信息网络安全 ›› 2017, Vol. 17 ›› Issue (8): 45-52.doi: 10.3969/j.issn.1671-1122.2017.08.007
收稿日期:2017-06-10
出版日期:2017-08-20
发布日期:2020-05-12
作者简介:作者简介: 周健(1979—),男,安徽, 副教授,博士,主要研究方向为密钥管理、移动网络安全、认知无线电网络等;孙丽艳(1976—),女,内蒙古,副教授, 硕士,主要研究方向为密钥管理、移动网络安全、Ad Hoc网络等;段爱华(1979—) ,女,河北,讲师,硕士,主要研究方向为机器学习、数据挖掘、推荐算法等;施文君(1993—),女,安徽,硕士研究生,主要研究方向为网络路由、深空网络安全、数据挖掘等。
基金资助:
Jian ZHOU1,2(
), Liyan SUN1, Aihua DUAN1, Wenjun SHI1
Received:2017-06-10
Online:2017-08-20
Published:2020-05-12
摘要:
空间自组织网络具有长延时、宽覆盖、受限能力、高速移动等特点,短时间内对网络全部实体身份进行有效认证是一个困难问题。针对这一问题,文章设计了一种随机密钥图结构,证明基于DH协议的具有共边的实体能够相互认证身份。在此基础上提出一种面向分布式网络的身份预配置管理方案,根据网络规模、连通概率、节点度从密钥图中随机获取部分实体认证材料,在保证认证效率的前提下通过提高证书数量缩小秘密值规模,使得和邻居的认证成功概率为大概率事件。
中图分类号:
周健, 孙丽艳, 段爱华, 施文君. 空间自组织网络区域自治身份认证管理方案研究[J]. 信息网络安全, 2017, 17(8): 45-52.
Jian ZHOU, Liyan SUN, Aihua DUAN, Wenjun SHI. Regional Autonomous Identity Authentication Management Scheme for Space Self-organized Networks[J]. Netinfo Security, 2017, 17(8): 45-52.
| [1] | WEBER W J, CESARONE R J,ABRAHAM D S.Transforming the Deep Space Network into the Interplanetary Network[J]. Acta Astronautica, 2006,58(8):411-421. |
| [2] | POSNER E C, STEVENS R.Deep Space Communication-Past, Present, and Future[J].IEEE Communications Magazine, 1984(22):8-21. |
| [3] | WILLIAMSON M.Deep Space Communications[J].IEEE Review, 1998, 44(3):119-122. |
| [4] | DOYLE R,BERNARD D,RIEDEL E,et al.Autonomy and Software Technology on NASA's Deep Space One[J].IEEE Intelligent Systems & Their Applications,1999,14(3):10-15. |
| [5] | CUI P, XU R, ZHU S, et al.State of the Art and Development Trends of On-board Autonomy Technology for Deep Space Explorer[J]. Hangkong Xuebao/acta Aeronautica Et Astronautica Sinica, 2014, 35(1):13-28. |
| [6] | CAMP T, BOLENG J, DAVIES V.A Survey of Mobility Models for Ad-hoc Network Research[J].Wireless Communications and Mobile Computing,2002,2(5):483-502. |
| [7] | HAO Y,HAI Y L,FAN Y,et al.Security in Mobile Ad-hoc Networks: Challenges and Solutions[J]. IEEE Wireless Communications, 2004,11(1):38-47. |
| [8] | SAKHAEE E,JAMALIPOUR A,KATO N.Aeronautical Ad-hoc Networks[C]//IEEE WCNC.Wireless Communications and Networking Conference 2006 , April 3-6,2006,Las Vegas, NV, USA.New York:IEEE,2006, :246-251. |
| [9] | ILKER B,SAHINGOZ O K,SAMIL T.Flying Ad-Hoc Networks (FANETs): a Survey[J]. Ad Hoc Networks, 2013, 11(11):1254-1270. |
| [10] | ARNE B,JOHANNES E,SIMON J,et al.New Generation Sensor Web Enablement[J].Sensors, 2011, 11(3):2652-2699. |
| [11] | SHEN C C,RAJAGOPALAN S,BORKAR G,et al.A Flexible Routing Architecture for Ad-hoc Space Networks[J].Computer Networks the International Journal of Computer & Telecommunications Networking, 2004, 46(3):389-410. |
| [12] | VLADIMIROVA T,WU X,BRIDGES C P.Development of a Satellite Sensor Network for Future Space Missions[C]// IEEE .Aerospace Conference 2008, March 1-8,2008,Big Sky, MT, USA.New York:IEEE ,2008:1-8. |
| [13] | SUN R, GUO J, GILL E K A. Opportunities and Challenges of Wireless Sensor Networks in Space[J].International Astronautical Federation,2010,28(87):517-521. |
| [14] | 王友俊,张红旗,王津,等. 面向任务的网络空间故障定位模型[J]. 信息网络安全,2017(4):61-70. |
| [15] | 马宗峰,辛明瑞,申景诗,等. 分布式集群空间飞行器综述[J].航天器工程,2013,22(1):101-105. |
