期刊文献+

Enabling Space-Air integration:A Satellite-UAV networking authentication scheme 被引量:1

原文传递
导出
摘要 One of the goals of sixth-generation mobile networks(6G)is to achieve a larger network coverage area.Satellite networks enable global coverage and aerial nodes such as Unmanned Aerial Vehicle(UAV)can serve as a supplement to ground networks in remote environments.Therefore,6G networks are gradually evolving towards Space-AirGround integrated networks.The combination of UAV networks and satellite networks is a research hotspot in the field of Space-Air integrated networks.However,the combination of UAV networks and satellite networks currently faces many challenges in terms of security.The characteristics of large propagation delay and unstable communication links in satellite networks make them vulnerable to various attacks,including eavesdropping,tampering,and impersonation.Meanwhile,existing research on UAV networks mainly focuses on UAV-Ground networking authentication mechanisms,which are not suitable for resourceconstrained nodes in the Space-Air integration scenario.Therefore,based on elliptic curve public key cryptography and Chebyshev polynomial,we propose a secure networking authentication scheme for satellite nodes and UAV nodes in the Space-Air integration scenario.The security analysis indicates that our scheme possesses security attributes such as mutual authentication,key agreement,identity anonymity,unlinkability,perfect forward-backward security,and resistance against various protocol attacks,among other security properties.Performance analysis also indicates certain advantages of our scheme over existing schemes in terms of signaling,bandwidth,and computational overhead.
出处 《Security and Safety》 2024年第2期6-24,共19页 一体化安全(英文)
基金 supported by the National Key Research and Development Program of China(No.2022YFB2902203) the National Natural Science Foundation of China(No.62172317,No.62102298) the Fundamental Research Funds for the Central Universities(No.YJSJ23007)
作者简介 Corresponding author:Sheng Li,email:sli_01@stu.xidian.edu.cn,received his B.E.degree in Information security from Xidian University,China,in 2019.He is working toward the Ph.D.degree at the Xidian University,China.His research interests include security authentication for unmanned aerial vehicle(UAV)networking and 5G/6G;Corresponding author:Jin Cao,email:caoj897@gmail.com,received the B.S.and Ph.D.degrees from Xidian University,Xi’an,China,in 2008 and 2015,respectively.Since July 2020,he has been a Professor with the School of Cyber Engineering,Xidian University.His research interests include wireless network security and 5G/6G networks;Xiaoping Shi,received her B.E.degree in Information security from Xidian University,China,in 2020.She is working toward the M.Sc.degree at the Xidian University,China.Her main research directions are 4G/5G networks and spaceground integrated network security authentication mechanisms;Hui Li,received the MA.Sc.and Ph.D.degrees from Xidian University,Xi’an,China,in 1993 and 1998,respectively.Since June 2005,he has been a Professor with the School of Cyber Engineering,Xidian University.His current research interests include cryptography,information theory,and network coding
  • 相关文献

二级参考文献3

共引文献94

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部