The signature method with the message recovery function means that a sender can recover the corresponding original message by using the signature and the public key without sending the complete original message. Compared with the traditional signature scheme, the signature scheme with the message recovery function needs to transmit a smaller message size. Signature methods with message functions are currently generally used in environments where network transmission bandwidth is limited, such as mobile ad hoc networks; identity-based cryptography means that two communication parties can deduce a corresponding public key according to an Identity (ID) provided by the other party, thereby avoiding transmitting own digital certificates in the communication process and effectively reducing the size of transmitted messages. Identity-based cryptography is currently commonly used in secure email systems and mobile ad hoc networks. The identity-based signature method with the message recovery function (belonging to identity-based cryptography) effectively reduces the size of the transmitted message while ensuring the resistance to denial, so that the method is suitable for the communication environment with limited bandwidth resources. In the space-based network, the communication bandwidth is limited, and the identity-based signature method with the message recovery function is a good choice. But no prior publication relates to the use of an identity-based signature algorithm with message recovery for bidirectional authentication and session key agreement of satellite and terrestrial terminals in space-based networks.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an authentication method which has the characteristics of fast switching authentication, less interaction times, small authentication message size, proper calculation operation difficulty, capability of resisting various network attacks and the like, is suitable for a space-based network environment, solves the safety authentication problem of a ground terminal and a satellite in a space-based network, and effectively improves the safety of space-based network communication.
The technical scheme of the invention is as follows: and realizing mutual authentication and session key negotiation between the satellite and the ground terminal by using the cryptography technologies such as an identity-based signature method with a message recovery function, a message verification code, an ECDH (explicit Curve Diffie-Hellman, which is translated into a Diffie-Hellman key exchange algorithm on an Elliptic Curve, and Diffie and Hellman are personal names) algorithm and the like. The identity-based signature method with the message recovery function does not require a sender to send a complete original message, a receiver can recover the corresponding message by using the signature and the public key, and compared with a general signature method, the method has the advantages that the size of the message to be transmitted is smaller; the identity-based cryptography can avoid complex certificate management, avoid the transmission of a digital certificate in the authentication process and effectively reduce the size of a message transmitted in the authentication; the message verification code technology is used for an inter-satellite switching authentication process to realize rapid switching authentication; the ECDH algorithm is used for completing the negotiation of the session key while the authentication is performed, and compared with the method for performing the negotiation of the session key after the authentication is completed, the method can reduce the interaction between the satellite and the ground once.
Aiming at the identity authentication problem in the space-based network, the invention designs an identity-based security authentication scheme facing the space-based network. The scheme effectively reduces the size of the transmission message and the interaction turns between the satellite and the ground in the authentication process by using the identity-based signature method with the message recovery function. In addition, in order to reduce the influence caused by inter-satellite switching, a corresponding inter-satellite switching authentication message is designed by particularly utilizing a message verification code technology, and inter-satellite switching authentication is efficiently realized. The security analysis shows that the invention has the security characteristics of bidirectional authentication, replay attack resistance, session key agreement and the like.
The specific technical scheme of the invention is as follows:
firstly, an identity-based authentication system facing a space-based network is constructed. The identity-based authentication system facing the space-based network consists of three network entities, namely a ground terminal (recorded as TE), a key generation center (recorded as KGC) and a low-earth orbit satellite (recorded as LEO). The KGC is connected to a plurality of TEs and LEOs via wireless links.
Before mutual Authentication between TE and LEO, KGC calculates a system main key x and public parameter params by using an initialization parameter generation algorithm in an identity-based signature scheme with a message recovery function (see Shim K-A. foundation: a Practical Wireless Sensor network Multi-User Broadcast Authentication scheme [ J ]. IEEE Information Forensics and secure transaction 2017, PP:1-1. English literature index is Shim K-A.BASIS: A Practical Multi-User Broadcast Authentication scheme [ J ]. IEEE transaction scheme Wireless Sensor Networks [ J ]. IEEE Transactions on Information dynamics and security 2017, PP: 1-1.); KGC receives identity identification, a request for applying public parameters and a request for applying a private key from TE and LEO, KGC uses a private key generation algorithm in an identity-based signature scheme with a message recovery function provided by Kyung-Ah Shim, calculates the private keys of TE and LEO by using public parameters params and a master key x, distributes satellite private keys and public parameters to satellites in a safe environment (for example, two communication parties establish safe session connection by adopting a secure socket protocol), and distributes private keys and public parameters of ground terminals to ground terminals.
TE and LEO are connected with each other and connected with KGC, before communication, registration is carried out on KGC, ID selected by TE or LEO, request for applying public parameter and request for applying private key are submitted to KGC, and satellite is over-pushed (order is LEO) currentlyA) After receiving the satellite's private key from the KGC, the LEOAGenerating satellite authentication message (denoted as L)A) Sending to the current ground terminal (order is TE)A),TEATo LAAfter the authentication is passed, a ground terminal authentication message (marked as T) is generatedA) Is sent to LEOA。LEOAFor TAAnd performing authentication to complete mutual authentication of the satellite and the ground terminal. Due to the high speed of satellite motion around the earth over time. Each satellite only has a few minutes of providing service for ground terminals in a specific area, and the LEO of the current over-the-top satelliteAWhen leaving, it will switch authentication security parameter k over the secure channels(LEOAAn integer k selected randomlys∈N*,N*Is a positive integer set) to the current ground terminal TEAWill k issAnd TEAID ofASent to the next over-the-top satellite (noted LEO)B),TEAGenerating terminal rapid authentication message (marked as TF)A) Is sent to LEOB,LEOBFor TFAPerforming authentication, and generating satellite after the authentication is passedFast authentication message (marked as LF)A) Is sent to TEA,TEAFor LFAAnd performing authentication to finish the rapid switching authentication process.
The KGC is provided with an initialization calculation module and a private key calculation module, and the ground terminal and the satellite are provided with a private key and public parameter management module, an authentication calculation module, a verification module and a switching authentication module.
The initialization calculation module on the KGC generates a public parameter params and a system master key x, and sends the params and x to the private key calculation module of the KGC. The private key calculation module is connected with the private key and public parameter management module of the ground terminal and the satellite. The private key calculation module receives the identity of the ground terminal, a request for applying for the public parameters and a request for applying the private key from the private key and public parameter management module of the ground terminal, calculates the private key of the ground terminal according to the identity of the ground terminal and sends the private key and the public parameters to the private key and public parameter management module of the ground terminal. The private key calculation module receives the identity identification of the satellite, the request for applying the public parameter and the request for applying the private key from the private key and public parameter management module of the satellite, calculates the private key of the satellite according to the identity identification of the satellite and sends the private key and the public parameter to the private key and public parameter management module of the satellite.
The private key and public parameter management module is connected with the private key calculation module and the authentication calculation module (belonging to the same network entity with the private key and public parameter management module) of the KGC, and is responsible for receiving the private key and the public parameter sent by the private key calculation module and sending the private key and the public parameter to the authentication calculation module.
The authentication calculation module is connected with the private key and public parameter management module (belonging to the same network entity with the authentication calculation module), the verification module (belonging to the same network entity with the authentication calculation module), and the authentication calculation module of another network entity (such as the authentication calculation module of a satellite (a class of network entity) is connected with the authentication calculation module of a ground terminal (another class of network entity), but the authentication calculation module of the satellite A (a class of network entity) is connected with the authentication calculation module of another satellite B (the same class of network entity)), the authentication calculation module receives the public parameters and the private key from the private key and public parameter management module, generates an authentication message by using the private key and the public parameters, and sends the authentication message to the authentication calculation module of the other network entity; and after receiving the authentication message sent by the authentication calculation module of another network entity, the authentication calculation module sends the received authentication message to the verification module.
The verification module is connected with the authentication calculation module (belongs to the same network entity with the verification module), the verification module receives the authentication message from the authentication calculation module and then verifies the authentication message, a session key is calculated after the authentication is passed, the session key and any symmetric encryption algorithm (such as AES, DES and the like) are used for encrypting and decrypting the message in the subsequent communication process with another network entity (for example, the satellite calculates the session key and then encrypts the message by using the session key of the satellite and then sends the message to the ground terminal, the ground terminal decrypts the received message by using the session key of the ground terminal after receiving the message, the ground terminal also encrypts the message by using the session key of the ground terminal before sending the message and then sends the message to the satellite, and the satellite decrypts the message by using the session key of the satellite) so as to complete the safe communication between the satellite and the ground terminal.
Current ground terminal TEACurrent overhead satellite LEOANext satellite LEO over the topBThe switching authentication modules of the three are connected with each other. The overhead satellites of any ground terminal at any time are fixed throughout the system (the satellites move around the earth at high speed over time, the time that each satellite services a ground terminal in a particular area is fixed for only a few minutes, and therefore the overhead satellites of a ground terminal are fixed for any period of time throughout the system.) at the LEOAAt the end of the service, the LEOADetermine imminent handover, LEOATo the TEAThe switching authentication module sends a switching authentication security parameter ksTo LEOBThe switching authentication module of (1) sends the TEAID ofAAnd handover authentication security parameter ks. Then TEAThe switching authentication module generates a terminal rapid authentication message TFAIs sent to LEOBThe handover authentication module of (a) is,LEOBis switched to TFAPerforming authentication, and after the authentication is passed, LEOBSwitching authentication module generates satellite fast authentication message LFAIs sent to TEAOf the handover authentication module, TEAHandover authentication module pair LFAAnd verifying to finish the fast switching authentication.
Secondly, an initialization calculation module on the KGC calculates a main key and public parameters of the system by using an initialization parameter generation algorithm in an identity-based signature scheme with a message recovery function (see Shim K-A. foundation: a Practical Wireless Sensor network Multi-User Broadcast Authentication scheme [ J ]. IEEE Information Forensics and secure transaction 2017, PP:1-1. English literature index is Shim K-A.BASIS: A Practical Multi-User Broadcast Authentication scheme [ J ]. IEEE transaction on Information Forensics and security 2017, PP: 1-1.) provided by Kyung-Ah Shim, and the specific flow is as follows:
2.1 initializing calculation Module selecting finite field FqAfter determining E, the initialization calculation module randomly selects a prime number P (P can divide the number of points on E) and a point P (the order of the point P is P) according to the current Secp256k1 standard, the number of points on the elliptic curve is fixed and is not a random variable, and the number of points on E is not a prime number in general.
2.2 from the prime integer space (denoted by) Select a numberAs the master key of the identity-based authentication system facing the space-based network, the global public key P is calculatedpub=xP。
2.3 selection of four Hash Functions H1,H2,F1,F2Wherein H1,H2:{0,1}*→ZP(H1,H2The function of (1) is to map a 01 binary sequence code with an arbitrary length into a 01 binary sequence code with a length of a, and a belongs to Zp,ZpIs a prime integer space containing p),(F1the function of the method is to map 01 binary sequence codes with arbitrary length into a length k2The 01 binary sequence code of),(F2has the effect of reducing the length to k1Mapping 01 binary sequence code to length k201 binary sequence code), k1And k2Is two positive integers and satisfies p ═ k1+k2。
2.4 mixing Fq,E,p,P,Ppub,H1,H2,F1,F2,k1,k2The identity-based authentication system public parameters params and params which are combined to form the space-based network<Fq,E,p,P,Ppub,H1,H2,F1,F2,k1,k2>Params is published.
And thirdly, the private key calculation module on the KGC calculates a corresponding private key according to the identity submitted by the ground terminal and the satellite, and distributes the private key and the public parameter params to the private key and public parameter management module of the ground terminal and the satellite. The method comprises the following steps:
3.1 ground terminal TEAThe private key and public parameter management module submits an identity ID to a private key calculation module of the KGCAA request for applying the public parameter params and a request for applying the private key.
