期刊文献+

基于区块链的无人机网络跨域身份认证研究

Research on cross-domain identity authentication of unmanned aerial vehicle network based on blockchain
下载PDF
导出
摘要 传统的无人机跨域身份认证的方案大多依赖公钥基础设施(public key infrastructure,PKI)。该模型高度依赖于可信第三方,易造成单点故障且认证效率低下。据此,提出基于区块链的无人机网络跨域身份认证协议方案,该方案不但可以有效实现无人机的跨域认证,且可以改善传统基于PKI模型面临的诸多安全问题。同时,为了实现无人机网络跨域认证的隐私保护,提出了可实现无人机跨域身份认证身份标识的匿名化的方法。安全性分析与仿真实验的结果表明,该方案不但可抵御常见网络攻击,在认证效率和时间开销上也有明显提升。 Most traditional drone cross-domain authentication schemes rely on PKI,which are highly dependent on trusted third parties and prone to single points of failure and low authentication efficiency.Accordingly,this paper proposed a blockchain-based UAV network cross-domain identity authentication protocol scheme,which not only effectively realized the cross-domain authentication of UAVs,but also improved many security problems faced by the traditional PKI-based model.At the same time,to discover the privacy protection of UAV network cross-domain authentication,this paper proposed a method to anonymize the UAV cross-domain identity authentication identity.The results of security analysis and simulation experiments show that the scheme can not only resist common network attacks,but also significantly improve authentication efficiency and reduce time overhead.
作者 张楦杰 张敏 刘韬 张宇航 Zhang Xuanjie;Zhang Min;Liu Tao;Zhang Yuhang(School of Computer Science&Engineer,Southwest Minzu University,Chengdu 610225,China)
出处 《计算机应用研究》 CSCD 北大核心 2024年第7期1959-1964,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(62171390) 西南民族大学中央高校专项资金优秀学生培养工程项目(2022NYXXS059)。
关键词 公钥基础设施 无人机网络 可信第三方 区块链 跨域身份认证 隐私保护 PKI UAV trusted third parties blockchain cross-domain identity authentication privacy protection
  • 相关文献

参考文献5

二级参考文献29

  • 1彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 2LI Fa-gen, HU Yu-pu, ZHANG Chuan-rong. An 'identity-based signcryption scheme for multi-domain Ad hoc networks [ C ]//Lecture Notes in Computer Science, vol 4521. 2007:373-384.
  • 3LI Fa-gen, SHIRASE M, TAKAGI T. Efficient muhi-PKG ID-based signcryption for Ad hoc networks [ C ]//Lecture Notes in Computer Science, vol 5487. 2009:289-304.
  • 4CHEN L,KUDLA C. Identity based authenticated key agreement protocols from pairings [ C ]//Proc of the 16th IEEE Computer Security Foundations Workshop. 2003:219-233.
  • 5LEE H, KIM D, KIM S, et al. Identity-based key agreement protocols in a multiple PKG environment [ C ]//Lecture Notes in Computer Sci ence, vol 3783. 2005:877-886.
  • 6KIM S,LEE H, OH H. Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment [ C ]// Lecture Notes in Computer Science, vol 3783. 2005:323-335.
  • 7ABADI M, FOURNET C. Mobile values, new names and secure communication[ C ]//Proc of the 28th ACM Symposium on Principles of Programming Languages. 2001:104-115.
  • 8ABADI M, BLANCHET B, FOURNET C. Just fast keying in the Pi calculus [ J]. ACM Trans on Information and system Security, 2007,10(3) :1-54.
  • 9韩明奎.密钥交换协议的形式化分析及其应用[D].西安:西安通信学院,2010.
  • 10杜春来,胡铭曾,张宏莉.在椭圆曲线域中基于身份认证的移动ad hoc密钥管理框架[J].通信学报,2007,28(12):53-59. 被引量:20

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部