| [16] | 刘川葆,陈明志, 林伟宁,等. HCE模式下一种基于零知识证明的身份认证方法[J]. 信息网络安全,2017(6):68-74. |
| [17] | BOURKE J,UDREA B,NAYAK M.Pirarucu: The Mars Moon Prospector[C]// IEEE. Aerospace Conference 2016,March 5-12,2016 ,Big Sky, MT, USA.New York:IEEE,2016:1-6. |
| [18] | DRENTSCHEW M,MARSZALEK M,ZEIGER F. Pico-and Nano-satellite Based Mobile Ad-hoc Networks - A Requirements Study[EB/OL].,2017-3-10. |
| [19] | WU W R,LIU W W,JINAG Y P.Development of Deep Space Exploration beyond the Moon[J].Aerospace China, 2011(7): 9-12. |
| [20] | HINCHEY M,Dai Y S, Rouff C A,et al.Modeling for NASA Autonomous Nano-Technology Swarm Missions and Model-Driven Autonomic Computing[C]// IEEE.International Conference on Advanced NETWORKING and Applications,May 21 - 23, 2007 ,Niagara Falls, Ontario, Canada. Washington:IEEE Computer Society ,2007:250-257. |
| [21] | AN J P,JIN S,XU J,et al.Development and Outlook of Deep Space Communication Network Protocol[J].Journal on Communications, 2016, 37(7):50-61. |
| [22] | IVANCIC W D.Security Analysis of DTN Architecture and Bundle Protocol Specification for Space Based Networks[C]// IEEE.Aerospace Conference 2010 IEEE, March 6-13,2010,Big Sky, MT, USA.New York:IEEE, 2010:1-12. |
| [23] | BINDRA H S, SANGAL A L.Considerations and Open Issues in Delay Tolerant Network'S (DTNs) Security[J].Wireless Sensor Network, 2010, 2(8): 645-648. |
| [24] | JIANG C X,WANG X X,WANG J,et al.Security in Space Information Networks[J].IEEE Communications Magazine,2015,53(8):82-88. |
| [25] | BHUTTA N,ANSA G,JOHNSON E,et al.Security Analysis for Delay/Disruption Tolerant Satellite and Sensor Networks[C]// IWSSC 2009.International Workshop on Satellite and Space Communications,september 9-11, 2009,Tuscany, Italy.New York:IEEE, 2009:385-389. |
| [26] | YANG D M,MU D J.Novel Key Management and Authentication Scheme for Ad hoc Space Networks[J].Journal on Communications, 2006,27(8):104-112. |
| [27] | ZHONG Y T,MA J F.Identity Based Group Key Management Scheme for LEO/MEO Double-Layer Space Information Network[J].Journal of Astronautics,2011, 32(7): 1551-1557. |
| [28] | LIU Y C,ZHANG A X,LI J H, et al.An Anonymous Distributed Key Management System Based on CL-PKC for Space Information Network[C]//IEEE. ICC 2016 SAC Satellite and Space Communications, May 22-27,2016 ,Kuala Lumpur, Malaysia.New York:IEEE,2016:1-7. |
| [29] | 杨德明,慕德俊,许钟. Ad hoc空间网络密钥管理与认证方案[J].通信学报,2006,27(8):104-112. |
| [30] | KLAOUDATOU E,KONSTANTINOU E.A Survey on Cluster-Based Group Key Agreement Protocols for WSNs[J].Communications Surveys & Tutorials,2011,13(3):429-442. |
| [31] | SON J H,LEE J S,SEO S W.Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks[J].Wireless Personal Communications,2010, 52(2):359-382. |
| [32] | SEBA H,LAGRAA S,KHEDDOUCI H.Alliance-based Clustering Scheme for Group Key Management in Mobile Ad hoc Networks[J].Journal of Supercomputing, 2012,61(3):481-501. |
| [33] | SEUNG Y,ROBIN K.Composite Key Management for Ad Hoc Networks[C]// IEEE.Proceeding of the First Annual Internationl Conference on Mobile and Ubiquitous Systems: Networking and Services( MobiQuitous 04),August 26,2004,Boston, MA, USA. New York:IEEE,2004:52-61. |
