吉林大学学报(工学版) ›› 2012, Vol. 42 ›› Issue (02): 440-445.

• 论文 • 上一篇    下一篇

空间信息网基于证书的混合式公钥基础设施

任方, 马建峰, 郝选文   

  1. 西安电子科技大学 计算机网络与信息安全教育部重点实验室, 西安 710071
  • 收稿日期:2011-04-15 出版日期:2012-03-01 发布日期:2012-03-01
  • 作者简介:任方(1981-),男,博士研究生.研究方向:密码学与信息安全.E-mail:renfang_81@163.com
  • 基金资助:

    国家自然科学基金项目(60872041);中央高校基本科研业务费专项资金项目(JY10000903001).

Certificate-based hybrid public key infrastructure for space information networks

REN Fang, MA Jian-feng, HAO Xuan-wen   

  1. Ministry of Education Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an 710071, China
  • Received:2011-04-15 Online:2012-03-01 Published:2012-03-01

摘要: 考察了由卫星和接入节点所构成的分层式空间信息网模型,首次提出了一种适用于该网络模型的基于证书的公钥基础设施。该模型中作为核心网络的卫星层采用分布式CA管理证书,而其他节点作为接入节点,其证书管理采用集中式CA。该模型具有很强的可扩展性和一定的安全性,适用于空间信息网复杂而多变的环境。

关键词: 计算机应用, 空间信息网, 公钥基础设施, 证书, RSA算法, 签名

Abstract: With the development of space communication technologies, security issues in space information networks become increasingly important. However, there has been no good solution to this problem in satellite networks. This paper investigates the layered model of space information networks, which consist of satellites and access nodes; and proposes a certificate-based public key infrastructure suitable for the this model. In this model, the Certificate Management of satellite layer uses distributed CA, and the Certificate Management of other nodes (as access nodes) uses centralized CA. The proposed mode is highly scalable and has a certain degree of safety. So it is applicable to the complex and changeable environment in space information networks.

Key words: computer application, space information networks, public key infrastructure, certificate, RSA algorithm, signature

中图分类号: 

  • TP393.08
[1] Akyildiz I F, Ekici E, Bender M D. MLSR: a novel routing algorithm for multilayered satellite IP networks[J]. IEEE/ACM Transactions on Networking, 2002, 10(3): 411-424.

[2] Ercetin O, Ball M O, Tassiulas L. Next generation satellite systems for aeronautical communications[J]. International Journal of Satellite Communications and Networking, 2004, 22:157-179.

[3] Chen C, Ekici E, Akyildiz I F. Satellite grouping and routing protocol for LEO/MEO satellite IP networks//Proceedings of the 5th ACM International Workshop on Wireless Mobile Multimedia, New York, 2002.

[4] Liang L, Iyengar S, Cruickshank H, et al. Security for FLUTE over satellite networks//WRI International Conference on Communications and Mobile Computing, Kunming, China, 2009.

[5] Hu Yu-rong, Li V O K. Satellite-based internet: a tutorial[J]. IEEE Communications Magazine,2001, 39(3):154-162.

[6] Chowdhury A R, Baras J S. A lightweight certificate-based source authentication protocol for group communications in hybrid wireless/satellite networks//IEEE GLOBECOM, New Orleans, LO, 2008.

[7] 毛文波. 现代密码学理论与实践[M]. 北京:电子工业出版社, 2004.

[8] Cruickshank H S. A security system for satellite networks//Fifth International Conference on Satellite Systems for Mobile Communications and Navigation, London, UK, 1996.

[9] Zhou Li-dong, Haas Z J. Securing Ad Hoc networks[J]. IEEE Networks Special Issue on Network Security, 1999, 13 (6):24-30.

[10] Kong Jie-jun, Zerfos Petros, Luo Hai-jun, et al. Providing robust and ubiquitous security support for mobile Ad Hoc networks//IEEE 9th International Conference on Network Protocols(ICNP'01), Riverside, California, 2001.

[11] Luo Hai-yun, Zerfos Petros, Kong Jie-jun, et al. Self-securing Ad Hoc wireless networks//Proceeding of the 7th IEEE Symposiumon Computers and Communications(ISCC'02), Italy, 2002:567-574.

[12] Claude C, Carlton R D. A certificate revocation scheme for wireless Ad Hoc networks//Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, New York, 2003.

[13] Geneviève A, Claude C, Carlton R D. A localized certificate revocation scheme for mobile ad hoc networks. Ad Hoc Networks (2006). doi:10.1016/j.adhoc.2006.07.003.

[14] Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.

[15] Desmedt Y, Frankel Y. Threshold cryptosystems// Advances in Cryptology.Berlin:Springer,1989.
[1] 刘富,宗宇轩,康冰,张益萌,林彩霞,赵宏伟. 基于优化纹理特征的手背静脉识别系统[J]. 吉林大学学报(工学版), 2018, 48(6): 1844-1850.
[2] 王利民,刘洋,孙铭会,李美慧. 基于Markov blanket的无约束型K阶贝叶斯集成分类模型[J]. 吉林大学学报(工学版), 2018, 48(6): 1851-1858.
[3] 金顺福,王宝帅,郝闪闪,贾晓光,霍占强. 基于备用虚拟机同步休眠的云数据中心节能策略及性能[J]. 吉林大学学报(工学版), 2018, 48(6): 1859-1866.
[4] 赵东,孙明玉,朱金龙,于繁华,刘光洁,陈慧灵. 结合粒子群和单纯形的改进飞蛾优化算法[J]. 吉林大学学报(工学版), 2018, 48(6): 1867-1872.
[5] 刘恩泽,吴文福. 基于机器视觉的农作物表面多特征决策融合病变判断算法[J]. 吉林大学学报(工学版), 2018, 48(6): 1873-1878.
[6] 欧阳丹彤, 范琪. 子句级别语境感知的开放信息抽取方法[J]. 吉林大学学报(工学版), 2018, 48(5): 1563-1570.
[7] 刘富, 兰旭腾, 侯涛, 康冰, 刘云, 林彩霞. 基于优化k-mer频率的宏基因组聚类方法[J]. 吉林大学学报(工学版), 2018, 48(5): 1593-1599.
[8] 桂春, 黄旺星. 基于改进的标签传播算法的网络聚类方法[J]. 吉林大学学报(工学版), 2018, 48(5): 1600-1605.
[9] 刘元宁, 刘帅, 朱晓冬, 陈一浩, 郑少阁, 沈椿壮. 基于高斯拉普拉斯算子与自适应优化伽柏滤波的虹膜识别[J]. 吉林大学学报(工学版), 2018, 48(5): 1606-1613.
[10] 车翔玖, 王利, 郭晓新. 基于多尺度特征融合的边界检测算法[J]. 吉林大学学报(工学版), 2018, 48(5): 1621-1628.
[11] 赵宏伟, 刘宇琦, 董立岩, 王玉, 刘陪. 智能交通混合动态路径优化算法[J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] 黄辉, 冯西安, 魏燕, 许驰, 陈慧灵. 基于增强核极限学习机的专业选择智能系统[J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] 傅文博, 张杰, 陈永乐. 物联网环境下抵抗路由欺骗攻击的网络拓扑发现算法[J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] 曹洁, 苏哲, 李晓旭. 基于Corr-LDA模型的图像标注方法[J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] 侯永宏, 王利伟, 邢家明. 基于HTTP的动态自适应流媒体传输算法[J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!