3.2 private Key computation Module from ground terminal TEAThe private key and public parameter management module receives the IDAAnd request for public parameter params, request for private key, calculation and IDACorresponding private key skA(ii) a The method for calculating the private key adopts a private key generation algorithm in an identity-based signature scheme with a message recovery function, which is provided by Kyung-Ah Shim, and comprises the following steps:
3.2.1 private Key computation Module fromRandomly selecting any number from the middle random selection list as a ground terminal registration random number, and recording the random number as rA,
3.2.2 private Key computation Module compute private Key skA,skA=(RA,vA),RA=rAP,vA=rA+cAxmod p, wherein cA=H1(IDA,RA),RAIs the front part of the private key of the ground terminal, cAIs a ground terminal private key hash intermediate value, vAIs the back part of the private key of the ground terminal, and x is the system master key.
3.3 private Key computation Module will skAAnd params to TEAThe private key and public parameter management module.
3.4 TEAThe private key and public parameter management module will skAAnd params are stored locally.
3.5 satellite LEOAThe private key and public parameter management module submits the identity selected by the private key and public parameter management module to the private key calculation module of the KGCThe application discloses a request of parameter params and a request of applying a private key.
3.6 private Key computation Module Slave satellite LEOAPrivate key and public parameter management module receivingAnd request for public parameter params, request for private key, calculation andcorresponding private key The calculation method of the private key is the same as that of 3.2, and a private key generation algorithm in an identity-based signature scheme with a message recovery function proposed by Kyung-Ah Shim is also adopted, and the method comprises the following steps:
3.6.1 private Key computation Module fromRandomly selecting any number as satellite registration random number, and recording as
3.6.2 private Key computation Module computationCorresponding private key WhereinIs the front part of the satellite private key,is the hash intermediate value of the satellite private key,behind the satellite private key.
3.7 private Key computation ModuleAnd params to LEOAThe private key and public parameter management module.
Fourth, ground terminal TEAPerforming current satellite LEO over the top when accessing an identity-based authentication system facing a space-based network for the first timeAAnd TEAAnd computing the session key: TEAComplete the LEO pair firstAThe authentication of (1); then to ensure that the ground terminals accessing the space based network are authorized, the LEOAFor TEACarrying out authentication; finally according to LEO in the authentication processAAnd TEAReceived message, LEOAAnd TEAA corresponding session key is calculated. The specific process is as follows:
4.1 LEOAthe authentication computing module generates a satellite authentication message LAAnd broadcasts L to the groundA(the efficiency of authentication is improved by using the broadcasting characteristic of the satellite, and the calculation expense of the satellite is reduced), the method comprises the following specific steps:
4.1.1 LEOAauthentication computing module ofRandomly selecting an integer as the random number of the satellite authentication message (noted as) And computes the plaintext of the satellite authentication message Is a binary sequence code consisting of 0 and 1.
4.1.2 LEOAUsing private keyUsing signature algorithm (signature algorithm in identity-based signature scheme with message recovery function proposed by Kyung-Ah Shim) pairSigning to generate LEOASatellite authentication message LAThe method comprises the following steps:
4.1.2.1 LEOAauthentication computing module ofRandomly selects an integer as a satellite signature random number (recorded as)。
4.1.2.2 LEOAAuthentication computing module ofDivided into two partsAndwhereinHas a sequence code length of k2(i.e. theHas a number of bits of k2)。
4.1.2.3 LEOAThe authentication calculation module calculates the intermediate quantity (recorded as the signature intermediate quantity) of the satellite verification message),(| | is a binary operator, and 01 binary sequence codes of two elements participating in operation are spliced together in sequence;is binaryThe operator is used for carrying out XOR operation on the 01 binary sequence codes of the two elements participating in the operation;higher priority than |); computing elliptic curve components (denoted as),Representing points on the elliptic curve EX-axis coordinates of); computing the Hash intermediate value of the satellite signature message (note as),Compute satellite signature message trailer (note)Behind the satellite private key.
4.1.2.4 willGenerating a plaintextSigned encrypted message ofIs thatConstituent quadruplets, i.e.WhereinAre all 01 binary sequence codes and are provided with a code,is according toSequentially arranged 01 binary sequence codes.
4.1.2.5 willSpliced into satellite authentication message LA(Is LEOATime stamp of (3), record LEOAThe current time),whereinAre all 01 binary sequence codes, LAIs according toSequentially arranged 01 binary sequence codes.
4.1.3 LEOAWill authenticate message LABroadcasting to ground while recording satellite broadcast LAAt time t1。
4.1.4 LEOAObtaining LEOACurrent time t2Let time interval T equal to T2-t1(ii) a Setting a first time threshold T1(T1According to the system requirement, if the system is required to consume less communication resources, the broadcast period is as long as possible but cannot exceed the minimum residence time, T, of the satellite above the node1Typically set at 200 seconds; if the system is required to operate efficiently, the broadcast period should be as short as possible, but the proportion of broadcast messages to communication resources should not be too high, T1Typically set at 50 seconds), if T<T1Turning to step 4.2, if T is more than or equal to T1Then 4.1.3 steps are taken.
4.2 ground terminal TEATo satellite LEOAAnd (3) performing authentication, which specifically comprises the following steps:
4.2.1 TEAreceiving LEO by the authentication calculation moduleABroadcasted message LAIs prepared by mixing LAIs sent to TEAThe verification module of (1).
4.2.2 TEAThe verification module receives LALook over LATime stamp onAnd TEAIs at a second time threshold T2(T2According to the actual condition of the system to set T2Can not be longer than the time for transmitting the message from the satellite to the ground terminal, generally set to 1 second-10 seconds), if T ≦ T2Turning to step 4.2.3; if t is>T2Then TEARecognizes the issue LALEO (R) ofAIs illegal, TEARefusing to access the space-based network, and turning to the step 4.1;
4.2.3 TEAthe verification module of (2) pairs the message LAIn (1)Performing verification, if the verification passes, TEADetermine satellite LEOAIs legitimate and can obtain satellite authentication message plaintextTurning to step 4.2.4; if the verification fails, TEARecognizes the issue LALEO (R) ofAIs illegal, TEARefusing to access the space-based network, and turning to the step 4.1; the verification algorithm adopts a verification algorithm in an identity-based signature scheme with a message recovery function, which is provided by Kyung-Ah Shim, and is specificallyComprises the following steps:
4.2.3.1 TEAthe verification module calculates the hash intermediate values of the satellite signature messages in turnSatellite private key hash intermediate valueSatellite authentication message signature intermediate volumeAnd satellite authentication message plaintext backTo representRightmost k of2A binary sequence code of bit 01 is set,to representLeftmost k1Bit 01 binary sequence code).
4.2.3.2 ifThe verification passes (i.e. the 01 binary sequence codes at both ends of the equation are equal), go to step 4.2.4, otherwise the verification fails, TEARecognizes the issue LALEO (R) ofAIs illegal, TEAAnd refusing to access the space-based network, and turning to the step 4.1.
4.2.4 at this time, TEAThe verification module of (2) determines satellite LEOAIs legitimate, TEAFrom the verification module LAExtracting to obtainWill be provided withAnd 4.2.3.1 calculated in stepSplicing to obtain satellite verification messageAnd to TEAThe authentication computing module of (2) sends a confirmation instruction (the content of the confirmation instruction is to inform the authentication computing module that the satellite is legal and can start to generate a ground terminal authentication message).
4.2.5TEAThe authentication computing module generates a ground terminal authentication message TAAnd generating TAMeanwhile, ECDH (The elliptic curve is translated into Diffie-Hellman key exchange algorithm on elliptic curve, Diffie and Hellman are names of people, which is specifically referred to Haakegaard R, Lang J]The method comprises the following steps of calculating a session key by using an Online at https:// koclab. cs. ucsb. edu/teaching/ecc/project/2015 project/Haakegaard + Lang. pdf.2015.) key exchange algorithm:
4.2.5.1 TEAauthentication computing module ofRandomly selecting an integer as a random number (marked as k) of the ground terminal verification messageA,) And calculating the plaintext m of the ground terminal verification messageA,mA=kAP(mAIs a binary sequence code composed of 0 and 1, in the elliptic curve encryption theory, a plaintext message is generally encoded to a certain point on an elliptic curve, and the point and the plaintext message are in a one-to-one correspondence relationship).
4.2.5.2 TEAThe authentication calculation module uses the private key skAUsing signature algorithm to pair mASigning is carried out to generate a pair of plaintext mASigned encrypted message sigma (m)A) The method comprises:
4.2.5.2.1 TEAAuthentication computing module ofRandomly selecting an integer as a ground terminal signature random number (denoted as t)A,)。
4.2.5.2.2 TEAM is calculated by the authentication calculation moduleADivided into two parts mA1And mA2Wherein m isA2Has a sequence code length of k2(i.e., m)A2Has a number of bits of k2)。
4.2.5.2.3 TEAThe authentication calculation module calculates a ground terminal verification message signature intermediate quantity (denoted as m'A),Calculating elliptic curve component (marked as y) of signature message of ground terminalA),((tAP)XRepresenting a point t on the elliptic curve EACoordinates on the X-axis of P); calculating the hash intermediate value (marked as h) of the signature message of the ground terminalA),hA=H2(IDA||RA||yA),hA=H2(IDA||RA||yA) Indicates the IDA,RA,yAConcatenating into a binary sequence, and then using the binary sequence as function H2Calculating the hash value of the binary sequence; computing ground terminal signature message tail element (noted as z)A)zA=tA+hAvA modp,vAIs the back part of the private key of the ground terminal.
4.2.5.2.4 mixing mA1,RA,yA,zAGenerating a plaintext mASigned encrypted message sigma (m)A),σ(mA) Is mA1,RA,yA,zAConstituent quadruples, σ (m)A)=(mA1||RA||yAzA) (ii) a Wherein m isA1,RA,yA,zAAre all 01 binary sequence codes, σ (m)A) Is according to mA1,RA,yA,zASequentially arranged 01 binary sequence codes.
4.2.5.3 TEAAuthentication computation module of (2) select TEATime stamp ttAWill IDA、ttA、σ(mA) Spliced ground terminal authentication message TA,TA=IDA||ttA||σ(mA) (ii) a Wherein the IDA、ttA、σ(mA) Are all 01 binary sequence codes, TAIs in accordance with IDA、ttA、σ(mA) Sequentially arranged 01 binary sequence codes. TEAThe authentication calculation module of (A) is to beAIs sent to LEOAThe authentication calculation module of (1).
4.2.5.4 TEAThe authentication calculation module calculates the session key In TEAAnd LEOAAfter the mutual authentication is finished, the two parties encrypt the session information by using a symmetric encryption algorithm (such as AES, DES and the like), K1I.e. the key used in the symmetric encryption algorithm.
4.3 LEOAThe authentication computing module receives the message TAWill TAIs sent to LEOAThe verification module of (1).
4.4 LEOAThe verification module of (2) receives TATo ground terminal TEAThe authentication is carried out by the following method:
4.4.1 LEOAthe verification module of (1) checks TATime stamp tt onAAnd LEOAIs at a third time threshold T3(T3According to the actual conditions of the systemCondition to set, T3Not more than the time of transmission of the message from the ground terminal to the satellite, generally set to 1-10 seconds), if T ≦ T3Turning to step 4.4.2; if t is>T3Then LEOARecognizing the issue of TATE ofAIs illegal, LEOARejection of TEAAccess to space-based network, stop and TEAGo to step 4.2.5.
