计算机科学 ›› 2015, Vol. 42 ›› Issue (12): 229-232.

• 信息安全 • 上一篇    下一篇

深空网络的高效安全通信机制

任方,郑 东   

  1. 西安邮电大学通信与信息工程学院 西安710121;无线网络安全技术国家工程实验室 西安710121,无线网络安全技术国家工程实验室 西安710121
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金(61272037,61472472),陕西省青年科技新星计划(2014KJXX-73),西安邮电大学青年教师科研基金(ZL2013-06)资助

Efficient and Secure Communication Scheme for Deep Space Networks

REN Fang and ZHENG Dong   

  • Online:2018-11-14 Published:2018-11-14

摘要: 安全的深空通信网络是实现深空探测的重要保证之一。研究了基于天基网的深空网络体系结构,给出了一种安全通信机制。该机制采用基于属性的公钥加密算法来实现安全的深空数据传输。深空节点为数据选择加密属性集,用户能够解密密文当且仅当该加密属性集满足用户持有的访问树。该方案中用户与深空节点之间无需进行身份认证,大大减少了信息交互次数,比较适用于深空网络通信,以弥补其数据传输代价高昂的缺陷。

关键词: 深空网络,安全体系,通信,公钥密码学,属性

Abstract: The secure deep space communication network is one of the most important aspects in deep space exploration.A deep space network architecture based on satellites networks was proposed and an efficient and secure communication scheme for this architecture was studied.In this scheme,the attribute-based encryption algorithms are used to achieve secure data transmission in deep space networks.The deep space node chooses a set of attributes for data to be transmitted and encrypts it with private keys corresponding to the attributes and a user can decrypt the cipher if and onlyif the attributes set satisfies the access tree user holds.There is no need for the node and the user to authenticate the identity of each other,so the numbers of information exchange are greatly reduced.The scheme is suitable for deep space networks in order to make up the deficiency of costly data transmission.

Key words: Deep space networks,Security systems,Communication,Public key cryptography,Attributes

[1] 欧阳自远,李春来,邹永廖,等.深空探测的进展与我国深空探测的发展战略[J].中国航天,2002(12):28-32 Ouyang Z Y,Li C L,Zou Y L,et al.Advances in deep space exploration and the development strategy of China’s deep space exploration [J].Aerospace China,2002(12):28-32
[2] 姜昌,黄宇民,胡勇.研究与开发天基深空通信跟踪(C&T)网的倡议[J].飞行器测控学报,1999,8(4):28-37 Jiang C,Huang Y M,Hu Y.An initiative of research and development of space-based communications and tracking(C&T) network [J].Journal of Spacecraft TT&C Technology,1999,8(4):28-37
[3] Hooke A.The interplanetary internet [J].Communication of the ACM,2001,4(9):38-40
[4] Akyildiz I F,Akan  B,Chen C,et al.Interplanetary internet:state-of-the-art and research challenges [J].Computer Networks,2003,3(2):75-112
[5] Bhasin K,Hayden J L.Space Internet architecture and technologies for NASA enterprises [J].International Journal of Satellite Communications,2002,20(5):311-332
[6] Mukherjee J,Ramamurthy B.Communication technologies and architectures for space network and interplanetary internet [J].IEEE Communications Surveys & Tutorials,2013,15(2):881-897
[7] Sodnik Z,Furch B,Lutz H.Optical intersatellite communication [J].IEEE Journal of Selected Topics in Quantum Electronics,2010,6(5):1051-1057
[8] Marchese M.Interplanetary and pervasive communications [J].IEEE Aerospace and Electronic Systems Magazine,2011,6(2):12-18
[9] 林闯,董扬威,单志广.基于 DTN 的空间网络互联服务研究综述[J].计算机研究与发展,2014,51(5):931-943 Lin C,Dong Y W,Shan Z G.Research on space internetworking service based on DTN [J].Journal of Computer Research and Development,2014,51(5):931-943
[10] Wenbo M.Modern cryptography:theory and practice [M].Prentice Hall PTR,2004
[11] Shamir A.Identity-based cryptosystems and signature schemes[C]∥Advances in Cryptology-Crypto’84.Berlin:Springer-Verlag,1984:47-53
[12] Boneh D,Franklin M.Identity-based encryption from the weil pairing[C]∥Advances in Cryptology-Crypto 2001.Berlin:Springer-Verlag,2001:213-229
[13] 郝云芳,吴静,王立炜.Boneh-Boyen_1 基于身份加密体制的安全密钥分发[J].计算机科学,2012,39(Z6):35-37 Hao Y F,Wu J,Wang L W.Secure key issuing for Boneh-Boyen1 identity-based encryption [J].Computer Science,2012,39(Z6):35-37
[14] Sahai A,Waters B.Fuzzy identity based encryption[C]∥Advances in Cryptology-EUROCRYPT 2005.Berlin:Springer-Verlag,2005:457-473
[15] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥ACM conference on Computer and Communications Security.Alexandria,USA:ACM Press,2006:89-98
[16] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]∥Proceedings of IEEE Symposium on Security and Privacy.Oakland,USA:IEEE Computer Society,2007:321-334
[17] Lewko A,Waters B.Decentralizing attributed-based encryption[C]∥Advances in Cryptology-EUROCRYPT 2011.Berlin:Springer-Verlag,2011:568-588
[18] Zhang Guo-yan,Liu Lei,Liu Yang.An attribute-based encryption scheme secure against malicious KGC[C]∥IEEE 11th International Conference on Trust,Security and Privacy in Computing and Communications.Liverpool,UK:IEEE Computer Society,2012:1376-1380
[19] 陈燕俐,杜英杰,杨庚.一种高效的基于属性的认证密钥协商协议[J].计算机科学,2014,41(4):150-154,7 Chen Y L,Du Y J,Yang G.Efficient attribute based authenticated key agreement protocol [J].Computer Science,2014,41(4):150-154,7

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!