Volume 47 Issue 7
Jul.  2021
Turn off MathJax
Article Contents
MU Shenglin, CHEN Ying, LIU Ting, et al. Design of message authentication and OTAR broadcast strategy for BDSBAS[J]. Journal of Beijing University of Aeronautics and Astronautics, 2021, 47(7): 1453-1461. doi: 10.13700/j.bh.1001-5965.2020.0222(in Chinese)
Citation: MU Shenglin, CHEN Ying, LIU Ting, et al. Design of message authentication and OTAR broadcast strategy for BDSBAS[J]. Journal of Beijing University of Aeronautics and Astronautics, 2021, 47(7): 1453-1461. doi: 10.13700/j.bh.1001-5965.2020.0222(in Chinese)

Design of message authentication and OTAR broadcast strategy for BDSBAS

doi: 10.13700/j.bh.1001-5965.2020.0222
More Information
  • Corresponding author: CHEN Xiao, E-mail: chenxiao@aircas.ac.cn
  • Received Date: 27 May 2020
  • Accepted Date: 28 Jul 2020
  • Publish Date: 20 Jul 2021
  • Satellite-based Augmentation System (SBAS) relates to the field of life safety through a wide-area augmentation system that provides integrity information to users. To improve SBAS's ability to resist spoofing, firstly, based on the Elliptic Curve Digital Signature Algorithm (ECDSA), this paper proposes a message authentication design scheme for BeiDou Satellite-based Augmentation System (BDSBAS). According to the domestic commercial cryptographic standard elliptic curve (SM2) algorithm, the corresponding parameter design and message distribution scheme are carried out, and the message distribution strategy of Over the Air Rekeying (OTAR) is described. In order to further verify the test scheme, this paper uses Monte Carlo OTAR simulator to carry out simulation tests based on three broadcast scheduling algorithms. By adjusting the weights, the receiving time of OTAR messages in different situations is analyzed. The simulation results provide an important reference for the selection of broadcast scheduling of OTAR message schemes in specific situations.

     

  • loading
  • [1]
    CHIARA A D, BROI G D, POZZOBON O, et al. Authentication concepts for satellite-based augmentation systems[C]//Proceedings of the 29th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+2016), 2016: 3208-3221.
    [2]
    CHIARA A D, BROI G D, POZZOBON O, et al. SBAS authentication proposals and performance assessment[C]//Proceedings of the 30th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+2017), 2017: 2106-2116.
    [3]
    NEISH A, WALTER T, ENGE P. Parameter selection for the TESLA keychain[C]//Proceedings of the 31st International Technical Meeting of the Satellite Division of the Institute of Navigation(ION GNSS+2018), 2018: 2155-2171.
    [4]
    NEISH A, WALTER T, ENGE P. Quantum-resistant authentication algorithms for satellite-based augmentation systems[J]. Navigation, 2019, 66(1): 199-209. doi: 10.1002/navi.287
    [5]
    WU Z J, LIU R S, CAO H J. ECDSA-based message authentication scheme for BeiDou-II navigation satellite system[J]. IEEE Transactions on Aerospace and Electronic Systems, 2019, 55(4): 1666-1682. doi: 10.1109/TAES.2018.2874151
    [6]
    NEISH A, WALTER T, POWELL J D. Design and analysis of a public key infrastructure for SBAS data authentication[J]. Navigation, 2019, 66(4): 831-844. doi: 10.1002/navi.338
    [7]
    WU Z J, ZHANG Y, LIU R S. BD-II NMA & SSI: An scheme of anti-spoofing and open BeiDou II D2 navigation message authentication[J]. IEEE Access, 2020, 8: 23759-23775. doi: 10.1109/ACCESS.2020.2970203
    [8]
    NEISH A, WALTER T, POWELL D, et al. SBAS data authentication: A concept of operations[C]//Proceedings of the 32nd International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+2019), 2019: 1812-1823.
    [9]
    中华人民共和国国家质量监督检验检疫总局, 中国国家标准化管理委员会. 信息安全技术SM2椭圆曲线公钥密码算法第1部分: 总则: GB/T 32918.1-2016[S]. 北京: 中国标准出版社, 2017.

