Font Size: a A A

The Identity Authentication Technology Based On CL-PKC In Space Information Network

Posted on:2019-03-10Degree:MasterType:Thesis
Country:ChinaCandidate:L T JiaFull Text:PDF
GTID:2348330545958250Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the development of space information network,space information technologies are continuing to mature.However,the security issues of information network appear with it,and have drawn people's special attentions.Among this,identity authentication as an important part of security technology system of space information network,is a basic process of security communication and access.However,there are many problems of identity authentication in space information network,such as,high consumption of communication and calculation resources,long authentication time,no thinking about the security of key generation center,etc.So,after analyzing the need of identity authentication in space information network,this research proposes an identity authentication technology based on CL-PKC in space information network.While ensuring security of identity authentication,this research solves the problem of the dependencies on key generation center and key routine in identity authentication technology.Meanwhile,this research introduces the validity of key.The validity of key can be determined from the feature of satellite nodes.And it can improve the flexibility of algorithm,and save the resources of system.And then,aimed at man-in-the-middle attack and replay attack,this research proposes a technical proposal to improve safety of identity authentication in space information network.The introduction of node position and timestamp can realize the effective detection of the above attacks.Finally,simulation result shows that the identity authentication technology based on CL-PKC and the technical proposal of identity authentication have good performance,and are suitable for space information network.
Keywords/Search Tags:space information network, identity authentication algorithm, CL-PKC, man-in-the-middle attack, replay attack
PDF Full Text Request
Related items