Computer Science ›› 2013, Vol. 40 ›› Issue (4): 160-163.

Previous Articles     Next Articles

New Near Space Security Handoff Scheme Based on Context Transfer

XU Guo-yu,CHEN Xing-yuan and DU Xue-hui   

  • Online:2018-11-16 Published:2018-11-16

Abstract: To solve the problem of security handoff in near space,a new security handoff scheme based on context transfer was proposed.Firstly,a handoff destination estimate algorithm was designed,which is based on the Doppler shift mechanism that can estimate the handoff time and location.Secondly,the previous base-station sent authentication message to the next based-station in advance based on context transfer,which can increase handoff efficiency.Performance analysis and simulation results show that the communication and computation overhead of the scheme are small,and the forced termination probability is low.The scheme is suitable for the application of near space.

Key words: Near space,Security handoff,Context transfer,Doppler shift

[1] Tomme L C E B,Phil D.The Paradigm Shift to Effects-Based Space:Near-Space as a Combat Space Effects Enabler[R].Airpower research institute,2005
[2] 聂万胜,罗世彬,丰松江,等.近空间飞行器关键技术及其发展趋势分析[J].国防科技大学学报,2012,4(2):107-113
[3] 钱雁斌,陈性元,杜学绘.临近空间网络安全切换机制研究[J].计算机工程与应用,2008,4(15).18-21
[4] Qian Yan-bin,Chen Xing-yuan,Du Xue-hui.A Security Context Transfer Method for Integrated space network[C]∥2008International Symposium on Information Science and Engieering.2008:276-280
[5] 彭长艳.空间网络安全关键技术研究[D].长沙:国防科学技术大学,2010
[6] Papapetrou E,Pavlidou R N.QoS handover management inLEO/MEO satellite systems[J].IEEE Transactions on Communications,2003,46(3):309-313
[7] Papapetrou E,Pavlidou F-N.Analytic Study of Doppler-basedHandover Management in LEO Satellite Systems[J].IEEE Transactions on Aerospace and Electronic Systems,2005,1(3):830-839
[8] 陈炳才,韩亚萍,郭黎利,等.低轨卫星网络支持飞机用户的切换管理算法[J].计算机应用,2009,9(8)
[9] Loughney J,Nakhjiri M,Perkins C,et al.Context tranfer protocol[M].Internet-Draft,August 2004
[10] Jin Zheng-ping,Zuo Hui-juan,Du Hong-zhen,et al.An Efficient and Provably-Secure Identity-Based Signcryption Scheme for Multiple PKGs[C]∥Proceedings of the International Confe-rence on Computer Science and Information Technology.Singapore,2008:189-193

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!