Threshold-based key management scheme for space network

被引:1
|
作者
Tong, Xiaojun [1 ]
Liu, Jie [2 ]
Wang, Zhu [1 ]
Zhang, Miao [1 ]
Ma, Jing [3 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Weihai, Peoples R China
[2] Northwestern Polytech Univ, Sch Software, Xian, Peoples R China
[3] Sci & Technol Informat Assurance Lab, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
bilinear pairing; CCSDS‐ TC; key management; OPNET simulation; AGREEMENT PROTOCOL; SECURE;
D O I
10.1002/dac.4841
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The data link protocols proposed by the Consultative Committee for Space Data Systems (CCSDS) is widely used in space missions. However, the current space key management schemes are inefficient in scalability, security, and key update. In this work, a threshold-based spatial key management scheme is proposed and applied to the CCSDS telecommunication control (TC) protocol to ensure the security of spatial networks. The threshold-based key management algorithm using LDPC code is designed to generate, distribute, update, and deactivate the master key. The bilinear pairing cryptosystem is used to protect the group key and provide authentication. The security and performance of the proposed scheme are analyzed. Furthermore, the network model, node model, and process model of CCSDS-TC protocol based on the proposed scheme are constructed and simulated on OPNET platform. The result shows that the storage overhead of the proposed scheme is lower than the improved Shamir and ECC-based key management schemes. Its computational overhead is approximately changeless, whereas the network scale is increasing. Furthermore, the proposed scheme only uses binary multiplication, which takes lower computation overhead. Therefore, the proposed scheme has higher security, scalability, and low resource consumption.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Threshold-based distributed key management scheme for wireless sensor networks
    Jiang, Y.
    Lin, Z. J.
    [J]. ENERGY SCIENCE AND APPLIED TECHNOLOGY, 2016, : 419 - 423
  • [2] Threshold-based Privacy-Preserving Key Management Scheme for Vehicle-to-Grid Networks
    Tseng, Huei-Ru
    [J]. APPLIED SCIENCE AND PRECISION ENGINEERING INNOVATION, PTS 1 AND 2, 2014, 479-480 : 978 - 982
  • [3] A Centralized Key Management Scheme Based on McEliece PKC for Space Network
    Liu, Jie
    Tong, Xiaojun
    Wang, Zhu
    Zhang, Miao
    Ma, Jing
    [J]. IEEE ACCESS, 2020, 8 : 42708 - 42719
  • [4] Cluster space key management scheme based on threshold secret sharing and bilinear pairing
    Tong, Xiaojun
    Liu, Jie
    Wang, Zhu
    Zhang, Miao
    Chen, Hong
    Ma, Jing
    [J]. INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2021, 39 (06) : 686 - 704
  • [5] Threshold-Based Hybrid Relay Selection Scheme
    Song, Xin
    Zhang, MingLei
    Liu, WenMin
    Liu, Feng
    [J]. PROCEEDINGS OF THE 2016 12TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2016, : 222 - 227
  • [6] Threshold-based network structural dynamics
    Kipouridis, Evangelos
    Spirakis, Paul G.
    Tsichlas, Kostas
    [J]. THEORETICAL COMPUTER SCIENCE, 2023, 944
  • [7] Threshold-based filtering buffer management scheme in a shared buffer packet switch
    Yang, JP
    Liang, MC
    Chu, YS
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2003, 5 (01) : 82 - 89
  • [8] TKGS: Verifiable threshold-based key generation scheme in open wireless ad hoc networks
    Moharrum, M
    Mukkamala, R
    Eltoweissy, M
    [J]. ICCCN 2004: 13TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2004, : 31 - 36
  • [9] A Threshold-based Image Recovery Scheme for Image Publishing
    Wu, Zhen
    Liu, Yining
    Choo, Kim-Kwang Raymond
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (02): : 385 - 393
  • [10] Key Management Scheme Based on (t, n) Threshold Cryptosystem
    Zhou, Xuanwu
    Wei, Ping
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEM AND KNOWLEDGE ENGINEERING, VOLS 1 AND 2, 2008, : 1288 - 1293