4.4.2 LEOAVerification module pair TAσ (m) of (1)A) Performing verification, if the verification is passed, LEOATE can be determinedAIs legal and gets the corresponding plaintext mATurning to step 4.4.3; if the verification fails, LEOARecognizing the issue of TATE ofAIs illegal, LEOARejection of TEAAccess to space-based network, stop and TEAStep 4.2.5; the verification algorithm is the same as sigma (m) in step 4.2.3l) The verification algorithm of (1) is specifically as follows:
4.4.2.1 LEOAthe verification module calculates the hash intermediate value h of the ground terminal signature message in turnA=H2(IDA||RA||yA) The intermediate value c of the private key hash of the ground terminalA=H1(IDA||RA) Ground terminal verifying message signature intermediate quantityAnd the ground terminal verifies the back part of the message plaintextIs m'ARightmost k of2A binary sequence code of bit 01 is set,k1[m′A]is m'ALeftmost k1Bit 01 binary sequence code).
4.4.2.2 ifk1[m′A]=F1(mA1||mA2) The verification is passed, go to step 4.4.3, otherwise the verification fails, LEOARecognizing the issue of TATE ofAIs illegal, LEOARejection of TEAAccess to the space-based network, stop andTEAstep 4.2.5;
4.4.3 LEOAthe verification module of (2) determines the TEAIs legitimate, LEOAFrom the verification module of TAExtract mA1M isA1And mA2The two are spliced to obtain a ground terminal verification message mAThen LEOATo the LEOAThe authentication computation module of (1) sends a confirmation instruction.
4.4.4 LEOAThe authentication calculation module adopts an ECDH key exchange algorithm to calculate a session key
And the negotiation of the session key is completed by using an ECDH algorithm in the authentication process. The algorithm is based on a discrete logarithm problem on an elliptic curve. At this stage, the discrete logarithm problem on elliptic curves is considered to be difficult to solve, and therefore the key exchange algorithm can be considered to be secure. The correctness of the above procedure is demonstrated as follows:
fifthly, after completing the mutual authentication, LEOAAnd TEANormal communication, LEOAPredicting LEO at the end of serviceAAnd when the user is about to leave the current area, the step six is carried out. LEOAPredicting LEO at the end of serviceAAnd turning to the fifth step without leaving the current area.
Sixthly, the currently leaving overhead satellite LEOAGround terminal TEANext satellite LEO over the topBThe authentication is carried out by switching among planets by LEOAGenerates an authentication security parameter ksWill k issIs sent to TEASwitching authentication module of (2) to switch the TEAID ofAAnd ksIs sent to LEOBSwitch authentication module (assuming LEO is present at this time)AAnd TEA、LEOBThe two-way authentication is completed, and as long as the two-way authentication is passed, a secure channel exists between the two communication parties); then TEAThe switching authentication module generates a terminal rapid authentication message (marked as TF)A) Is sent to LEOBOf the switching authentication module, LEOBThe handover authentication module of (1) receives the TFAThereafter, the TE is verifiedAAfter the verification is passed, LEOBThe switching authentication module generates a satellite fast authentication message (marked as LF)B) And will LFBIs sent to TEAAfter the verification is passed, the switching authentication stage is ended, and TEAAnd LEOBAnd (4) normal communication. The method comprises the following specific steps:
6.1 LEOAfrom a positive integer set N*Randomly selecting an integer as an authentication security parameter (denoted as k)s,ks∈N*) Will k issIs sent to TEASwitching authentication module of (2) to switch the TEAID ofAAnd authenticating a security parameter ksIs sent to LEOBThe handover authentication module of (1). TEAAnd LEOBAfter receiving the message, the switching authentication module stores the relevant parameters locally.
6.2 TEAThe switching authentication module generates a terminal rapid authentication message TFAThe method comprises the following steps:
6.2.1 TEAswitch authentication module ofRandomly selecting an integer as a terminal switching authentication parameter (marked as k)t2,) Computing terminal switching authentication message plaintext mt2,mt2=kt2P。
6.2.2 TEAThe switching authentication module generates a terminal rapid authentication message TFA,TFA=IDA||mt2||ttA′||H1(ks||mt2)(TFAIs composed of an IDA、mt2、ttA、H1(ks||mt2) 01 binary sequence code tt formed by splicing four 01 binary sequence codes in sequenceAIs' is TFATime stamp of (2) indicating TEAThe current time; h1(ks||mt2) Means that k iss,mt2Spliced 01 binary sequence code as Hash function H1The calculated 01 binary sequence) and converting the TFAIs sent to LEOBThe handover authentication module of (1).
6.3 LEOBIs switched to TEAThe method for authenticating and calculating the session key comprises the following steps:
6.3.1 LEOBfrom TE to the handover authentication moduleAThe handover authentication module of (1) receives the TFAAfter that, TF is checkedATime stamp tt onA' and LEOBIs at a fourth time threshold T4(T4According to the actual condition of the system to set T4Cannot be greater than the time for the message to travel from the ground terminal to the satellite, and is typically set to 1 second-10 seconds), if tt ≦ T4Turning to step 6.3.2; if tt>T4Then LEOBIdentify TEAIs illegal, refused to be TEAAnd (6) providing the service, and turning to step 6.2.
6.3.2 LEOBAccording to TFAIdentity ID ofARetrieving authentication security parameter k corresponding theretosAnd use ksAnd mt2Computing satellite handover hash authentication valuesIf it is notAnd slave message TFALifting the extracted H1(ks||mt2) If the values are equal, the authentication is passed, and the step 6.3.3 is carried out; otherwise LEOBIdentify TEAIs illegal, refused to be TEAAnd (6) providing the service, and turning to step 6.2.
6.3.3 LEOBSwitching authentication module generates satellite fast authentication message LFBAnd calculating a session key, the method comprising:
6.3.3.1 LEOBswitch authentication module ofRandomly selecting an integer as a satellite switching authentication parameter (marked as k)l2,) And calculating the satellite switching authentication message plaintext ml2,ml2=kl2P。
6.3.3.2 LEOBSwitching authentication module generates satellite fast authentication message LFB,LFB=ml2||ttLEO′||H1(ks||ml2)(LFBIs formed by ml2、ttLEO′、H1(ks||ml2) A 01 binary sequence code tt formed by sequentially splicing three 01 binary sequence codesLEOIs LFBTime stamp of (3), representing LEOBThe current time; h1(ks||ml2) Means that k iss,ml2Spliced 01 binary sequence code as Hash function H1The calculated 01 binary sequence) and apply the LFBIs sent to TEAThe handover authentication module of (1).
6.3.3.3 LEOBThe switching authentication module calculates the session keyThe meaning of the formula is ttA,ttLEO′,kl2×mt2,ksSplicing four 01 binary sequence codes in sequence to form a 01 binary sequence code, and taking the 01 binary sequence code as a hash function H1Is input. At the LEOBAnd TEAIs switching over toAfter the completion of the certificate, the two are like LEOAAnd TEAThe communication uses a symmetric encryption algorithm (such as AES, DES and the like) for secure communication,is the session key used in the symmetric encryption algorithm.
6.4 TEATo LEOBThe method for authenticating and calculating the session key comprises the following steps:
6.4.1 TEAswitch authentication module slave LEOBReceiving LF by the switching authentication moduleBChecking LFBTime stamp tt onLEO' with TEAIs at a fifth time threshold T5(T5According to the actual condition of the system to set T5Can not be greater than the time for the message to travel from the ground terminal to the satellite, generally set to 1 second-10 seconds), if ttt ≦ T5Turning to step 6.4.2; if ttt>T5Then TEAIdentify LEOBIs illegal, TEAAnd refusing to access the space-based network, and turning to step 6.3.3.
6.4.2 TEAAccording to the authentication security parameter k stored locallysAnd message LFBM of (a)l2Calculating the Hash authentication value h of the ground terminalA′=H1(ks||ml2) If h is calculatedAAND message LFBExtracted H1(ks||ml2) If the values are equal, the authentication is passed, and the step 6.4.3 is carried out; otherwise TEAIdentify LEOBIs illegal, TEADenying access to space-based network, stopping with LEOBGo to step 6.3.3.
6.4.3TEAComputing a session key KA=H1(ttA||ttL′EO||kt2×ml2||ks). At the LEOBAnd TEAAfter the switching authentication is finished, the two are like LEOAAnd TEAThe communication uses a symmetric encryption algorithm (such as AES, DES and the like) for safe communication, KAIs thatA session key used in a symmetric encryption algorithm.
And step seven, finishing.
Compared with the prior art, the invention can achieve the following technical effects:
1. in the fourth step of the invention, the ground terminal and the satellite both adopt a signature method with a message recovery function to sign the original message (plaintext) and generate respective authentication messages, a sender does not need to send the complete original message, a receiver can recover corresponding information by using the signature and the public key, and compared with a general signature method (the sender generates a signature for a specific message by using a private key of the sender and then sends the original message together with the signature, a receiver verifies the validity of the signature according to the public key of the sender and the original message after receiving the message, and the original message needs to be sent together with the corresponding signature in the process), the size of the message transmitted by the method is smaller.
2. In the fourth step of the invention, an identity-based cryptography method is introduced in the authentication process of the ground terminal and the satellite, and both communication parties can deduce the corresponding public key according to the ID provided by the other party, thereby avoiding transmitting the own digital certificate in the communication process and effectively reducing the size of the transmitted message.
3. In the fourth step of the invention, the ground terminal and the satellite use the ECDH algorithm to complete the negotiation of the session key while carrying out authentication, and compared with the method for carrying out the negotiation of the session key after completing the authentication, the method can reduce the interaction between the satellite and the ground once.
4. In the sixth step of the invention, the satellite and the ground terminal use the message verification code technology to carry out switching authentication, thereby realizing fast switching authentication and session key agreement while ensuring the security.
Drawings
FIG. 1 is a general flow diagram of the present invention;
FIG. 2 is a logic structure diagram of the identity-based authentication system facing the sky-based network in the first step of the present invention;
Detailed Description
FIG. 1 is a general flow diagram of the present invention; the invention comprises the following steps:
firstly, an identity-based authentication system facing a space-based network is constructed. As shown in fig. 2, the identity-based authentication system for the space-based network is composed of three types of network entities, namely, a ground terminal (denoted as TE), a key generation center (denoted as KGC), and a low-earth satellite (denoted as LEO). The KGC is connected to a plurality of TEs and LEOs via wireless links.
Before mutual Authentication between TE and LEO, KGC calculates a system main key x and public parameter params by using an initialization parameter generation algorithm in an identity-based signature scheme with a message recovery function (see Shim K-A. foundation: a Practical Wireless Sensor network Multi-User Broadcast Authentication scheme [ J ]. IEEE Information Forensics and secure transaction 2017, PP:1-1. English literature index is Shim K-A.BASIS: A Practical Multi-User Broadcast Authentication scheme [ J ]. IEEE transaction scheme Wireless Sensor Networks [ J ]. IEEE Transactions on Information dynamics and security 2017, PP: 1-1.); KGC receives identity identification, a request for applying public parameters and a request for applying a private key from TE and LEO, KGC uses a private key generation algorithm in an identity-based signature scheme with a message recovery function provided by Kyung-Ah Shim, calculates the private keys of TE and LEO by using public parameters params and a master key x, distributes satellite private keys and public parameters to satellites in a safe environment (for example, two communication parties establish safe session connection by adopting a secure socket protocol), and distributes private keys and public parameters of ground terminals to ground terminals.
