期刊文献+

航空嵌入式系统信息安全防护技术研究 被引量:1

Research on Aeronautic Embedded System Security Technology
下载PDF
导出
摘要 未来航空网络空间安全将是影响航空作战体系效能发挥的核心因素。针对航空作战体系云的安全威胁进行分析,构建了主动安全防御体系,利用可信计算的密码学基础,从底层硬件向上构建可信平台,为航空嵌入式信息处理系统提供多级安全防护机制,通过安全通信机制实现机间安全互联,从而构建航空作战体系的安全体系架构,为未来航空体系化作战提供网络空间的安全防护机制。 Cyberspace security is the critical element that impacting the efficiency of the aeronautic combatting system in the future.The security threats of the combatting cloud for aviation are analysed in this paper.Afterwards,based on the trust computing technology,the security architecture of aviation cyberspace is presented,which includes the trust computing platform,multiple independent levels of security and safety software environment,and the secure communication between airplanes.This architecture supports the active protecting mechanism for the systematism combatting in the aviation system.
作者 李亚晖 王中华 LI Ya-hui;WANG Zhong-hua(Aviation Key Laboratory of Science and Technology on Airborne and Missile-borne Computer,Xi'an Aeronautics Computing Technique Research Institute,AVIC,Xi'an 710065,China)
出处 《航空计算技术》 2020年第1期114-118,共5页 Aeronautical Computing Technique
基金 航空科学基金项目资助(2017ZC31008).
关键词 网络空间安全 安全体系架构 可信计算 安全通信 cyberspace security security architecture trust computing secure communication
  • 相关文献

参考文献7

二级参考文献128

  • 1田野,张玉军,李忠诚.使用对技术的基于身份密码学研究综述[J].计算机研究与发展,2006,43(10):1810-1819. 被引量:16
  • 2胡华平,胡光明,董攀,陈新.大规模移动自组网络安全技术综述[J].计算机研究与发展,2007,44(4):545-552. 被引量:13
  • 3Diffie W, Hellman M E. New directrions in cryptography [J]. IEEE Trans on Information Theory, 1976, 22(6) : 644- 654.
  • 4Rivest R L, Shamir A, Adelman L. A method for obtaining digital signatures and public key cryptosystem [J]. Communications of ACM, 1987, 21(2):120-126.
  • 5ElCamal T. A public key cryptosystem and a signature scheme based on discrete logarithms [J]. IEEE Trans on Information Theory. 1985, 31(4): 469-472.
  • 6Miller V. Use of elliptic curves in cryptography [G] //LNCS 216: Proc of the Advances in Cryptology--Crypto'85. Berlin: Springer, 1985:417-426.
  • 7Koblitz N. Elliptic curve cryptosystems [J]. Mathematics of Computation. 1987, 48(177): 203-209.
  • 8Goldwasser S, Mieali S. Probabilistie encryption[J]. Journal of Computer and System Sciences, 1984, 28 (2) : 270-299.
  • 9Micali S, Rackoff C, Sloan R. The notion of security for probabitistic cryptosystems [J]. SlAM Journal on Computing, 1988, 17(2) : 412-426.
  • 10Dolev D, Dwork C, Naor M. Non-malleable cryptography [J]//Proc of the 23rd Annual Syrup on Theory of Computing (STOC'91). New York: ACM, 1991:542-552.

共引文献37

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部