    General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China. Information security technology-Public key cryptographic algorithm SM2 based on elliptic curves-Part 1: General: GB/T 32918.1-2016[S]. Beijing: Standards Press of China, 2017(in Chinese).
    [10]
    中华人民共和国国家质量监督检验检疫总局, 中国国家标准化管理委员会. 信息安全技术SM2椭圆曲线公钥密码算法第2部分: 数字签名算法: GB/T 32918.2-2016[S]. 北京: 中国标准出版社, 2017.

    General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China. Information security technology-Public key cryptographic algorithm SM2 based on elliptic curves-Part 2: Digital signature algorithm: GB/T 32918.2-2016[S]. Beijing: Standards Press of China, 2017(in Chinese).
    [11]
    孙荣燕, 蔡昌曙, 周洲, 等. 国密SM2数字签名算法与ECDSA算法对比分析研究[J]. 网络安全技术与应用, 2013(2): 60-62. doi: 10.3969/j.issn.1009-6833.2013.02.021

    SUN R Y, CAI C S, ZHOU Z, et al. The comparision between digital signature based on SM2 and ECDSA[J]. Network Security Technology & Application, 2013(2): 60-62(in Chinese). doi: 10.3969/j.issn.1009-6833.2013.02.021
    [12]
    黄双临, 辛洁, 王冬霞, 等. 星基增强系统电文及播发特性研究[J]. 数字通信世界, 2019(2): 4-6. doi: 10.3969/J.ISSN.1672-7274.2019.02.002

    HUANG S L, XIN J, WANG D X, et al. Research on propagating message and strategy of satellite-based augmentation system[J]. Digital Communication World, 2019(2): 4-6(in Chinese). doi: 10.3969/J.ISSN.1672-7274.2019.02.002
    [13]
    申成良, 郭承军. 卫星导航信号电文加密技术研究与评估[J]. 全球定位系统, 2018, 43(3): 7-12. https://www.cnki.com.cn/Article/CJFDTOTAL-QUDW201803003.htm

    SHEN C L, GUO C J. Study and evaluation of GNSS signal cryptographic authentication defenses[J]. GNSS World of China, 2018, 43(3): 7-12(in Chinese). https://www.cnki.com.cn/Article/CJFDTOTAL-QUDW201803003.htm
    [14]
    梁曦, 陶晓霞, 周昀, 等. 星基增强系统导航电文及完好性信息研究[J]. 空间电子技术, 2016, 13(5): 39-42. doi: 10.3969/j.issn.1674-7135.2016.05.008

    LIANG X, TAO X X, ZHOU Y, et al. Research of SBAS navigation message and integrity message[J]. Space Electronic Technology, 2016, 13(5): 39-42(in Chinese). doi: 10.3969/j.issn.1674-7135.2016.05.008
    [15]
    汪朝晖, 张振峰. SM2椭圆曲线公钥密码算法综述[J]. 信息安全研究, 2016, 2(11): 972-982. https://www.cnki.com.cn/Article/CJFDTOTAL-XAQY201611003.htm

    WANG Z H, ZHANG Z F. Overview on public key cryptographic algorithm SM2 based on elliptic curves[J]. Journal of Information Security Research, 2016, 2(11): 972-982(in Chinese). https://www.cnki.com.cn/Article/CJFDTOTAL-XAQY201611003.htm
    [16]
    FERNÁNDEZ-HERN'NDEZ I, CHÂTRE E, DALLA CHIARA A, et al. Impact analysis of SBAS authentication[J]. Navigation, 2018, 65(4): 517-532. doi: 10.1002/navi.267
    [17]
    BONELLI N, GIORDANO S, PROCISSI G. Network traffic processing with PFQ[J]. IEEE Journal on Selected Areas in Communications, 2016, 34(6): 1819-1833. http://ieeexplore.ieee.org/document/7460204
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(13)  / Tables(8)

    Article Metrics

    Article views(441) PDF downloads(39) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return