期刊文献+

基于CCSDS的空间网络跨层安全接入研究 被引量:4

Research of Layered Secure Access for Space Network Based on CCSDS
下载PDF
导出
摘要 针对高度开放、拓扑多变的空间网络容易受到各种类型的攻击,仅在某一单独层次实施安全防护不能满足空间网络高等级的安全需求的问题,在深入分析CCSDS尤其是数据链路层AOS协议特点的基础上,提出一种空间网络跨层安全接入机制,在网络层和数据链路层建立一体化防护体系,探讨CCSDS协议体系下的实现方式,当对已认证节点信任发生变化时能进行自动调整和恢复,有效提高空间网络移动接入的安全性、适应性及接入性能。 Due to the open nature and the frequent network topology changes, space network is vulnerable to various attacks. It can not satisfy higher levels of security requirements of the space network that just implement protection in only one protocol layer. This paper analyzes thoroughly characteristic of CCSDS in particular in the data link layer Advanced Orbiting Systems(AOS) protocol, and proposes the layered secure accessmodel mechanism at the data link and network layers, expecting that it can establish integration access protection system. This paper also discusses the realization way under the CCSDS protocol system. When the trust to certain node that is authenticated changed, the mechanism proposed can automatic reaction in time, and enhance the security, the compatibility and performance of secure access.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第12期125-127,130,共4页 Computer Engineering
基金 国家"863"计划基金资助项目(2006AA701416 2007AA701309)
关键词 空间网络 跨层安全接入 高级在轨系统 space network layered secure access Advanced Orbiting Systems(AOS)
  • 相关文献

参考文献6

二级参考文献25

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 3CCSDS 100.0-G-1,Telemetry Summary of Concept and Rationale[M].Green Book,1987.
  • 4CCSDS 200.0-G-6.Telecommand Summary of Concept and Rationale[M].Green Book,1987.
  • 5CCSDS. Next Generation Space Internet (NGSI). CCSDS 733.0-G-1, Green Book, Issue 1, April, 2003.
  • 6CCSDS. Space Communications Protocol Specification (SCPS) -Security Protocol (SCPS-SP). CCSDS 713.5-B1,Blue Book, Issue 1, May 1999.
  • 7CCSDS. Next Generation Space Internet (NGSI) -End-to-End Security for Space Mission Communications.CCSDS 733.5 -O-1, Experimental Specification, April, 2003.
  • 8CCSDS. The Application of CCSDS Protocols to Secure Systems. CCSDS 350.0-G-1, Green Book, Issuel, March,1999.
  • 9Lee Hyun-Woo,Kim Kwihoon,Ryu Won,Lee Byung-Sun.Performance of an efficient performing authentication to obtain access to public wireless LAN with a cache table//Proceedings of the IEEE International Conference on Communications (ICC'06).Istanbul,2006:2376-2381.
  • 10Arun Saha.Mart molle thinking outside the box:Extending 802.1x authentication to remote “Splitter” ports by combining physical and data link layer techniques//Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks (LCN'03).Germany,2003:324-333.

共引文献21

同被引文献20

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部