TE and LEO are connected with each other and connected with KGC, before communication, they are registered with KGC, and submit the ID selected by TE or LEO, request and application for public parameter, and current satellite over-the-top (order is LEO)A) After receiving the satellite's private key from the KGC, the LEOAGenerating satellite authentication message (denoted as L)A) Sending to the current ground terminal (order is TE)A),TEATo LAAfter the authentication is passed, a ground terminal authentication message (marked as T) is generatedA) Is sent to LEOA。LEOAFor TAAnd performing authentication to complete mutual authentication of the satellite and the ground terminal. Due to the high speed of satellite motion around the earth over time. Time of each satellite providing service for ground terminal in specific areaOnly a few minutes, the current satellite LEO over-the-topAWhen leaving, it will switch authentication security parameter k over the secure channels(LEOAAn integer k selected randomlys∈N*,N*Is a positive integer set) to the current ground terminal TEAWill k issAnd TEAID ofASent to the next over-the-top satellite (noted LEO)B),TEAGenerating terminal rapid authentication message (marked as TF)A) Is sent to LEOB,LEOBFor TFACarrying out authentication, and generating a satellite rapid authentication message (marked as LF) after the authentication is passedA) Is sent to TEA,TEAFor LFAAnd performing authentication to finish the rapid switching authentication process.
The KGC is provided with an initialization calculation module and a private key calculation module, and the ground terminal and the satellite are provided with a private key and public parameter management module, an authentication calculation module, a verification module and a switching authentication module.
The initialization calculation module on the KGC generates a public parameter params and a system master key x, and sends the params and x to the private key calculation module of the KGC. The private key calculation module is connected with the private key and public parameter management module of the ground terminal and the satellite. The private key calculation module receives the identity of the ground terminal, a request for applying for the public parameters and a request for applying the private key from the private key and public parameter management module of the ground terminal, calculates the private key of the ground terminal according to the identity of the ground terminal and sends the private key and the public parameters to the private key and public parameter management module of the ground terminal. The private key calculation module receives the identity identification of the satellite, the request for applying the public parameter and the request for applying the private key from the private key and public parameter management module of the satellite, calculates the private key of the satellite according to the identity identification of the satellite and sends the private key and the public parameter to the private key and public parameter management module of the satellite.
The private key and public parameter management module is connected with the private key calculation module and the authentication calculation module (belonging to the same network entity with the private key and public parameter management module) of the KGC, and is responsible for receiving the private key and the public parameter sent by the private key calculation module and sending the private key and the public parameter to the authentication calculation module.
The authentication calculation module is connected with the private key and public parameter management module (belonging to the same network entity with the authentication calculation module), the verification module (belonging to the same network entity with the authentication calculation module), and the authentication calculation module of another network entity (such as the authentication calculation module of a satellite (a class of network entity) is connected with the authentication calculation module of a ground terminal (another class of network entity), but the authentication calculation module of the satellite A (a class of network entity) is connected with the authentication calculation module of another satellite B (the same class of network entity)), the authentication calculation module receives the public parameters and the private key from the private key and public parameter management module, generates an authentication message by using the private key and the public parameters, and sends the authentication message to the authentication calculation module of the other network entity; and after receiving the authentication message sent by the authentication calculation module of another network entity, the authentication calculation module sends the received authentication message to the verification module.
The verification module is connected with the authentication calculation module (belongs to the same network entity with the verification module), the verification module receives the authentication message from the authentication calculation module and then verifies the authentication message, a session key is calculated after the authentication is passed, the session key and any symmetric encryption algorithm (such as AES, DES and the like) are used for encrypting and decrypting the message in the subsequent communication process with another network entity (for example, the satellite calculates the session key and then encrypts the message by using the session key of the satellite and then sends the message to the ground terminal, the ground terminal decrypts the received message by using the session key of the ground terminal after receiving the message, the ground terminal also encrypts the message by using the session key of the ground terminal before sending the message and then sends the message to the satellite, and the satellite decrypts the message by using the session key of the satellite) so as to complete the safe communication between the satellite and the ground terminal.
Current ground terminal TEACurrent overhead satellite LEOANext satellite LEO over the topBThe switching authentication modules of the three are connected with each other. The overhead satellites of any ground terminal are fixed at any time throughout the system (the satellites move around the earth at high speed over time, the time each satellite serves a ground terminal in a particular area is fixed for only a few minutes, and thus the time throughout the system is fixedIn the system, the overhead satellites of a ground terminal are fixed for any period of time. ) At the LEOAAt the end of the service, the LEOADetermine imminent handover, LEOATo the TEAThe switching authentication module sends a switching authentication security parameter ksTo LEOBThe switching authentication module of (1) sends the TEAID ofAAnd handover authentication security parameter ks. Then TEAThe switching authentication module generates a terminal rapid authentication message TFAIs sent to LEOBOf the switching authentication module, LEOBIs switched to TFAPerforming authentication, and after the authentication is passed, LEOBSwitching authentication module generates satellite fast authentication message LFAIs sent to TEAOf the handover authentication module, TEAHandover authentication module pair LFAAnd verifying to finish the fast switching authentication.
Secondly, an initialization calculation module on the KGC calculates a main key and public parameters of the system by using an initialization parameter generation algorithm in an identity-based signature scheme with a message recovery function (see Shim K-A. foundation: a Practical Wireless Sensor network Multi-User Broadcast Authentication scheme [ J ]. IEEE Information Forensics and secure transaction 2017, PP:1-1. English literature index is Shim K-A.BASIS: A Practical Multi-User Broadcast Authentication scheme [ J ]. IEEE transaction on Information Forensics and security 2017, PP: 1-1.) provided by Kyung-Ah Shim, and the specific flow is as follows:
2.1 initializing calculation Module selecting finite field FqAfter determining E, the initialization calculation module randomly selects a prime number P (P can divide the number of points on E) and a point P (the order of the point P is P) according to the current Secp256k1 standard, the number of points on the elliptic curve is fixed and is not a random variable, and the number of points on E is not a prime number in general.
2.2 from the prime integer space (denoted by) Select a numberAs the master key of the identity-based authentication system facing the space-based network, the global public key P is calculatedpub=xP。
2.3 selection of four Hash Functions H1,H2,F1,F2Wherein H1,H2:{0,1}*→ZP(H1,H2The function of (1) is to map a 01 binary sequence code with an arbitrary length into a 01 binary sequence code with a length of a, and a belongs to Zp,ZpIs a prime integer space containing p),(F1the function of the method is to map 01 binary sequence codes with arbitrary length into a length k2The 01 binary sequence code of),(F2has the effect of reducing the length to k1Mapping 01 binary sequence code to length k201 binary sequence code), k1And k2Is two positive integers and satisfies p ═ k1+k2。
2.4 mixing Fq,E,p,P,Ppub,H1,H2,F1,F2,k1,k2The identity-based authentication system public parameters params and params which are combined to form the space-based network<Fq,E,p,P,Ppub,H1,H2,F1,F2,k1,k2>Params is published.
And thirdly, the private key calculation module on the KGC calculates a corresponding private key according to the identity submitted by the ground terminal and the satellite, and distributes the private key and the public parameter params to the private key and public parameter management module of the ground terminal and the satellite. The method comprises the following steps:
3.1 ground terminal TEAThe private key and public parameter management module submits an identity ID to a private key calculation module of the KGCAApplication disclosureA request for parameter params, a request for application for a private key.
3.2 private Key computation Module from ground terminal TEAThe private key and public parameter management module receives the IDAAnd request for public parameter params, request for private key, calculation and IDACorresponding private key skA(ii) a The method for calculating the private key adopts a private key generation algorithm in an identity-based signature scheme with a message recovery function, which is provided by Kyung-Ah Shim, and comprises the following steps:
3.2.1 private Key computation Module fromRandomly selecting any number from the middle random selection list as a ground terminal registration random number, and recording the random number as rA,
3.2.2 private Key computation Module compute private Key skA,skA=(RA,vA),RA=rAP,vA=rA+cAxmod p, wherein cA=H1(IDA,RA),RAIs the front part of the private key of the ground terminal, cAIs a ground terminal private key hash intermediate value, vAIs the back part of the private key of the ground terminal, and x is the system master key.
3.3 private Key computation Module will skAAnd params to TEAThe private key and public parameter management module.
3.4 TEAThe private key and public parameter management module will skAAnd params are stored locally.
3.5 satellite LEOAThe private key and public parameter management module submits the identity selected by the private key and public parameter management module to the private key calculation module of the KGCThe application discloses a request of parameter params and a request of applying a private key.
3.6 private Key computation Module Slave satellite LEOAOfKey and public parameter management module receptionAnd request for public parameter params, request for private key, calculation andcorresponding private key The calculation method of the private key is the same as that of 3.2, and a private key generation algorithm in an identity-based signature scheme with a message recovery function proposed by Kyung-Ah Shim is also adopted, and the method comprises the following steps:
3.6.1 private Key computation Module fromRandomly selecting any number as satellite registration random number, and recording as
3.6.2 private Key computation Module computationCorresponding private key WhereinIs the front part of the satellite private key,is the hash intermediate value of the satellite private key,behind the satellite private key.
3.7 private Key computation ModuleAnd params to LEOAThe private key and public parameter management module.
Fourth, ground terminal TEAPerforming current satellite LEO over the top when accessing an identity-based authentication system facing a space-based network for the first timeAAnd TEAAnd computing the session key: TEAComplete the LEO pair firstAThe authentication of (1); then to ensure that the ground terminals accessing the space based network are authorized, the LEOAFor TEACarrying out authentication; finally according to LEO in the authentication processAAnd TEAReceived message, LEOAAnd TEAA corresponding session key is calculated. The specific process is as follows:
4.1 LEOAthe authentication computing module generates a satellite authentication message LAAnd broadcasts L to the groundA(the efficiency of authentication is improved by using the broadcasting characteristic of the satellite, and the calculation expense of the satellite is reduced), the method comprises the following specific steps:
4.1.1 LEOAauthentication computing module ofRandomly selecting an integer as the random number of the satellite authentication message (noted as) And computes the plaintext of the satellite authentication message Is a binary sequence code consisting of 0 and 1.
4.1.2 LEOAUsing private keyUsing signature algorithm (signature algorithm in identity-based signature scheme with message recovery function proposed by Kyung-Ah Shim) pairSigning to generate LEOASatellite authentication message LAThe method comprises the following steps:
4.1.2.1 LEOAauthentication computing module ofRandomly selects an integer as a satellite signature random number (recorded as)。
4.1.2.2 LEOAAuthentication computing module ofDivided into two partsAndwhereinHas a sequence code length of k2(i.e. theHas a number of bits of k2)。
4.1.2.3 LEOAAuthentication computing module computing deviceStar authentication message signature intermediate quantity (noted as),(| | is a binary operator, and 01 binary sequence codes of two elements participating in operation are spliced together in sequence;the operator is a binary operator, and the 01 binary sequence codes of the two elements participating in the operation are subjected to exclusive OR operation;higher priority than |); computing elliptic curve components (denoted as),Representing points on the elliptic curve EX-axis coordinates of); computing the Hash intermediate value of the satellite signature message (note as),Compute satellite signature message trailer (note)Behind the satellite private key.
4.1.2.4 willGenerating a plaintextSigned encrypted message ofIs thatConstituent quadruplets, i.e.WhereinAre all 01 binary sequence codes and are provided with a code,is according toSequentially arranged 01 binary sequence codes.
