Computer Science ›› 2015, Vol. 42 ›› Issue (12): 229-232.

Previous Articles     Next Articles

Efficient and Secure Communication Scheme for Deep Space Networks

REN Fang and ZHENG Dong   

  • Online:2018-11-14 Published:2018-11-14

Abstract: The secure deep space communication network is one of the most important aspects in deep space exploration.A deep space network architecture based on satellites networks was proposed and an efficient and secure communication scheme for this architecture was studied.In this scheme,the attribute-based encryption algorithms are used to achieve secure data transmission in deep space networks.The deep space node chooses a set of attributes for data to be transmitted and encrypts it with private keys corresponding to the attributes and a user can decrypt the cipher if and onlyif the attributes set satisfies the access tree user holds.There is no need for the node and the user to authenticate the identity of each other,so the numbers of information exchange are greatly reduced.The scheme is suitable for deep space networks in order to make up the deficiency of costly data transmission.

Key words: Deep space networks,Security systems,Communication,Public key cryptography,Attributes

[1] 欧阳自远,李春来,邹永廖,等.深空探测的进展与我国深空探测的发展战略[J].中国航天,2002(12):28-32 Ouyang Z Y,Li C L,Zou Y L,et al.Advances in deep space exploration and the development strategy of China’s deep space exploration [J].Aerospace China,2002(12):28-32
[2] 姜昌,黄宇民,胡勇.研究与开发天基深空通信跟踪(C&T)网的倡议[J].飞行器测控学报,1999,8(4):28-37 Jiang C,Huang Y M,Hu Y.An initiative of research and development of space-based communications and tracking(C&T) network [J].Journal of Spacecraft TT&C Technology,1999,8(4):28-37
[3] Hooke A.The interplanetary internet [J].Communication of the ACM,2001,4(9):38-40
[4] Akyildiz I F,Akan  B,Chen C,et al.Interplanetary internet:state-of-the-art and research challenges [J].Computer Networks,2003,3(2):75-112
[5] Bhasin K,Hayden J L.Space Internet architecture and technologies for NASA enterprises [J].International Journal of Satellite Communications,2002,20(5):311-332
[6] Mukherjee J,Ramamurthy B.Communication technologies and architectures for space network and interplanetary internet [J].IEEE Communications Surveys & Tutorials,2013,15(2):881-897
[7] Sodnik Z,Furch B,Lutz H.Optical intersatellite communication [J].IEEE Journal of Selected Topics in Quantum Electronics,2010,6(5):1051-1057
[8] Marchese M.Interplanetary and pervasive communications [J].IEEE Aerospace and Electronic Systems Magazine,2011,6(2):12-18
[9] 林闯,董扬威,单志广.基于 DTN 的空间网络互联服务研究综述[J].计算机研究与发展,2014,51(5):931-943 Lin C,Dong Y W,Shan Z G.Research on space internetworking service based on DTN [J].Journal of Computer Research and Development,2014,51(5):931-943
[10] Wenbo M.Modern cryptography:theory and practice [M].Prentice Hall PTR,2004
[11] Shamir A.Identity-based cryptosystems and signature schemes[C]∥Advances in Cryptology-Crypto’84.Berlin:Springer-Verlag,1984:47-53
[12] Boneh D,Franklin M.Identity-based encryption from the weil pairing[C]∥Advances in Cryptology-Crypto 2001.Berlin:Springer-Verlag,2001:213-229
[13] 郝云芳,吴静,王立炜.Boneh-Boyen_1 基于身份加密体制的安全密钥分发[J].计算机科学,2012,39(Z6):35-37 Hao Y F,Wu J,Wang L W.Secure key issuing for Boneh-Boyen1 identity-based encryption [J].Computer Science,2012,39(Z6):35-37
[14] Sahai A,Waters B.Fuzzy identity based encryption[C]∥Advances in Cryptology-EUROCRYPT 2005.Berlin:Springer-Verlag,2005:457-473
[15] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]∥ACM conference on Computer and Communications Security.Alexandria,USA:ACM Press,2006:89-98
[16] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]∥Proceedings of IEEE Symposium on Security and Privacy.Oakland,USA:IEEE Computer Society,2007:321-334
[17] Lewko A,Waters B.Decentralizing attributed-based encryption[C]∥Advances in Cryptology-EUROCRYPT 2011.Berlin:Springer-Verlag,2011:568-588
[18] Zhang Guo-yan,Liu Lei,Liu Yang.An attribute-based encryption scheme secure against malicious KGC[C]∥IEEE 11th International Conference on Trust,Security and Privacy in Computing and Communications.Liverpool,UK:IEEE Computer Society,2012:1376-1380
[19] 陈燕俐,杜英杰,杨庚.一种高效的基于属性的认证密钥协商协议[J].计算机科学,2014,41(4):150-154,7 Chen Y L,Du Y J,Yang G.Efficient attribute based authenticated key agreement protocol [J].Computer Science,2014,41(4):150-154,7

No related articles found!
Full text



No Suggested Reading articles found!