Font Size: a A A

Satellite Communication System Key Management Scheme Oka Research And Design

Posted on:2013-12-30Degree:MasterType:Thesis
Country:ChinaCandidate:H ChenFull Text:PDF
GTID:2248330374986738Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Satellite mobile communication system, on the one hand, has the advantage of widerange covering, rapid layout and without geographical constraints. However, variousreasons such as the openness of its space channel and satellite’s exposure result inserious threats to the security of this system. Key management is an important part inthe overall security of satellite mobile communication system, key leaking will derivethe disclosure of information directly. Combining the process of establishinginformation channel chain, we design schemes of the centralized key distribution andkey agreement between two parties, based on the key management of symmetric andpublic key cryptography respectively. For these two kinds of online key managementschemes, simulation and analysis is also carried out.The main content of this paper is as follows:1. We give a brief introduction to satellite communication systems, including itsclassification and components, the network structure and work process.2. Analyze the security threats in the satellite communication systems, and elaborate theimportant role of key and key management. We also introduce two key managementtechniques based on symmetric and public key cryptography.3. We study and design two schemes: the centralized key distribution and key agreementbetween two parties. Furthermore, by using OPNET simulation tool, we construct thesimulation models of key management for satellite communication systems, whichinclude terminal nodes communication model, signal stations and satellitecommunication model. Every functional module in these communication models isdescribed.4. In the simulation model of key management, we design simulation scenarios of keydistribution for the cases of centralization and key agreement between two partiesrespectively. The delay performance of key distribution is also analyzed.Finally, we summarize our work and present a prospect of techniques.
Keywords/Search Tags:key-online management, centralized key distribution, self-agreement keydistribution between two parties
PDF Full Text Request
Related items