4.1.2.5 willSpliced into satellite authentication message LA(Is LEOATime stamp of (3), record LEOAThe current time),whereinAre all 01 binary sequence codes, LAIs according toSequentially arranged 01 binary sequence codes.
4.1.3 LEOAWill authenticate message LABroadcasting to ground while recording satellite broadcast LAAt time t1。
4.1.4 LEOAObtaining LEOACurrent time t2Let time interval T equal to T2-t1(ii) a Setting a first time threshold T1(T1According to the system requirement, if the system is required to consume less communication resources, the broadcast period is as long as possible but cannot exceed the minimum residence time, T, of the satellite above the node1Typically set at 200 seconds; if the system is required to operate efficiently, the broadcast period should be as short as possible, but the proportion of broadcast messages to communication resources should not be too high, T1Typically set at 50 seconds), if T<T1Turning to step 4.2, if T is more than or equal to T1Then 4.1.3 steps are taken.
4.2 ground terminal TEATo satellite LEOAAnd (3) performing authentication, which specifically comprises the following steps:
4.2.1 TEAreceiving LEO by the authentication calculation moduleABroadcasted message LAIs prepared by mixing LAIs sent to TEAThe verification module of (1).
4.2.2 TEAThe verification module receives LALook over LATime stamp onAnd TEAIs at a second time threshold T2(T2According to the actual condition of the system to set T2Can not be longer than the time for transmitting the message from the satellite to the ground terminal, generally set to 1 second-10 seconds), if T ≦ T2Turning to step 4.2.3; if t is>T2Then TEARecognizes the issue LALEO (R) ofAIs illegal, TEARefusing to access the space-based network, and turning to the step 4.1;
4.2.3 TEAthe verification module of (2) pairs the message LAIn (1)Performing verification, if the verification passes, TEADetermine satellite LEOAIs legitimate and can obtain satellite authentication message plaintextTurning to step 4.2.4; if the verification fails, TEARecognizes the issue LALEO (R) ofAIs illegal, TEARefusing to access the space-based network, and turning to the step 4.1; the verification algorithm adopts a verification algorithm in an identity-based signature scheme with a message recovery function, which is provided by Kyung-Ah Shim, and specifically comprises the following steps:
4.2.3.1 TEAthe verification module calculates the hash intermediate values of the satellite signature messages in turnSatellite private key hash intermediate valueSatellite authentication message signature intermediate volumeAnd satellite authentication message plaintext backTo representRightmost k of2A binary sequence code of bit 01 is set,to representLeftmost k1Bit 01 binary sequence code).
4.2.3.2 ifThen the verification passes (i.e. 01 binary sequence codes at both ends of the equation are equal)Go to step 4.2.4, otherwise, verify fail, TEARecognizes the issue LALEO (R) ofAIs illegal, TEAAnd refusing to access the space-based network, and turning to the step 4.1.
4.2.4 at this time, TEAThe verification module of (2) determines satellite LEOAIs legitimate, TEAFrom the verification module LAExtracting to obtainWill be provided withAnd 4.2.3.1 calculated in stepSplicing to obtain satellite verification messageAnd to TEAThe authentication computation module of (1) sends a confirmation instruction.
4.2.5 TEAThe authentication computing module generates a ground terminal authentication message TAAnd generating TAMeanwhile, ECDH (The elliptic curve is translated into Diffie-Hellman key exchange algorithm on elliptic curve, Diffie and Hellman are names of people, which is specifically referred to Haakegaard R, Lang J]The method comprises the following steps of calculating a session key by using an Online at https:// koclab. cs. ucsb. edu/teaching/ecc/project/2015 project/Haakegaard + Lang. pdf.2015.) key exchange algorithm:
4.2.5.1 TEAauthentication computing module ofRandomly selecting an integer as a random number (marked as k) of the ground terminal verification messageA,) And calculating the plaintext m of the ground terminal verification messageA,mA=kAP(mAIs a binary sequence code composed of 0 and 1, in the elliptic curve encryption theory, a plaintext message is generally encoded to a certain point on an elliptic curve, and the point and the plaintext message are in a one-to-one correspondence relationship).
4.2.5.2 TEAThe authentication calculation module uses the private key skAUsing signature algorithm to pair mASigning is carried out to generate a pair of plaintext mASigned encrypted message sigma (m)A) The method comprises the following steps:
4.2.5.2.1 TEAauthentication computing module ofRandomly selecting an integer as a ground terminal signature random number (denoted as t)A,)。
4.2.5.2.2 TEAM is calculated by the authentication calculation moduleADivided into two parts mA1And mA2Wherein m isA2Has a sequence code length of k2(i.e., m)A2Has a number of bits of k2)。
4.2.5.2.3 TEAThe authentication calculation module calculates a ground terminal verification message signature intermediate quantity (denoted as m'A),Calculating elliptic curve component (marked as y) of signature message of ground terminalA),((tAP)XRepresenting a point t on the elliptic curve EACoordinates on the X-axis of P); calculating the hash intermediate value (marked as h) of the signature message of the ground terminalA),hA=H2(IDA||RA||yA),hA=H2(IDA||RA||y||A) Indicates the IDA,RA,yASplicing into a binary sequence, and then using the binary sequence as the binary sequenceFunction H2Calculating the hash value of the binary sequence; computing ground terminal signature message tail element (noted as z)A)zA=tA+hAvA modp,vAIs the back part of the private key of the ground terminal.
4.2.5.2.4 mixing mA1,RA,yA,zAGenerating a plaintext mASigned encrypted message sigma (m)A),σ(mA) Is mA1,RA,yA,zAConstituent quadruples, σ (m)A)=(mA1||RA||yA||zA) (ii) a Wherein m isA1,RA,yA,zAAre all 01 binary sequence codes, σ (m)A) Is according to mA1,RA,yA,zASequentially arranged 01 binary sequence codes.
4.2.5.3 TEAAuthentication computation module of (2) select TEATime stamp ttAWill IDA、ttA、σ(mA) Spliced ground terminal authentication message TA,TA=IDA||ttA||σ(mA) (ii) a Wherein the IDA、ttA、σ(mA) Are all 01 binary sequence codes, TAIs in accordance with IDA、ttA、σ(mA) Sequentially arranged 01 binary sequence codes. TEAThe authentication calculation module of (A) is to beAIs sent to LEOAThe authentication calculation module of (1).
4.2.5.4 TEAThe authentication calculation module calculates the session key In TEAAnd LEOAAfter the mutual authentication is finished, the two parties encrypt the session information by using a symmetric encryption algorithm (such as AES, DES and the like), K1I.e. the key used in the symmetric encryption algorithm.
4.3 LEOAThe authentication computing module receives the message TAWill TAIs sent to LEOAThe verification module of (1).
4.4 LEOAThe verification module of (2) receives TATo ground terminal TEAThe authentication is carried out by the following method:
4.4.1 LEOAthe verification module of (1) checks TATime stamp tt onAAnd LEOAIs at a third time threshold T3(T3According to the actual condition of the system to set T3Not more than the time of transmission of the message from the ground terminal to the satellite, generally set to 1-10 seconds), if T ≦ T3Turning to step 4.4.2; if t is>T3Then LEOARecognizing the issue of TATE ofAIs illegal, LEOARejection of TEAAccess to space-based network, stop and TEAGo to step 4.2.5.
4.4.2 LEOAVerification module pair TAσ (m) of (1)A) Performing verification, if the verification is passed, LEOATE can be determinedAIs legal and gets the corresponding plaintext mATurning to step 4.4.3; if the verification fails, LEOARecognizing the issue of TATE ofAIs illegal, LEOARejection of TEAAccess to space-based network, stop and TEAStep 4.2.5; the verification algorithm is the same as sigma (m) in step 4.2.3l) The verification algorithm of (1) is specifically as follows:
4.4.2.1 LEOAthe verification module calculates the hash intermediate value h of the ground terminal signature message in turnA=H2(IDA||RA||yA) The intermediate value c of the private key hash of the ground terminalA=H1(IDA||RA) Ground terminal verifying message signature intermediate quantityAnd the ground terminal verifies the back part of the message plaintextIs m'ARightmost k of2Bit 01A binary sequence code is set for each of the plurality of codes,k1[m′A]is m'ALeftmost k1Bit 01 binary sequence code).
4.4.2.2 ifk1[m′A]=F1(mA1||mA2) The verification is passed, go to step 4.4.3, otherwise the verification fails, LEOARecognizing the issue of TATE ofAIs illegal, LEOARejection of TEAAccess to space-based network, stop and TEAStep 4.2.5;
4.4.3 LEOAthe verification module of (2) determines the TEAIs legitimate, LEOAFrom the verification module of TAExtract mA1M isA1And mA2The two are spliced to obtain a ground terminal verification message mAThen LEOATo the LEOAThe authentication computation module of (1) sends a confirmation instruction.
4.4.4 LEOAThe authentication calculation module adopts an ECDH key exchange algorithm to calculate a session key
And the negotiation of the session key is completed by using an ECDH algorithm in the authentication process. The algorithm is based on a discrete logarithm problem on an elliptic curve. At this stage, the discrete logarithm problem on elliptic curves is considered to be difficult to solve, and therefore the key exchange algorithm can be considered to be secure. The correctness of the above procedure is demonstrated as follows:
fifthly, after completing the mutual authentication, LEOAAnd TEANormal communication, LEOAPredicting LEO at the end of serviceAAnd when the user is about to leave the current area, the step six is carried out. LEOAPredicting LEO at the end of serviceAAnd turning to the fifth step without leaving the current area.
Sixthly, the currently leaving overhead satellite LEOAAnd the groundFace terminal TEANext satellite LEO over the topBThe authentication is carried out by switching among planets by LEOAGenerates an authentication security parameter ksWill k issIs sent to TEASwitching authentication module of (2) to switch the TEAID ofAAnd ksIs sent to LEOBSwitch authentication module (assuming LEO is present at this time)AAnd TEA、LEOBThe two-way authentication is completed, and as long as the two-way authentication is passed, a secure channel exists between the two communication parties); then TEAThe switching authentication module generates a terminal rapid authentication message (marked as TF)A) Is sent to LEOBOf the switching authentication module, LEOBThe handover authentication module of (1) receives the TFAThereafter, the TE is verifiedAAfter the verification is passed, LEOBThe switching authentication module generates a satellite fast authentication message (marked as LF)B) And will LFBIs sent to TEAAfter the verification is passed, the switching authentication stage is ended, and TEAAnd LEOBAnd (4) normal communication. The method comprises the following specific steps:
6.1 LEOAfrom a positive integer set N*Randomly selecting an integer as an authentication security parameter (denoted as k)s,ks∈N*) Will k issIs sent to TEASwitching authentication module of (2) to switch the TEAID ofAAnd authenticating a security parameter ksIs sent to LEOBThe handover authentication module of (1). TEAAnd LEOBAfter receiving the message, the switching authentication module stores the relevant parameters locally.
6.2 TEAThe switching authentication module generates a terminal rapid authentication message TFAThe method comprises the following steps:
6.2.1 TEAswitch authentication module ofRandomly selecting an integer as a terminal switching authentication parameter (marked as k)t2,) Computing terminal switching authentication message plaintext mt2,mt2=kt2P。
6.2.2 TEAThe switching authentication module generates a terminal rapid authentication message TFA,TFA=IDA||mt2||ttA′||H1(ks||mt2)(TFAIs composed of an IDA、mt2、ttA、H1(ks||mt2) 01 binary sequence code tt formed by splicing four 01 binary sequence codes in sequenceAIs' is TFATime stamp of (2) indicating TEAThe current time; h1(ks||mt2) Means that k iss,mt2Spliced 01 binary sequence code as Hash function H1The calculated 01 binary sequence) and converting the TFAIs sent to LEOBThe handover authentication module of (1).
