期刊文献+

BDSec:Security Authentication Protocol for BeiDou-Ⅱ Civil Navigation Message

下载PDF
导出
摘要 Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV.
出处 《China Communications》 SCIE CSCD 2024年第6期206-218,共13页 中国通信(英文版)
基金 supported in part by the National Key R&D Program of China(No.2022YFB3904503) National Natural Science Foundation of China(No.62172418) the joint funds of National Natural Science Foundation of China and Civil Aviation Administration of China(No.U2133203).
  • 相关文献

参考文献9

二级参考文献51

  • 1张翰林,张国定,刘宝.对现代化GPS的欺骗式干扰研究[J].光盘技术,2006(4):36-38. 被引量:3
  • 2刘延斌,苏五星,闫抒升.转发式欺骗信号干扰GPS接收机的效能分析[J].空军雷达学院学报,2004,18(4):4-6. 被引量:22
  • 3李鹤峰,党亚民,秘金钟,薛树强.北斗卫星导航系统的发展、优势及建议[J].导航定位学报,2013,1(2):49-54. 被引量:27
  • 4张建军.信息战环境中通信对抗的发展趋势[J].通信对抗,2004(3):19-22. 被引量:1
  • 5Ian Foster,Yong Zhao.Cloud computing and grid computing 360-degree compared[C].2008 Grid Computing Environments Workshop,IEEE,Austin,Texas,12-16,2008,1-10.
  • 6Rajkumar Buyya,Chee Shin Yeo,Srikumar Venugopal.Market-oriented cloud computing:vision,hype,and reality for delivering IT services as computing utilities[C].Proc.of 10th IEEE Conference on HPCC'08,IEEE,Dalian,China,25-27 Sept.2008,5-13.
  • 7OASIS Standard.Web services security:SOAP message security1.1(WS-Security 2004)[EB/OL].http://does.oasis-open.org/wss/v1.1/.1 February 2006.
  • 8Wang Lv.Security model and specifications for web services[C].China Education INFO,2004,10,24-26.
  • 9OASIS Standard.Assertions and protocols for the OASIS security assertion markup language(SAML)V2.0[EB/OL].http://docs.oasis-open.org/security/saml/v2.0/,2005-03.
  • 10W3C Recommendation.XML key management specification(XKMS2.0)[EB/OL].http://www.w3.org/TR/2002/RECxmlenc-core-20021210/,2002-12-10.

共引文献52

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部