期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR 被引量:7
1
作者 Yang Haomiao Huang Rongshun +2 位作者 Wang Xiaofen Deng Jiang Chen Ruidong 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2014年第3期688-696,共9页
Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-gen... Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM) systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortu- nately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR), an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters' private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link. 展开更多
关键词 Air traffic management broadcast authentication Identity-based signature Message recovery Satellite communication
原文传递
Cryptanalysis of quantum broadcast communication and authentication protocol with a one-time pad
2
作者 曹雅 高飞 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第11期149-153,共5页
Chang et al.[Chin.Phys.623 010305(2014)]have proposed a quantum broadcast communication and authentication protocol.However,we find that an intercept-resend attack can be preformed successfully by a potential eavesd... Chang et al.[Chin.Phys.623 010305(2014)]have proposed a quantum broadcast communication and authentication protocol.However,we find that an intercept-resend attack can be preformed successfully by a potential eavesdropper,who will be able to destroy the authentication function.Afterwards,he or she can acquire the secret transmitted message or even modify it while escaping detection,by implementing an efficient man-in-the-middle attack.Furthermore,we show a simple scheme to defend this attack,that is,applying non-reusable identity strings. 展开更多
关键词 authentication broadcast secret message strings transmitted applying sender acquire cryptography
在线阅读 下载PDF
Event-Oriented Dynamic Security Service for Demand Response in Smart Grid Employing Mobile Networks
3
作者 GUO Longhua DONG Mianxiong +2 位作者 Kaoru Ota WU Jun LI Jianhua 《China Communications》 SCIE CSCD 2015年第12期63-75,共13页
Equipped with millions of sensors and smart meters in smart gird,a reliable and resilient wireless communication technology is badly needed.Mobile networks are among the major energy communication networks which contr... Equipped with millions of sensors and smart meters in smart gird,a reliable and resilient wireless communication technology is badly needed.Mobile networks are among the major energy communication networks which contribute to global energy consumption increase rapidly.As one of core technologies of smart grid employing mobile networks,Demand Response(DR) helps improving efficiency,reliability and security for electric power grid infrastructure.Security of DR events is one of the most important issues in DR.However,the security requirements of different DR events are dynamic for variousactual demands.To address this,an event-oriented dynamic security service mechanism is proposed for DR.Three kinds of security services including security access service,security communication service and security analysis service for DR event are composited dynamically by the fine-grained sub services.An experiment prototype of the network of State Grid Corporation of China(SGCC) is established.Experiment and evaluations shows the feasibility and effectiveness of the proposed scheme in smart grid employing mobile network. 展开更多
关键词 dynamically smart overhead infrastructure broadcast badly password electricity prototype authentication
在线阅读 下载PDF
A Broadcast Signcryption Protocol for Ad Hoc Networks
4
作者 WANG Xiaoming YAO Guoqing LIAO Zhiwei 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期423-429,共7页
Many previous broadcast encryption schemes can only guarantee confidentiality but cannot verify integrity and authenticity for broadcast messages. In this paper, a broadcast signcryption protocol for ad hoc networks i... Many previous broadcast encryption schemes can only guarantee confidentiality but cannot verify integrity and authenticity for broadcast messages. In this paper, a broadcast signcryption protocol for ad hoc networks is proposed based on cluster-based structure. The proposed protocol not only guarantees confidentiality but also verifies integrity and authenticity for broadcast messages. More importantly, the proposed scheme enables the cluster head to robustly add or remove any cluster member without changing secret key of other cluster members. Moreover, the proposed protocol avoids massive message exchange for key setup among cluster members. The analysis of security and performance shows that the proposed protocol is secure, efficient, and more practical protocol for ad hoc networks. 展开更多
关键词 ad hoc networks cluster-based structure broadcast authenticated encryption
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部