期刊文献+

基于容迟网络路由的航天测控网量子密钥分配 被引量:1

Quantum Key Distribution in TT&C Network based on Delay Tolerant Network Routing
下载PDF
导出
摘要 为提高航天测控网通信的安全性,本文将量子密钥分配技术应用于分布式航天测控网,并采用容迟网络路由策略来传递量子密钥。首先在地面站和航天器之间建立量子密钥分配系统,生成并共享密钥;随后以行进中的航天器为中介,逐段加密传送密钥;最终可使两个地面站共享量子密钥,保证信息传输的绝对安全。考虑到容迟网络的特点,本文对传染病路由算法进行改进,并应用于密钥传递过程。仿真结果表明,上述密钥分配机制可有效提高航天测控网通信的性能。 To improve the communication security of TTSK: network, this paper presents an application model of quantum key distribution technology in distributed aerospace TT&C network with the method of delay tolerant network. It sets up the quantum key distribution system between ground station and spacecraft, and uses spacecraft to encrypt the key and transmit it as an agency to make two ground stations get shared key safely. The shared key is used to encrypt the information in public channel to keep it safe. In the process of transmitting shared key, in view of the characteristic of delay tolerant network, this paper has improved the epidemic routing algorithm and simulated it. The result shows that the efficiency of epidemic routing algorithm after improved has increased substantially.
出处 《沈阳航空航天大学学报》 2011年第1期51-55,共5页 Journal of Shenyang Aerospace University
基金 航空基金项目(项目编号:2007ZC54002)
关键词 航天测控网 量子密钥分配 容迟网络路由 TTS&C network quantum key distribution delay tolerant network routing
  • 相关文献

参考文献5

二级参考文献76

  • 1朱洪俊,韩立.基于OSI模型的测控网络技术[J].振动.测试与诊断,2000,20(z1):8-12. 被引量:1
  • 2苗二龙,莫小范,桂有珍,韩正甫,郭光灿.相位调制自由空间量子密钥分配[J].物理学报,2004,53(7):2123-2126. 被引量:18
  • 3王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:672
  • 4拱长青,赵志刚,王光兴.LEO卫星网络中TCP Vegas拥塞控制算法研究[J].小型微型计算机系统,2006,27(1):54-57. 被引量:4
  • 5Rabacy J J,Ammer M J,da Silva Jr. J L,et al. Picorodio supports ad hoe ultra-low power wireless networking[J]. Computer, July 2000,33(7):42-48.
  • 6Loukas Lazos,Radha Poovendran. SeRLoc: robust localization for wireless sensor networks[J]. ACM Transactions on Sensor Networks, August 2005,1 (1) : 73-100.
  • 7Perrig A, Szewczyk R, Wen V,et al. Spins: security protocols for sensor network[C]. Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), Rome, Italy, July 2001, 189-199.
  • 8Karlof C, Sastry N, Wagner D. TinySec: a link layer security architecture for wireless sensor networks[J]. ACM SensSys' 04, Baltimore. MD,USA,Nov. 2004,162-175.
  • 9Hu Y C, Perrig A, Johnson D B. Packet leashes: a defense against wormhole attacks in wireless networks[C]. Proc. Infocom, San Francisco, CA, Apr. 2003, 1976-1986.
  • 10Li Z, Trappe W, Zhang Y,et al. Robust statistical methods for securing wireless localization in sensor networks[C]. Proc. Int. Conf. Inf. Process, Sensor Networks, Los Angeles California, USA,2005, 91-98.

共引文献51

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部