Font Size: a A A

Research And Design Of Satellite Communication Network Security Access Authentication

Posted on:2022-06-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y F DengFull Text:PDF
GTID:2518306530980349Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Satellite communication network is an important part of modern communication network,and the security of satellite communication network is the key problem of its development and research.This paper studies the communication scenario in which low-orbit satellites are used as servers to provide network services for users.In this scenario,the user can directly access the image,location and other resource information obtained by the satellite.Due to the characteristics of high exposure,high time delay and high dynamic change of low orbit satellites,low orbit satellite networks are more vulnerable to attack than traditional networks,resulting in information leakage,network congestion and even the entire network breakdown.Aiming at the above problems,this paper proposes a secure access authentication method to ensure the legitimacy and security of the communication between users and satellites.Main work is as follows:A secure access authentication method for low orbit satellites is designed,including the first access authentication.Connection recovery;And switching between stars in three parts.Hash,XOR and other encryption methods are introduced to anonymize users in authentication.The first authentication focuses on user authentication and key negotiation,and the purpose is to finally generate the master key for encryption of satellite and user communication data.The problem to be solved in connection recovery is the authentication of user's identity and the safe transmission of master key,so that users can safely reconnect with the satellite after the network is cut off.The key problem of inter-satellite handover is to connect the user's identity and master key with the newly switched satellite,so as to ensure the continuous communication between the user and the satellite.After that,security analysis is carried out for the above design process.Security analysis will be based on user anonymity and traceability;Non-connectivity for non-legitimate users;Anti-man-in-the-middle attack;Anti-Do S attack;Forward security and other aspects to elaborate.The trust in the master key is proved theoretically.The last part of this paper introduces the application of the simulation software Exata,and chooses the parameters such as delay,communication cost and calculation cost to carry out comparative experiments.Highlight the advantages of this design.There are three innovations in this paper.First,the certification process designed in this paper ensures the requirements of a variety of security features,while reducing the delay and overhead.Second: connection recovery and star switching authentication for the first time in the form of a dynamic password to verify identity information.It ensures the security of the satellite network.Third: when the satellite deletes the user information,through the storage connection to restore the implementation.It is less complicated than the previous first access authentication.
Keywords/Search Tags:Access authentication, Registration, Verification code, Symmetric encryption, Master key
PDF Full Text Request
Related items