| [34] | FRANK S.The Resurrecting Duckling—What Next?[J].Lecture Notes in Computer Science, 2001, 2133(2001): 204-214. |
| [35] | VENKATESAN S,OLESHCHUK V A,CHELLAPPAN C, et al.Analysis of Key Management Protocols for Social Networks[J].Social Network Analysis and Mining,2016, 6(1):1-16. |
| [36] | CAINI C,CRUICKSHANK H,FARRELL S, et al. Delay- and Disruption-Tolerant Networking (DTN): An Alternative Solution for Future Satellite Networking Applications[EB/OL]. ,2011-10-20. |
| [37] | DRAKAKIS K E, PANAGOPOULOS A D, COTTIS P G.Overview of Satellite Communication Networks Security: Introduction of EAP[J].International Journal of Security and Networks, 2009,4(3):164-170. |
| [38] | LV X,MU Y,LI H.Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs[EB/OL]. ,2013-11-7. |
| [39] | ZHOU J, SONG M, SONG J, et al.Autonomic Group Key Management in Deep Space DTN[J]. Wireless Personal Communications, 2014, 77(1):269-287. |
| [40] | LV X X,LI H.Error-andloss-tolerant Bundle Fragment Authentication for Space DTNs[J]. Frontiers of Computer Science, 2014, 8(6):1012-1023. |
| [41] | BHASIN K,HAYDEN J L.Space Internet Architecture and Technologies for NASA Enterprises[J]. International Journal of Satellite Communications , 2002 ,20(5) : 311-332. |
| [42] | ZHOU J,ZHOU X W.Autonomous Shared Key Management Scheme for Space Networks[J]. Wireless Personal Communications, 2013, 72(4):2425-2443. |
| [43] | DIFFIE W.Hellman"New directions in cryptography"[J]. IEEE Transactions on Information Theory,1976,22(6):644-654. |
| [44] | FENG Bao, ROBERT H Deng, HuaFei Zhu.Variations of Diffie-Hellman Problem[J].Lecture Notes in Computer Science, 2003: 301-312. |
| [45] | GILBERT E N.Random Graphs[J].Annals of Mathematical Statistics, 1959,30(4):1141-1144. |
| [46] | ERDOS P,RENYI A.On random graphs[J].Publications Mathematic, 1959,6(4):290-297. |
| [1] | 刘晓芬, 陈晓峰, 连桂仁, 林崧. 基于d级单粒子的可认证多方量子秘密共享协议[J]. 信息网络安全, 2020, 20(3): 51-55. |
| [2] | 张富友, 王琼霄, 宋利. 基于生物特征识别的统一身份认证系统研究[J]. 信息网络安全, 2019, 19(9): 86-90. |
| [3] | 张顺, 陈张凯, 梁风雨, 石润华. 基于Bell态的量子双向身份认证协议[J]. 信息网络安全, 2019, 19(11): 43-48. |
| [4] | 张敏, 许春香, 黄闽英. 远程医疗环境下面向多服务器的轻量级多因子身份认证协议研究[J]. 信息网络安全, 2019, 19(10): 42-49. |
| [5] | 胡卫, 吴邱涵, 刘胜利, 付伟. 基于国密算法和区块链的移动端安全eID及认证协议设计[J]. 信息网络安全, 2018, 18(7): 7-9. |
| [6] | 游林, 梁家豪. 基于同态加密与生物特征的安全身份认证研究[J]. 信息网络安全, 2018, 18(4): 1-8. |
| [7] | 魏占祯, 王守融, 李兆斌, 李伟隆. 基于OpenFlow的SDN终端接入控制研究[J]. 信息网络安全, 2018, 18(4): 23-31. |
| [8] | 陈付龙, 张紫阳, 王涛春, 谢冬. 一种基于联络信号的物联网安全身份认证方法[J]. 信息网络安全, 2018, 18(11): 40-48. |
| [9] | 孙子文, 李富. 基于HMM与D-S证据理论的手势身份认证方法[J]. 信息网络安全, 2018, 18(10): 17-23. |
| [10] | 亢保元, 王佳强, 邵栋阳, 李春青. 一种适用于异构Ad Hoc无线传感器网络的身份认证与密钥共识协议[J]. 信息网络安全, 2018, 18(1): 23-30. |
| [11] | 武传坤, 张磊, 李江力. 物联网设备信任体系架构与轻量级身份认证方案设计[J]. 信息网络安全, 2017, 17(9): 16-20. |
| [12] | 张曼, 咸鹤群, 张曙光. 基于重力传感器的身份认证技术研究[J]. 信息网络安全, 2017, 17(9): 58-62. |
| [13] | 赵凯利, 李丹仪, 李强, 马存庆. 基于智能移动终端密码模块的身份认证方案实现[J]. 信息网络安全, 2017, 17(9): 107-110. |
| [14] | 刘川葆, 陈明志, 林伟宁, 冯映燕. HCE模式下一种基于零知识证明的身份认证方法[J]. 信息网络安全, 2017, 17(6): 68-74. |
| [15] | 国杰彬, 李运发, 张大军. 云计算中面向数据安全的身份认证策略研究[J]. 信息网络安全, 2017, 17(3): 72-77. |
| 阅读次数 | ||||||
|
全文 |
|
|||||
|
摘要 |
|
|||||