期刊文献+

卫星网络密钥管理模型设计与仿真 被引量:4

Design and Simulation of Key Management Model for Satellite Networks
下载PDF
导出
摘要 密钥管理系统为网络中的各节点提供密钥的分配和更新服务,是实施网络安全服务,保证信息安全的基础。针对卫星网络的结构和通信特点,设计了一种新的包含会话密钥、主密钥和公钥的密钥管理模型。首先,设计了公钥更新协议,并对其安全性进行了分析;其次,通过对比分析,对会话密钥更新和主密钥更新的策略进行了设计,并对其安全性以及效率进行了详细分析。最后,在卫星网络仿真环境下实现了密钥更新过程。结合仿真测试数据,与IBM混合密钥管理模型进行比较,并给出了设计密钥更新策略时的重要参考依据。 Key management system is in charge of key distribution and updating services for the networks. It is fundamental in providing secure services and ensuring information security. Based on the structure and communication features of satellite networks, a key management model was proposed which includes certificates, primary keys and session keys. Firstly, a protocol was designed for updating certificates of satellites and its security was studied. Secondly, a policy was designed for updating primary and session keys and its efficiency and security were analyzed by contrasts with other options. Lastly, the key updating processes were implemented under simulated satellite network environment. Based on test data, further contrast between our model and IBM's hybrid key management model was proposed and important suggestions in designing key updating policies were given.
出处 《系统仿真学报》 CAS CSCD 北大核心 2009年第13期4153-4158,共6页 Journal of System Simulation
基金 中国科学院支撑技术项目 中国科学院创新基金项目(CXJJ-251)
关键词 卫星网络 密钥管理 模型 协议 仿真 satellite networks key management model protocol simulation
  • 相关文献

参考文献15

  • 1CCSDS. Security Threats Against Space Missions [R]. Washington, USA: CCSDS, 2006: 350.1-G-1.
  • 2A Roy-Chowdhury, J S Baras, M Hadjitheodosiou, et al. Security Issues in Hybrid Networks with a Satellite Component [J]. IEEE Wireless Communications (S1536-1284), 2005, 12(6): 50-61.
  • 3H S Cruickshank A Security System for Satellite Networks [C]//Fifth International Conference on Satellite Systems for Mobile Communications and Navigation, London, UK. USA: IEE, 1996: 187-190.
  • 4Tanya Vladimirova, Roohi Banu, Martin N Sweeting. On-Board Security Services in Small Satellites [C]// MAPLD International Conference. Washington, USA: NASA Office of Logic Design, 2005.
  • 5J Kohl, C Neuman. The Kerberos Network Authentication Service (V5), RFC 1510, 1993. [EB/OL]. (1993) [2009]. http ://www.iet f.org/r fc/rfc 1510.txt.
  • 6V Le, S M Matyas, D B Johnson, J D Wilkins. A Public Key Extension to the Common Cryptographic Architecture [J]. IBM System Journal (S0018-8670), 1993, 32(3): 461-485.
  • 7B C Neuman, S G Stubblebine. A Note on the Use of Timestamps as Nonces [J]. ACM Operating Systems Reviews (S0163-5980), 1993, 27(2): 10-14.
  • 8Philippe Janson, Gene Tsudik. Secure and Minimal Protocols for Authenticated Key Distribution [J]. Computer Communications (S0140-3664), 1995, 18(9): 645-653.
  • 9C Boyd, A Mathuria. Key Establishment Protocols for Secure Mobile Communication: a Selective Survey [J]. Lecture Notes in Computer Science (S0302-9743), 1998, Vol. 1438: 344-355.
  • 10J Schaad, M Myers. Public-Key Infrastructure (X.509), IETF, PKIX 2797. [EB/OL]. (2008) [2009].www.iet f.org/html.charters/pkix-charter.html.

二级参考文献18

共引文献8

同被引文献35

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部