计算机科学 ›› 2016, Vol. 43 ›› Issue (1): 178-180.doi: 10.11896/j.issn.1002-137X.2016.01.040

• 信息安全 • 上一篇    下一篇

面向无人装置协同操作的安全认证协议

牛文生,李亚晖,郭鹏   

  1. 中航工业西安航空计算技术研究所 西安710075机载弹载计算机航空科技重点实验室 西安710075,中航工业西安航空计算技术研究所 西安710075机载弹载计算机航空科技重点实验室 西安710075,中航工业西安航空计算技术研究所 西安710075机载弹载计算机航空科技重点实验室 西安710075
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受航空科学基金项目(2013ZC31005)资助

Authentication Protocol for Cooperation of Unmanned Vehicles

NIU Wen-sheng, LI Ya-hui and GUO Peng   

  • Online:2018-12-01 Published:2018-12-01

摘要: 无人装置协同操作动态组网需要安全的群组通信。依据无线环境中的不同安全域,提出了一种具有身份保护的安全组网协议。该协议采用基于身份的匿名签名算法设计了安全组网机制,实现了传感器节点、作动器节点、密钥分发中心和控制台的四方安全认证和密钥交换,并为安全域内的无人操作装置建立了安全传输通道;采用匿名身份认证与可追溯机制相结合的方式,构建了无人操作装置间动态组网和数据安全传输,以为协同操作提供实时、安全的数据通道,实现无人操作装置在传感器和作动器级的协同。

关键词: 无人装置,动态组网,群组通信,多级安全,密钥管理

Abstract: The cooperation of unmanned vehicles needs dynamic networking for the secure group communication.Based on the different security domain of wireless environments,an authentication protocol with identity protection for coopera-tion of unmanned vehicles was proposed,which consists of a four-party security information exchange protocol for the data transmission between nodes in the dynamic network and an ID-based anonymous authentication scheme for the secure session keys of a node,which supports the combination of the decryption process and the identity protection.Finally,it is shown that the session key has the security characters of unforgeability,confidentiality and non-repudiation,and the new protocol has a secure,flexible and efficient method of key management for dynamic networking.

Key words: Unmanned vehicles,Dynamical networking,Group communication,Multilevel secure,Key management

[1] Mark C C.A Discussion of a Modular Unmanned Demonstration Air Vehicle:A GARD CP2600[R].2000
[2] John A T.The Air Force is Pursuing Uninhabited Combat Air Vehicles in a Big Way[J].Air Force Magazine,2001,84(8):64
[3] Jones M C A.Unmanned Aerial Vehicles (UAVS)- an Assessment of Historical Operations and Future Possibilities:AU/ACSC/0230D/97-03[R].1997
[4] Siddiqui M S,Seon V C.Security Issues in Wireless Mesh Networks[C]∥IEEE International Conference on Multimedia and Ubiquitous Engineering (MUEy07).2007
[5] Zhang W,Wang Z,Das S K,et al.Security Issues in Wireless Mesh Networks[M]∥Wireless Mesh Networks:Architectures and protocols.New York:Springer,2008
[6] IEEE Standard for Local and Metropolitan Area Networks Part 16:Air Interface for Fixed Broadband Wireless Access Systems:IEEE Std 802.16-2004[S].2004:1-857
[7] Shamir A.Identity-based cryptography and signature schemes[M]∥Advances in Cryptology(CRYPTO’84):Lecture Notes in Computer Science 196.Berlin:Springer-Verlag,1985:47-53
[8] Boneh D,Franklin M.Identity-based encryption from the Weil pairing[M]∥Advances in Cryptology(CRYPTO 2001):Lecture Notes in Computer Science.Berlin:Springer-Verlag,2001:213-229
[9] Ke Zeng.Pseudonymous PKI for ubiquitous computing[M]∥Public Key Infrastructure:Lecture Notes in Computer Science.Springer Berlin Heideleberg,2006:207-222
[10] Tu Jun-yang.Research on Synthesis Data Links of Multi-UAV Cooperative Combat[C]∥China Unmanned Aircraft Systems Summit 2008.Beijing,2008:735-739
[11] Wang Gang,Wen Tao,Guo Quan,et al.An Efficient and Secure Group Key Management Scheme in Mobile Ad Hoc Networks[J].Journal of Computer Research and Development,2010,47(5):911-920
[12] Hu Liang,Liu Zhe-li,Sun Tao,et al.Survey of Security on Identity-Based Cryptography[J].Journal of Computer Research and Development,2009,46(9):1537-1548
[13] Shi Rong-hua,Yuan Qian.A secure hierarchical key manage-ment scheme in mobile ad hoc networks[J].Journal of Central South University (Science and Technology),2010,41(1):201-206
[14] Lauter K.The advantages of elliptic curve cryptography forwireless security[J].IEEE Wireless Communications,2004,11(1):62-67

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!