6.3 LEOBIs switched to TEAThe method for authenticating and calculating the session key comprises the following steps:
6.3.1 LEOBfrom TE to the handover authentication moduleAThe handover authentication module of (1) receives the TFAAfter that, TF is checkedATime stamp tt onA' and LEOBIs at a fourth time threshold T4(T4According to the actual condition of the system to set T4Cannot be greater than the time for the message to travel from the ground terminal to the satellite, and is typically set to 1 second-10 seconds), if tt ≦ T4Turning to step 6.3.2; if tt>T4Then LEOBIdentify TEAIs illegal, refused to be TEAAnd (6) providing the service, and turning to step 6.2.
6.3.2 LEOBAccording to TFAIdentity ID ofARetrieving authentication security parameter k corresponding theretosAnd use ksAnd mt2Computing satellite handover hash authentication valuesIf it is notAnd slave message TFALifting the extracted H1(ks||mt2) If the values are equal, the authentication is passed, and the step 6.3.3 is carried out; otherwise LEOBIdentify TEAIs illegal, refused to be TEAAnd (6) providing the service, and turning to step 6.2.
6.3.3 LEOBSwitching authentication module generates satellite fast authentication message LFBAnd calculating a session key, the method comprising:
6.3.3.1 LEOBswitch authentication module ofRandomly selecting an integer as a satellite switching authentication parameter (marked as k)l2,) And calculating the satellite switching authentication message plaintext ml2,ml2=kl2P。
6.3.3.2 LEOBSwitching authentication module generates satellite fast authentication message LFB,LFB=ml2||ttLEO′||H1(ks||ml2)(LFBIs formed by ml2、ttLEO′、H1(ks||ml2) A 01 binary sequence code tt formed by sequentially splicing three 01 binary sequence codesLEOIs LFBTime stamp of (3), representing LEOBThe current time; h1(ks||ml2) Means that k iss,ml2Spliced 01 binary sequence code as Hash function H1The calculated 01 binary sequence) and apply the LFBIs sent to TEAThe handover authentication module of (1).
6.3.3.3 LEOBThe switching authentication module calculates a session key KLEOB=H1(ttA||ttLEO′||kl2×mt2||ks). The formulaMeans will ttA,ttLEO′,kl2×mt2,ksSplicing four 01 binary sequence codes in sequence to form a 01 binary sequence code, and taking the 01 binary sequence code as a hash function H1Is input. At the LEOBAnd TEAAfter the switching authentication is finished, the two are like LEOAAnd TEAThe communication uses a symmetric encryption algorithm (such as AES, DES and the like) for secure communication,is the session key used in the symmetric encryption algorithm.
6.4 TEATo LEOBThe method for authenticating and calculating the session key comprises the following steps:
6.4.1 TEAswitch authentication module slave LEOBReceiving LF by the switching authentication moduleBChecking LFBTime stamp tt onLEO' with TEAIs at a fifth time threshold T5(T5According to the actual condition of the system to set T5Can not be greater than the time for the message to travel from the ground terminal to the satellite, generally set to 1 second-10 seconds), if ttt ≦ T5Turning to step 6.4.2; if ttt>T5Then TEAIdentify LEOBIs illegal, TEAAnd refusing to access the space-based network, and turning to step 6.3.3.
6.4.2 TEAAccording to the authentication security parameter k stored locallysAnd message LFBM of (a)l2Calculating the Hash authentication value h of the ground terminalA′=H1(ks||ml2) If h is calculatedAAND message LFBExtracted H1(ks||ml2) If the values are equal, the authentication is passed, and the step 6.4.3 is carried out; otherwise TEAIdentify LEOBIs illegal, TEADenying access to space-based network, stopping with LEOBGo to step 6.3.3.
6.4.3 TEAComputing a session key KA=H1(ttA||ttL′EO||kt2×ml2||ks) (ii) a At the LEOBAnd TEAAfter the switching authentication is finished, the two are like LEOAAnd TEAThe communication uses a symmetric encryption algorithm (such as AES, DES and the like) for safe communication, KAIs the session key used in the symmetric encryption algorithm.
And step seven, finishing.
Claims (9)
1. An identity-based authentication method facing a space-based network is characterized by comprising the following steps:
firstly, constructing an identity-based authentication system facing a space-based network; the identity-based authentication system facing the space-based network consists of three network entities, namely a ground terminal TE, a key generation center KGC and a low earth orbit satellite LEO; the KGC is connected with a plurality of TEs and LEOs through wireless links;
before mutual authentication of TE and LEO, KGC calculates a system master key x and a public parameter params; KGC receives the identity identification, the request for applying the public parameters and the request for applying the private key from TE and LEO, the KGC calculates the private keys of the TE and LEO by using the public parameters params and the master key x, distributes the satellite private key and the public parameters to the satellite in a safe environment, and distributes the private key and the public parameters of the ground terminal to the ground terminal;
TE and LEO are connected with each other and connected with KGC, registration is carried out on KGC before communication, ID selected by TE or LEO, request for applying public parameters and request for applying private key are submitted to KGC, and the current satellite LEO is usedAAfter receiving the satellite's private key from the KGC, the LEOAGenerating satellite authentication message LASending to the current ground terminal TEA,TEATo LACarrying out authentication, and generating a ground terminal authentication message T after the authentication is passedAIs sent to LEOA;LEOAFor TAPerforming authentication to complete mutual authentication of the satellite and the ground terminal; current over-the-top satellite LEOAAbout to leave, LEOAAuthenticating a handover authentication security parameter k over a secure channelsSending to the current ground terminal TEAWill k issAnd TEAID ofASend to the next over-the-top satellite LEOB,TEAGenerating a terminal fast authentication message TFAIs sent to LEOB,LEOBFor TFACarrying out authentication, and generating a satellite rapid authentication message LF after the authentication is passedAIs sent to TEA,TEAFor LFAPerforming authentication to complete a rapid switching authentication process;
the KGC is provided with an initialization calculation module and a private key calculation module, and the ground terminal and the satellite are provided with a private key and public parameter management module, an authentication calculation module, a verification module and a switching authentication module;
an initialization calculation module on the KGC generates a public parameter params and a system master key x, and sends the params and the x to a private key calculation module of the KGC; the private key calculation module is connected with the private key and public parameter management modules of the ground terminal and the satellite; the private key calculation module receives the identity of the ground terminal, a request for applying for public parameters and a request for applying for the private key from the private key and public parameter management module of the ground terminal, calculates the private key of the ground terminal according to the identity of the ground terminal and sends the private key and the public parameters to the private key and public parameter management module of the ground terminal; the private key calculation module receives the identity identification of the satellite, a request for applying the public parameter and a request for applying the private key from the private key and public parameter management module of the satellite, calculates the private key of the satellite according to the identity identification of the satellite and sends the private key and the public parameter to the private key and public parameter management module of the satellite;
the private key and public parameter management module is connected with the private key calculation module of the KGC, is connected with the authentication calculation module of which the private key and public parameter management module belongs to the same network entity, and is responsible for receiving the private key and the public parameter sent by the private key calculation module and sending the private key and the public parameter to the authentication calculation module;
the authentication calculation module is connected with a private key and public parameter management module, a verification module and an authentication calculation module of another network entity, wherein the private key and public parameter management module and the authentication calculation module belong to the same network entity; after receiving the authentication message sent by the authentication calculation module of another network entity, the authentication calculation module sends the received authentication message to the verification module;
the verification module is connected with an authentication calculation module which belongs to the same network entity with the verification module, receives the authentication message from the authentication calculation module, verifies the authentication message, calculates a session key after the verification is passed, and then completes the safe communication between the satellite and the ground terminal with another network entity; current ground terminal TEACurrent overhead satellite LEOAAnd the next over-the-top satellite LEOBThe switching authentication modules of the three modules are connected with each other; at the LEOAAt the end of the service, the LEOADetermine imminent handover, LEOATo the TEAThe switching authentication module sends a switching authentication security parameter ksTo LEOBThe switching authentication module of (1) sends the TEAID ofAAnd handover authentication security parameter ks(ii) a Then TEAThe switching authentication module generates a terminal rapid authentication message TFAIs sent to LEOBOf the switching authentication module, LEOBIs switched to TFAPerforming authentication, and after the authentication is passed, LEOBSwitching authentication module generates satellite fast authentication message LFAIs sent to TEAOf the handover authentication module, TEAHandover authentication module pair LFAVerifying to complete the fast switching authentication;
secondly, an initialization calculation module on the KGC calculates a system master key and public parameters by using an initialization parameter generation algorithm in an identity-based signature scheme with a message recovery function, and the specific process is as follows:
2.1 initializing calculation Module selecting finite field FqAfter the elliptic curve E is determined, initializing a calculation module to randomly select a prime number P and a point P, wherein the order of the point P is P, and the P requires that the number of points on the E can be divided completely;
2.2 removal of the prime integer space from pOne number x is selected from the group,as the master key of the identity-based authentication system facing the space-based network, the global public key P is calculatedpub=xP;
2.3 selection of four Hash Functions H1,H2,F1,F2In which H is1,H2:{0,1}*→ZP,H1,H2The function of (1) is to map a 01 binary sequence code with an arbitrary length into a 01 binary sequence code with a length of a, and a belongs to Zp,ZpIs a prime integer space containing p, F1The function of the method is to map 01 binary sequence codes with arbitrary length into a length k201 binary sequence code, F2Has the effect of reducing the length to k1Mapping 01 binary sequence code to length k201 binary sequence code, k1And k2Is two positive integers and satisfies p ═ k1+k2;
2.4 mixing Fq,E,p,P,Ppub,H1,H2,F1,F2,k1,k2The identity-based authentication system public parameters params and params which are combined to form the space-based network<Fq,E,p,P,Ppub,H1,H2,F1,F2,k1,k2>Params, published;
thirdly, a private key calculation module on the KGC calculates a corresponding private key according to the identity submitted by the ground terminal and the satellite, and distributes the private key and the public parameter params to a private key and public parameter management module of the ground terminal and the satellite; the method comprises the following steps:
3.1 ground terminal TEAThe private key and public parameter management module provides the KGC private key calculation module with the public parameter management moduleTraffic identification IDAThe request for applying the public parameter params and the request for applying the private key;
3.2 private Key computation Module from ground terminal TEAThe private key and public parameter management module receives the IDAAnd request for public parameter params and request for private key, computing and IDACorresponding private key skA;
3.3 private Key computation Module will skAAnd params to TEAThe private key and public parameter management module;
3.4 TEAthe private key and public parameter management module will skAAnd params stored locally;
3.5 satellite LEOAThe private key and public parameter management module submits the identity selected by the private key and public parameter management module to the private key calculation module of the KGCA request for applying a public parameter params and a request for applying a private key;
3.6 private Key computation Module Slave satellite LEOAPrivate key and public parameter management module receivingAnd request for public parameter params and request for private key, calculation andcorresponding private key
3.7 private Key computation ModuleAnd params to LEOAThe private key and public parameter management module;
fourth, ground terminal TEAPerforming current satellite LEO over the top when accessing an identity-based authentication system facing a space-based network for the first timeAAnd TEAMutual authentication and session key agreement: TEAComplete the LEO pair firstAThe authentication of (1); then LEOAFor TEACarrying out authentication; finally according to LEO in the authentication processAAnd TEAReceived message, LEOAAnd TEACalculating a corresponding session key, wherein the specific process is as follows:
4.1 LEOAthe authentication computing module generates a satellite authentication message LAAnd broadcasts L to the groundAThe method comprises the following specific steps:
4.1.1 LEOAauthentication computing module ofRandomly selecting an integer as the random number of the satellite authentication messageAnd computes the plaintext of the satellite authentication message Is a binary sequence code consisting of 0 and 1;
4.1.2 LEOAusing private keyUsing signature algorithm pairSigning to generate LEOASatellite authentication message LAThe method comprises:
4.1.2.1 LEOAAuthentication computing module ofRandomly selecting an integer as a satellite signature random number
4.1.2.2 LEOAAuthentication computing module ofDivided into two partsAndwhereinHas a sequence code length of k2I.e. byHas a number of bits of k2;
4.1.2.3 LEOAThe authentication calculation module calculates the intermediate quantity of the satellite verification message signature Is a binary fortuneThe operator splices the 01 binary sequence codes of the two elements participating in the operation in sequence;the operator is a binary operator, and the 01 binary sequence codes of the two elements participating in the operation are subjected to exclusive OR operation;is higher than |; computing elliptic curve components of satellite signature messages Representing points on the elliptic curve EX-axis coordinates of (a); computing a hash intermediate value for a satellite signature message Computing satellite signature message tail elements Is the back of the satellite private key;is satellite LEOAA private key front;
4.1.2.4 willGenerating a plaintextSigned encrypted message ofIs thatConstituent quadruplets, i.e.WhereinAre all 01 binary sequence codes and are provided with a code,is according toSequentially arranged 01 binary sequence codes;
4.1.2.5 willSpliced into satellite authentication message LA,Is LEOATime stamp of (3), record LEOAThe current time of day is the time of day,whereinAre all 01 binary sequence codes, LAIs according toSequentially arranged 01 binary sequence codes;
4.1.3 LEOAwill authenticate message LABroadcasting to ground while recording satellite broadcast LAAt time t1;
4.1.4 LEOAObtaining LEOACurrent time t2Let time interval T equal to T2-t1If T is<T1,T1Turning to 4.2 steps for the first time threshold value, if T is more than or equal to T14.1.3 steps are carried out;
4.2 ground terminal TEATo satellite LEOAAnd (3) performing authentication, which specifically comprises the following steps:
4.2.1 TEAreceiving LEO by the authentication calculation moduleABroadcasted message LAIs prepared by mixing LAIs sent to TEAThe verification module of (1);
4.2.2 TEAthe verification module receives LALook over LATime stamp onAnd TEAIs at a second time threshold T2If T is less than or equal to T2Turning to step 4.2.3; if t is>T2Then TEARecognizes the issue LALEO (R) ofAIs illegal, TEARefusing to access the space-based network, and turning to the step 4.1;
4.2.3 TEAthe verification module of (2) pairs the message LAIn (1)Performing verification, if the verification passes, TEADetermine satellite LEOAIs legitimate and a satellite can be obtainedVerifying a message plaintextTurning to step 4.2.4; if the verification fails, TEARecognizes the issue LALEO (R) ofAIs illegal, TEARefusing to access the space-based network, and turning to the step 4.1; TEAThe verification module adopts a verification algorithm in an identity-based signature scheme with a message recovery function to carry out verification on the message LAIn (1)The verification is carried out by the following method:
4.2.3.1 TEAthe verification module calculates the hash intermediate values of the satellite signature messages in turnSatellite private key hash intermediate valueSatellite authentication message signature intermediate volumeAnd satellite authentication message plaintext backTo representRightmost k of2A binary sequence code of bit 01 is set,to representLeftmost k1Bit 01 binary sequence code;
4.2.3.2 ifThen authentication is passed, TEADetermining satellite LEOAIs legitimate and can obtain satellite authentication message plaintextGo to step 4.2.4, otherwise, verify fail, TEARecognizes the issue LALEO (R) ofAIs illegal, TEARefusing to access the space-based network, and turning to the step 4.1;
4.2.4 TEAfrom the verification module LAExtracting to obtainWill be provided withAnd 4.2.3.1 calculated in stepSplicing to obtain satellite verification messageAnd to TEAThe authentication calculation module sends a confirmation instruction indicating that the satellite is legal;
4.2.5 TEAthe authentication computing module generates a ground terminal authentication message TAAnd generating TAMeanwhile, an ECDH key exchange algorithm is adopted to calculate the session key, and the specific steps are as follows:
4.2.5.1 TEAauthentication computing module ofRandomly selecting an integer as a random number k of the ground terminal verification messageA,And calculating the plaintext m of the ground terminal verification messageA,mA=kAP,mAIs a binary sequence code consisting of 0 and 1;
4.2.5.2 TEAthe authentication calculation module uses the private key skAUsing signature algorithm to pair mASigning is carried out to generate a pair of plaintext mASigned encrypted message sigma (m)A),σ(mA) Is mA1,RA,yA,zAConstituent quadruples, σ (m)A)=(mA1,RA,yA,zA);mA1Is mAA moiety of (A), RAIs the ground terminal private key skAFront part, yASigning the elliptic curve component of the message, z, for the ground terminalASigning the message tail element, m, for the ground terminalA1,RA,yA,zAAre all 01 binary sequence codes, σ (m)A) Is according to mA1,RA,yA,zASequentially arranged 01 binary sequence codes;
4.2.5.3 TEAauthentication computation module of (2) select TEATime stamp ttAWill IDA、ttA、σ(mA) Spliced ground terminal authentication message TA,TA=IDA||ttA||σ(mA) (ii) a Wherein the IDA、ttA、σ(mA) Are all 01 binary sequence codes, TAIs in accordance with IDA、ttA、σ(mA) Sequentially arranged 01 binary sequence codes; TEAThe authentication calculation module of (A) is to beAIs sent to LEOAThe authentication calculation module of (1);
4.2.5.4 TEAthe authentication calculation module calculates the session key In TEAAnd LEOAAfter the mutual authentication is finished, the two parties encrypt the session letter by using a symmetric encryption algorithmThen, K1Namely a secret key used in a symmetric encryption algorithm;
4.3 LEOAthe authentication computing module receives the message TAWill TAIs sent to LEOAThe verification module of (1);
4.4 LEOAthe verification module of (2) receives TATo ground terminal TEAThe authentication is carried out by the following method:
4.4.1 LEOAthe verification module of (1) checks TATime stamp tt onAAnd LEOAIs at a third time threshold T3If T' is less than or equal to T3Turning to step 4.4.2; if t'>T3Then LEOARecognizing the issue of TATE ofAIs illegal, LEOARejection of TEAAccess to space-based network, stop and TEAStep 4.2.5;
4.4.2 LEOAverification module pair TAσ (m) of (1)A) Performing verification, if the verification is passed, LEOATE can be determinedAIs legal and gets the corresponding plaintext mATurning to step 4.4.3; if the verification fails, LEOARecognizing the issue of TATE ofAIs illegal, LEOARejection of TEAAccess to space-based network, stop and TEAStep 4.2.5;
4.4.3 LEOAfrom the verification module of TAExtract mA1M isA1And mA2The two are spliced to obtain a ground terminal verification message mAThen LEOATo the LEOAThe authentication calculation module sends a confirmation instruction;
4.4.4 LEOAthe authentication calculation module adopts an ECDH key exchange algorithm to calculate a session key
Fifth aspect of the inventionStep, LEOAAnd TEANormal communication, LEOAPredicting LEO at the end of serviceATurning to the sixth step when the user leaves the current area; LEOAPredicting LEO at the end of serviceATurning to the fifth step without leaving the current area;
sixthly, the satellite LEO which is about to leave at presentAGround terminal TEANext satellite LEO over the topBThe authentication is carried out by switching among planets by LEOAGenerates an authentication security parameter ksWill k issIs sent to TEASwitching authentication module of (2) to switch the TEAID ofAAnd ksIs sent to LEOBRequesting the LEO at that timeAAnd TEA、LEOBBoth-way authentication is completed; then TEAThe switching authentication module generates a terminal rapid authentication message TFAIs sent to LEOBOf the switching authentication module, LEOBThe handover authentication module of (1) receives the TFAThereafter, the TE is verifiedAAfter the verification is passed, LEOBSwitching authentication module generates satellite fast authentication message LFBAnd will LFBIs sent to TEAAfter the verification is passed, the switching authentication stage is ended, and TEAAnd LEOBNormal communication; the method comprises the following specific steps:
6.1 LEOAfrom a positive integer set N*Randomly selecting an integer as the authentication security parameter ks,ks∈N*Will k issIs sent to TEASwitching authentication module of (2) to switch the TEAID ofAAnd authenticating a security parameter ksIs sent to LEOBThe switching authentication module of (1); TEAAnd LEOBAfter receiving the message, the switching authentication module stores the related parameters locally;
6.2 TEAthe switching authentication module generates a terminal rapid authentication message TFAThe method comprises the following steps:
6.2.1 TEAswitch authentication module ofRandomly selecting an integer as a terminal switching authentication parameter kt2,Computing terminal switching authentication message plaintext mt2,mt2=kt2P;
6.2.2 TEAThe switching authentication module generates a terminal rapid authentication message TFA,TFA=IDA||mt2||ttA′||H1(ks||mt2),TFABy IDA、mt2、ttA′、H1(ks||mt2) 01 binary sequence code tt formed by splicing four 01 binary sequence codes in sequenceAIs' is TFATime stamp of (2) indicating TEAThe current time; h1(ks||mt2) Means that k iss,mt2Spliced 01 binary sequence code as Hash function H1Is input, is operated on to obtain a 01 binary sequence, and is output to the TFAIs sent to LEOBThe switching authentication module of (1);
6.3 LEOBis switched to TEAThe method for authenticating and calculating the session key comprises the following steps:
6.3.1 LEOBfrom TE to the handover authentication moduleAThe handover authentication module of (1) receives the TFAAfter that, TF is checkedATime stamp tt onA' and LEOBIs at a fourth time threshold T4If tt is less than or equal to T4Turning to step 6.3.2; if tt>T4Then LEOBIdentify TEAIs illegal, refused to be TEAProviding service, and turning to step 6.2;
6.3.2 LEOBaccording to TFAIdentity ID ofARetrieving authentication security parameter k corresponding theretosAnd use ksAnd mt2Computing satellite handover hash authentication valuesIf it is notAnd slave message TFALifting the extracted H1(ks||mt2) If the values are equal, the authentication is passed, and the step 6.3.3 is carried out; otherwise LEOBIdentify TEAIs illegal, refused to be TEAProviding service, and turning to step 6.2;
6.3.3 LEOBswitching authentication module generates satellite fast authentication message LFBAnd calculates a session keyThe method comprises the following steps:
6.3.3.1 LEOBswitch authentication module ofRandomly selecting an integer as a satellite switching authentication parameter kl2,And calculating the plaintext m of the satellite switching authentication messagel2,ml2=kl2P;
6.3.3.2 LEOBSwitching authentication module generates satellite fast authentication message LFB,LFB=ml2||ttLEO′||H1(ks||ml2),LFBIs formed by ml2、ttLEO′、H1(ks||ml2) A 01 binary sequence code tt formed by sequentially splicing three 01 binary sequence codesLEOIs LFBTime stamp of (3), representing LEOBThe current time; h1(ks||ml2) Means that k iss,ml2Spliced 01 binary sequence code as Hash function H1Is input, is operated on to obtain a 01 binary sequence, and is outputFBIs sent to TEAThe switching authentication module of (1);
6.3.3.3 LEOBthe switching authentication module calculates the session key The meaning of the formula is ttA,ttLEO′,kl2×mt2,ksSplicing four 01 binary sequence codes in sequence to form a 01 binary sequence code, and taking the 01 binary sequence code as a hash function H1The input of (1); at the LEOBAnd TEAAfter the handover authentication is finished, the LEOBAnd TEASecure communications using a symmetric encryption algorithm in which the session key is used
6.4 TEATo LEOBThe method for authenticating and calculating the session key comprises the following steps:
6.4.1 TEAswitch authentication module slave LEOBReceiving LF by the switching authentication moduleBChecking LFBTime stamp tt onLEO' with TEAIs at a fifth time threshold T5If ttt is less than or equal to T5Turning to step 6.4.2; if ttt>T5Then TEAIdentify LEOBIs illegal, TEARefusing to access the space-based network, and turning to the step 6.3.3;
6.4.2 TEAaccording to the authentication security parameter k stored locallysAnd message LFBM of (a)l2Calculating the Hash authentication value h of the ground terminalA′=H1(ks||ml2) If h is calculatedAAND message LFBExtracted H1(ks||ml2) If the values are equal, the authentication is passedTurning to step 6.4.3; otherwise TEAIdentify LEOBIs illegal, TEADenying access to space-based network, stopping with LEOBStep 6.3.3;
6.4.3 TEAcomputing a session key KA=H1(ttA||ttLEO′||kt2×ml2||ks) (ii) a At the LEOBAnd TEAAfter the handover authentication is finished, the LEOBAnd TEASecure communication using a symmetric encryption algorithm, KAIs the session key used in the symmetric encryption algorithm;
and step seven, finishing.
