Font Size: a A A

CCSDS Telecommand Data Authentication Security Applications Research And Simulation

Posted on:2009-02-14Degree:MasterType:Thesis
Country:ChinaCandidate:D B LiuFull Text:PDF
GTID:2178360278956892Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Risk analyses performed by several space agencies have provided indications of the impact of different threats on several categories of space missions. The localization of authentication layer in CCSDS TC protocol is analyzed and researched in theoretical manner with authentication algorithm performance issues.Firstly, the state-of-the-art of the research on space data link protocol is introduced. The necessity of the replacement of the authentication algorithm is proposed after the analysis on the security of the algorithms which is being used widely domesticly and abroad.According to recommendations of CCSDS TC data link protocol, the impact brought by various authentication algorithms on the telecommand uplink performance is analyzed and researched in detail within the situations of different authentication layer localization. A simulation framework based on OPNET is proposed to simulate the process of TC data according to the specification. Various performance of CCSDS TC system is analyzed by means of the simulation experiments on the built models, such as TC data link throughput, the available satellite resources. Then a security scheme of space telecommand data authentication is proposed with different space missions.
Keywords/Search Tags:Telecommand, OPNET Simulation, CCSDS, Identity Authentication, SHA
PDF Full Text Request
Related items