期刊文献+

一种基于量子密码的卫星网络窃听攻击检测方法 被引量:2

Method for Detecting Wiretapping Attack in Satellite Network Based on Quantum Cryptography
下载PDF
导出
摘要 鉴于窃听攻击是对卫星网络实施各类高级攻击行为的基础,结合量子密码在未来卫星网络的应用趋势,提出了一种基于量子密码的卫星网络窃听攻击检测方法。首先,基于卫星网络节点在空间分布上的分层特点,构建了层簇式的卫星网络窃听攻击检测模型。实际检测过程中,相邻卫星节点检测到窃听攻击威胁时,将相关预警信息经簇首节点融合后通过安全信道传送到地面控制中心,随后再根据地面控制中心反馈的安全链路构建方案构建节点间的安全通信链路。最后,对方案的安全性及有效性进行了分析。相关成果可为进一步深入开展卫星网络安全防护技术研究打下一定的基础。 The wiretapping attack is the foundation of many advanced attacks on satellite network. Since quantum cryp- tography will be widely used in satellite network, a method for detecting wiretapping attack in satellite network based on quantum cryptography was proposed. Based on the spatial distributions of the satellites, a layered and clustering wiretapping attack detection model was presented at first. During the process of wiretapping attack detection, when the neighboring satellites detect a wiretapping attack in their channel, the corresponding alarm messages will be first sent to the head node of their cluster through secure channels. At the same time, the corresponding alarm messages will be fur- ther fused and sent to the ground control center by the head node. The secure link of two satellites will be established according to the secure link establishing scheme from the ground control center. Eventually, the security and the effectiveness of the proposed method were analyzed. The proposed method can lay a foundation for further research on the techniques of satellite network protection.
出处 《计算机科学》 CSCD 北大核心 2016年第7期157-161,共5页 Computer Science
基金 国家自然科学基金(61272491 61309021 61472357 61571063)资助
关键词 卫星网络 量子密码 窃听攻击 分簇 Satellite network, Quantum cryptography, Wiretapping attack, Clustering
  • 相关文献

参考文献7

二级参考文献61

  • 1蒋小刚,周贤伟,郑连存,杨军.TGDH协议的分析与实现[J].计算技术与自动化,2005,24(3):66-68. 被引量:1
  • 2[1]H Bennett,G Brassard,A K Ekert.Quantum Cryptography[J]. Scientific American,1992,267(4):26-33.
  • 3[2]J Blow,S J D Phoenix.On a fundamental theorem of quantum cry ptography[J].J.of Mod.Opt,1993,[ STHZ 40(1):33-36.
  • 4[3]D Townsend,I Thompson.A quantum key distribution channel b ased on optical fibre[J].J.of Mod.Opt,1994,41(12):2425.
  • 5[4]K Ekert.Quantum cryptography based on Bells theorem[J] .Phy.Rev.Lett,1991,67[ STBZ (6):661-663.
  • 6[5]d Espagnat.The quantum theory and reality[J].Scientific American.1979,247(5 2):158-181.
  • 7[6]H Bennett.Quantum cryptography using any two nonorthogonal s tates[J].Phy.Rev.Lett,1992,68(21):3121-3124.
  • 8[7]M Barnett,B Hunttner,S J D Phoenix.Eavesdropping strategies and rejected-data protocols in quantum cryptography[J].J.of .Mod.Opt,1993,40(12):2 501-2513.
  • 9[8]Goldenberg,Lev Vaidman.Quantum cryptography based on orthogo nal states[J].Phy.Rev.Lett,1995,[ STHZ 75(7):1239-1243.
  • 10[9]D Townsend.Secure key distribution systems based on quantum cryptography[J].Electron.Lett,1994 ,30(10):809-811.

共引文献18

同被引文献18

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部