Computer Science ›› 2016, Vol. 43 ›› Issue (7): 157-161.doi: 10.11896/j.issn.1002-137X.2016.07.028

Previous Articles     Next Articles

Method for Detecting Wiretapping Attack in Satellite Network Based on Quantum Cryptography

HUANG Jing, XI Bo, LI Peng, ZHANG Fan and ZHAO Xin-jie   

  • Online:2018-12-01 Published:2018-12-01

Abstract: The wiretapping attack is the foundation of many advanced attacks on satellite network.Since quantum cryptography will be widely used in satellite network,a method for detecting wiretapping attack in satellite network based on quantum cryptography was proposed.Based on the spatial distributions of the satellites,a layered and clustering wiretapping attack detection model was presented at first.During the process of wiretapping attack detection,when the neighboring satellites detect a wiretapping attack in their channel,the corresponding alarm messages will be first sent to the head node of their cluster through secure channels.At the same time,the corresponding alarm messages will be further fused and sent to the ground control center by the head node.The secure link of two satellites will be established according to the secure link establishing scheme from the ground control center.Eventually,the security and the effectiveness of the proposed method were analyzed.The proposed method can lay a foundation for further research on the techniques of satellite network protection.

Key words: Satellite network,Quantum cryptography,Wiretapping attack,Clustering

[1] Chi Hao,Zhang Xian-min,Zhu Hua-fei,et al.Principles applications and state-of-the-arts of Quantum Cryptography[J].Journal of O ptoelectronics,LASER,2001,12(1):105-108(in Chinese) 池灏,章献民,朱华飞,等.量子密码的原理、应用和研究进展[J].光电子·激光,2001,12(1):105-108
[2] Lu Bing-xu.Development of Quantum Cryptography [J].Computer CD Software and Applications,2014(24): 314-315(in Chinese) 路炳旭.量子密码技术发展概述[J].计算机光盘软件与应用,2014(24):314-315
[3] Wang J F,Li L,Zhou M T.Topological Dynamics characterization for LEO satellite networks [J].Computer Networks,2007,51(1):43-53
[4] Küükates, R,Ersoy C.Minimum flow maximum residual routing in LEO satellite networks routing set [J].Journal of Wireless Networks,2008,14(4):501-517
[5] Li Jia.Research on Quantum Cryptography System[J].Science Mosaic,2013(6):221-226(in Chinese) 李佳.量子密码体系研究[J].科技广场,2013(6):221-226
[6] Gisin N,Ribordy G,Tittel W,et al.Quantum cryptography [J].Reviews of Modern Physics,2002,74(1):145-195
[7] Wen Qiao-yan,Qin Su-juan,Gao Fei.Cryptanalysis of Quantum Cryptographic Protocols[J].Journal of Cryptologic Research,2014,1(2):200-210(in Chinese)温巧燕,秦素娟,高飞.量子密码协议安全性分析[J].密码学报,2014,1(2):200-210
[8] Su Jin-hai,Luan Xin,Guo Yi-xi,et al.A Group Key Agreement Scheme for QKD Networks[J].Journal of Shanghai Jiaotong University,2014,48(10):1498-1502(in Chinese) 苏锦海,栾欣,郭义喜,等.一种适用于量子密钥分配网络的组密钥协商方案 [J].上海交通大学学报,2014,48(10):1498-1502
[9] Luan Xin,Guo Yi-xi,Su Jin-hai,et al.Research of group keyservice initialization based on QKD[J].Computer Science,2013,40(11A):181-183(in Chinese) 栾欣,郭义喜,苏锦海,等.基于QKD的组密钥服务初始化研究 [J].计算机科学,2013,40(11A):181-183
[10] Chen Yan-bin,Cheng Hu-lai,Gong Li-hua.Quantum key injection scheme[J].Journal of Nanchang University (Natural Science),2013,37(6):581-588(in Chinese) 陈燕彬,程虎来,龚黎华.量子密钥注入方案 [J].南昌大学学报(理科版),2013,37(6):581-588

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .