Abstract
With high-speed move and frequent cross-domain, the problem of certificate authority (CA) is a security bottleneck in the Satellite-Earth (S&E) Integration Network. A mobile-certificate authority Method based on PKI (Public Key Infrastructure) is proposed in this paper. Based on the RSA algorithm, the method realizes the anonymous authentication between neighboring nodes. It distributes the private key component to n nodes according to the threshold theory, and then realizes multi-node collaboration certification and dynamic permission-recovery. In addition, combining with distributed authentication and chain certification, this paper achieves distributed PKI and provides certification basis for high-speed nodes. This method frame, which is no-central, self-adaptive and traceable, could fulfill the quality of the S&E Integration Network. The experiments showed that the success rate and safety of it is much better than traditional distributed certification method. The method has far-reaching military value
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Asokan, N., Ginzboorg, P.: Key agreement method in Ad Hoc networks. Computer Communications 23(7), 413–422 (2006)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 305–316 (2004)
Balfanz, D.: Authentication in Ad hoc Wireless Networks. In: Proceedings of NDSS 2002 Conference, pp. 1652–1671. American Institute of Aeronautics and Astronautics, New Orieans (2002)
Zhou, L., Hass, Z.: Securing Ad Hoc Networks. IEEE Network Magazine 13(6), 751–765 (2003)
Guo, S., Shen, A.-N.: A compromise-resilient pair-wise rekeying method in hierarchical wireless sensor networks. Computer Systems Science and Engineering 25(6), 397–405 (2011)
Li, Q.-M., Liu, F.-Y.: Strategic Internet risk detection and fault analysis method. Journal of Computer Research and Development 45(10), 1718–1723 (2008)
Huang, J., Zuo, M.J., Fang, Z.: Multi-state Consecutive k-out-of-n systems. IIE Transactions on Quality and Reliability Engineering 16(6), 527–534 (2003)
Huang, C., Wang, G.-L.: Energy-efficient beaconless real-time routing method for wireless sensor networks. Computer Systems Science and Engineering 26(3), 173–186 (2011)
Li, Q.: Multiple QoS Constraints Finding Paths Algorithm in TMN. Information: An International Interdisciplinary Journal 14(3), 731–738 (2011)
Qi, Y., Li, Q., Hou, J.: A Method to Solving Cyberspace Security-model WSN Security-model Equation. Procedia Engineering 15, 2052–2056 (2011)
Li, Q., Wang, R., Yin, J., Hou, J.: The design of data security synchronization in the network of satellite and ground security. Key Engineering Materials 439-440, 208–213 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, Q., Shi, Q., Hou, J., Qi, Y., Zhang, H. (2012). A Mobile-Certificate Security Method of Satellite-Earth Integration Networks. In: Liu, B., Ma, M., Chang, J. (eds) Information Computing and Applications. ICICA 2012. Lecture Notes in Computer Science, vol 7473. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34062-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-34062-8_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34061-1
Online ISBN: 978-3-642-34062-8
eBook Packages: Computer ScienceComputer Science (R0)