2. The identity-based authentication method for the space-based network according to claim 1, wherein in the first step, in the secure environment, the two communicating parties establish the secure session connection by using a secure socket protocol.
3. The identity-based authentication method for space-based network as claimed in claim 1, wherein 3.2 steps of said private key calculation module calculation and IDACorresponding private key skAThe computing method adopts a private key generation algorithm in an identity-based signature scheme with a message recovery function, and comprises the following specific steps:
3.2.1 private Key computation Module fromRandomly selecting any number from the middle random selection list as a ground terminal registration random number, and recording the random number as rA,
3.2.2 private Key computation Module compute private Key skA,skA=(RA,vA),RA=rAP,vA=rA+cAx mod p, where cA=H1(IDA,RA),RAIs a ground terminalFront part of end private key, cAIs a ground terminal private key hash intermediate value, vAIs the back of the ground terminal private key, and x is the master key.
4. The identity-based authentication method oriented to space-based network as claimed in claim 1, wherein 3.6 steps of said private key calculation module calculation andcorresponding private keyThe method adopts a private key generation algorithm in an identity-based signature scheme with a message recovery function, and comprises the following specific steps:
3.6.1 private Key computation Module fromRandomly selecting any number as satellite registration random number, and recording as
5. The identity-based authentication method for space-based networks according to claim 1, wherein the first time threshold T is1According to the system requirement setting, when the system is required to consume less communication resources and the broadcasting period is long T1Set to 200 seconds; when the system is required to operate efficiently and the broadcast period is short, T is set1Set to 50 seconds.
6. The identity-based authentication method for space-based networks according to claim 1, wherein the second time threshold T is2A third time threshold T3A fourth time threshold T4And a fifth time threshold T5Are all set according to the actual condition of the system and require T2Not greater than the time, T, of transmission of the message from the satellite to the ground terminal3Not greater than the time, T, of transmission of the message from the ground terminal to the satellite4And T5No greater than the time of transmission of the message from the ground terminal to the satellite.
7. The identity-based authentication method for space-based networks according to claim 6, wherein the second time threshold T is2A third time threshold T3A fourth time threshold T4And a fifth time threshold T5Set to 1 second to 10 seconds.
8. A process as claimed in claim 1An identity-based authentication method facing to space-based network, characterized in that step 4.2.5.2 TEAThe authentication calculation module generates a pair of plaintext mASigned encrypted message sigma (m)A) The method comprises the following steps:
4.2.5.2.1 TEAauthentication computing module ofRandomly selecting an integer as a ground terminal signature random number tA,
4.2.5.2.2 TEAM is calculated by the authentication calculation moduleADivided into two parts mA1And mA2Wherein m isA2Has a sequence code length of k2I.e. mA2Has a number of bits of k2;
4.2.5.2.3 TEAThe authentication calculation module calculates m 'as a medium quantity of the verification message signature of the ground terminal'A,Calculating elliptic curve component y of ground terminal signature messageA,(tAP)XRepresenting a point t on the elliptic curve EACoordinates on the X-axis of P; calculating the hash intermediate value h of the ground terminal signature messageA,hA=H2(IDA,RA,yA),hA=H2(IDA,RA,yA) Indicates the IDA,RA,yAConcatenating into a binary sequence, and then using the binary sequence as function H2Computing the hash value, R, of the binary sequenceAIs the front part of the private key of the ground terminal; calculating ground terminal signature message tail element zA,zA=tA+hAvAmod p,vAIs the back part of the private key of the ground terminal;
4.2.5.2.4 mixing mA1,RA,yA,zAGenerating a plaintext mASigned encrypted message sigma (m)A),σ(mA) Is mA1,RA,yA,zAConstituent quadruples, σ (m)A)=(mA1,RA,yA,zA) (ii) a Wherein m isA1,RA,yA,zAAre all 01 binary sequence codes, σ (m)A) Is according to mA1,RA,yA,zASequentially arranged 01 binary sequence codes.
9. The space-based network-oriented identity-based authentication method of claim 1, wherein the LEO in step 4.4.2AVerification module pair TAσ (m) of (1)A) The verification method comprises the following steps:
4.4.2.1 LEOAthe verification module calculates the hash intermediate value h of the ground terminal signature message in turnA=H2(IDA||RA||yA) The intermediate value c of the private key hash of the ground terminalA=H1(IDA||RA) Ground terminal verifying message signature intermediate quantityAnd the ground terminal verifies the back part of the message plaintext Is m'ARightmost k of2A binary sequence code of bit 01 is set,is m'ALeftmost k1Bit 01 binary sequence code;
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110306820.3A CN113079016B (en) | 2021-03-23 | 2021-03-23 | Identity-based authentication method facing space-based network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110306820.3A CN113079016B (en) | 2021-03-23 | 2021-03-23 | Identity-based authentication method facing space-based network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113079016A CN113079016A (en) | 2021-07-06 |
CN113079016B true CN113079016B (en) | 2022-01-21 |
Family
ID=76613274
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110306820.3A Active CN113079016B (en) | 2021-03-23 | 2021-03-23 | Identity-based authentication method facing space-based network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113079016B (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113660026B (en) * | 2021-07-26 | 2022-08-16 | 长光卫星技术股份有限公司 | Satellite security management method based on multi-user autonomous access control |
CN113783703B (en) * | 2021-11-10 | 2022-02-25 | 清华大学 | Satellite network terminal security access authentication method, device and system |
CN114221821B (en) * | 2021-12-31 | 2023-07-25 | 清华大学 | Method, device and system for realizing satellite communication authentication |
CN114466359B (en) * | 2022-01-07 | 2024-03-01 | 中国电子科技集团公司电子科学研究院 | Distributed user authentication system and authentication method suitable for low orbit satellite network |
CN114826651B (en) * | 2022-03-08 | 2023-07-18 | 重庆邮电大学 | Lightweight and certificateless authentication method for low orbit satellite network |
WO2023216206A1 (en) * | 2022-05-12 | 2023-11-16 | 北京小米移动软件有限公司 | Wireless transmission method and apparatus, and communication device and storage medium |
CN116056080B (en) * | 2022-08-18 | 2024-07-19 | 重庆邮电大学 | Satellite switching authentication method for low-orbit satellite network |
CN116056078B (en) * | 2022-10-10 | 2024-05-31 | 西安电子科技大学 | High-speed terminal security authentication method based on track prediction in space-earth integrated scene |
CN115665732B (en) * | 2022-10-24 | 2023-10-27 | 中国人民解放军国防科技大学 | Certificate-free signature authentication method for satellite Internet |
CN116996113B (en) * | 2023-09-26 | 2023-12-26 | 北京数盾信息科技有限公司 | Satellite terminal networking method, device and equipment |
CN117676559A (en) * | 2023-11-21 | 2024-03-08 | 航天恒星科技有限公司 | Communication method and system based on network slice |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112087750A (en) * | 2020-08-05 | 2020-12-15 | 西安电子科技大学 | Access and switching authentication method and system under satellite network intermittent communication scene |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110971415B (en) * | 2019-12-13 | 2022-05-10 | 重庆邮电大学 | Space-ground integrated space information network anonymous access authentication method and system |
CN111314056B (en) * | 2020-03-31 | 2022-07-01 | 四川九强通信科技有限公司 | Heaven and earth integrated network anonymous access authentication method based on identity encryption system |
CN112332900B (en) * | 2020-09-27 | 2023-03-10 | 贵州航天计量测试技术研究所 | Low-orbit satellite communication network rapid switching authentication method |
-
2021
- 2021-03-23 CN CN202110306820.3A patent/CN113079016B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112087750A (en) * | 2020-08-05 | 2020-12-15 | 西安电子科技大学 | Access and switching authentication method and system under satellite network intermittent communication scene |
Also Published As
Publication number | Publication date |
---|---|
CN113079016A (en) | 2021-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113079016B (en) | Identity-based authentication method facing space-based network | |
CN108989318B (en) | Light-weight security authentication and key exchange method for narrowband Internet of things | |
CN108111301B (en) | Method and system for realizing SSH protocol based on post-quantum key exchange | |
CN113194469B (en) | 5G unmanned aerial vehicle cross-domain identity authentication method, system and terminal based on block chain | |
CN102946313B (en) | A kind of user authentication model for quantum key distribution network and method | |
CN102315937B (en) | System and method for secure transaction of data between wireless communication device and server | |
CN109218018A (en) | A kind of unmanned plane key management of identity-based and networking Verification System and method | |
CN109257346B (en) | Concealed transmission system based on block chain | |
CN113612605A (en) | Method, system and equipment for enhancing MQTT protocol identity authentication by using symmetric cryptographic technology | |
CN111416706B (en) | Quantum secret communication system based on secret sharing and communication method thereof | |
CN108964897B (en) | Identity authentication system and method based on group communication | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN111049647B (en) | Asymmetric group key negotiation method based on attribute threshold | |
Shukla et al. | A bit commitment signcryption protocol for wireless transport layer security (wtls) | |
CN105491076A (en) | Heterogeneous network end-to-end authentication secret key exchange method based on space-sky information network | |
CN109688583A (en) | A kind of data ciphering method in star earth communication system | |
Hou et al. | Lightweight and privacy-preserving charging reservation authentication protocol for 5G-V2G | |
CN113055394A (en) | Multi-service double-factor authentication method and system suitable for V2G network | |
CN114844649A (en) | Secret key distribution method containing trusted third party based on superlattice PUF | |
CN115296890A (en) | Method and system for data security interaction between terminal applications | |
CN104618113A (en) | Method for authenticating identity of mobile terminal and constructing safety channel | |
KR100456624B1 (en) | Authentication and key agreement scheme for mobile network | |
Rahman et al. | Man in the Middle Attack Prevention for edg-fog, mutual authentication scheme | |
EP3883178A1 (en) | Encryption system and method employing permutation group-based encryption technology | |
Kumari et al. | A resilient group session key authentication methodology for secured peer to peer networks using zero knowledge protocol |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |