[1] |
李凤华, 殷丽华, 吴巍 ,等. 天地一体化信息网络安全保障技术研究进展及发展趋势[J]. 通信学报, 2016,37(11): 156-168.
|
|
LI F H , YIN L H , WU W ,et al. Research status and development trends of security assurance for space-ground integration information network[J]. Journal on Communications, 2016,37(11): 156-168.
|
[2] |
KHALILI H , KHODASHENAS P S , SIDDIQUI S . On the orchestration of integrated satellite components in 5G networks and beyond[C]// Proceedings of 2020 22nd International Conference on Transparent Optical Networks (ICTON). Piscataway:IEEE Press, 2020: 1-4.
|
[3] |
ZHANG J X , ZHANG X , WANG P ,et al. Double-edge intelligent integrated satellite terrestrial networks[J]. China Communications, 2020,17(9): 128-146.
|
[4] |
薛开平, 马永金, 洪佳楠 ,等. 天地一体化网络中基于令牌的安全高效漫游认证方案[J]. 通信学报, 2018,39(5): 48-58.
|
|
XUE K P , MA Y J , HONG J N ,et al. Secure and efficient token based roaming authentication scheme for space-earth integration network[J]. Journal on Communications, 2018,39(5): 48-58.
|
[5] |
LARCOM J A , LIU H . Modeling and characterization of GPS spoofing[C]// Proceedings of 2013 IEEE International Conference on Technologies for Homeland Security. Piscataway:IEEE Press, 2013: 729-734.
|
[6] |
SHENG J , CAI X Q , LI Q Y ,et al. Space-air-ground integrated network development and applications in high-speed railways:a survey[J]. IEEE Transactions on Intelligent Transportation Systems, 2021,PP(99): 1-20.
|
[7] |
SCHRAML M G , SCHWARZ R T , KNOPP A . Multiuser MIMO concept for physical layer security in multibeam satellite systems[J]. IEEE Transactions on Information Forensics and Security, 2021,16: 1670-1680.
|
[8] |
KALANTARI A , ZHENG G , GAO Z ,et al. Secrecy analysis on network coding in bidirectional multibeam satellite communications[J]. IEEE Transactions on Information Forensics and Security, 2015,10(9): 1862-1874.
|
[9] |
徐国愚, 陈性元, 杜学绘 . 一种新的基于上下文传递的临近空间安全切换机制[J]. 计算机科学, 2013,40(4): 160-163.
|
|
XU G Y , CHEN X Y , DU X H . New near space security handoff scheme based on context transfer[J]. Computer Science, 2013,40(4): 160-163.
|
[10] |
SU K , DONG Q Z , ZHU W Q . Space information security and cyberspace defense technology[C]// Proceedings of 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber,Physical and Social Computing. Piscataway:IEEE Press, 2013: 1509-1511.
|
[11] |
DING X H , ZHANG Z L , LIU D P . Low-delay secure handover for space-air-ground integrated networks[C]// Proceedings of 2020 IEEE 31st Annual International Symposium on Personal,Indoor and Mobile Radio Communications. Piscataway:IEEE Press, 2020: 1-6.
|
[12] |
CRUICKSHANK H S , . A security system for satellite networks[C]// Proceedings of the Fifth International Conference on Satellite Systems for the Mobile Communications and Navigation. London:IET, 1996: 187-190.
|
[13] |
HWANG M S , YANG C C , SHIU C Y . An authentication scheme for mobile satellite communication systems[J]. ACM SIGOPS Operating Systems Review, 2003,37(4): 42-47.
|
[14] |
CHANG Y F , CHANG C C . An efficient authentication protocol for mobile satellite communication systems[J]. ACM SIGOPS Operating Systems Review, 2005,39(1): 70-84.
|
[15] |
WANG Y , ZHANG W F , WANG X M . A lightweight and secure authentication protocol for space-ground integrated network of railway[C]// Proceedings of 2021 International Conference on Communications,Information System and Computer Engineering (CISCE). Piscataway:IEEE Press, 2021: 30-35.
|
[16] |
ZHANG Y H , DENG R H , BERTINO E ,et al. Robust and universal seamless handover authentication in 5G HetNets[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(2): 858-874.
|
[17] |
XUE K P , MENG W , ZHOU H C ,et al. A lightweight and secure group key based handover authentication protocol for the software-defined space information network[J]. IEEE Transactions on Wireless Communications, 2020,19(6): 3673-3684.
|
[18] |
周彦伟, 杨波, 张文政 . 异构无线网络可控匿名漫游认证协议[J]. 电子学报, 2016,44(5): 1117-1123.
|
|
ZHOU Y W , YANG B , ZHANG W Z . Controllable and anonymous roaming protocol for heterogeneous wireless network[J]. Acta Electronica Sinica, 2016,44(5): 1117-1123.
|
[19] |
刘丹, 石润华, 张顺 ,等. 无线网络中基于无证书聚合签名的高效匿名漫游认证方案[J]. 通信学报, 2016,37(7): 182-192.
|
|
LIU D , SHI R H , ZHANG S ,et al. Efficient anonymous roaming authentication scheme using certificateless aggregate signature in wireless network[J]. Journal on Communications, 2016,37(7): 182-192.
|
[20] |
许芷岩, 吴黎兵, 李莉 ,等. 无线漫游认证中可证安全的无证书聚合签名方案[J]. 通信学报, 2017,38(7): 123-130.
|
|
XU Z Y , WU L B , LI L ,et al. Provably secure certificateless aggregate signature scheme in wireless roaming authentication[J]. Journal on Communications, 2017,38(7): 123-130.
|
[21] |
WANG L , ZHANG X J , ZHANG A Q ,et al. EGIP:an efficient group identification protocol in roaming network[C]// Proceedings of 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC). Piscataway:IEEE Press, 2017: 1280-1284.
|
[22] |
XUE K P , MENG W , LI S H ,et al. A secure and efficient access and handover authentication protocol for Internet of things in space information networks[J]. IEEE Internet of Things Journal, 2019,6(3): 5485-5499.
|
[23] |
MENG W , XUE K P , XU J ,et al. Low-latency authentication against satellite compromising for space information network[C]// Proceedings of 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems. Piscataway:IEEE Press, 2018: 237-244.
|
[24] |
IBRAHIM M H , KUMARI S , DAS A K ,et al. Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks[J]. Security and Communication Networks, 2016,9(18): 5563-5580.
|
[25] |
GUO J Y , DU Y . A secure three-factor anonymous roaming authentication protocol using ECC for space information networks[J]. Peer-to-Peer Networking and Applications, 2021,14(2): 898-916.
|
[26] |
FAN B , ANDERSEN D G , KAMINSKY M ,et al. Cuckoo filter:practically better than bloom[C]// Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies. New York:ACM Press, 2014: 75-88.
|
[27] |
唐郑熠, 李祥 . Dolev-Yao 攻击者模型的形式化描述[J]. 计算机工程与科学, 2010,32(8): 36-38,45.
|
|
TANG Z Y , LI X . The formalization description of the Dolev-Yao intruder model[J]. Computer Engineering & Science, 2010,32(8): 36-38,45.
|
[28] |
BLANCO V , GONZáLEZ P , CABALEIRO J C ,et al. AVISPA:visualizing the performance prediction of parallel iterative solvers[J]. Future Generation Computer Systems, 2003,19(5): 721-733.
|
[29] |
DE C A , IOVINO V . jPBC:Java pairing based cryptography[C]// Proceedings of 2011 IEEE Symposium on Computers and Communications. Piscataway:IEEE Press, 2011: 850-855.
|