[1] |
ALSHARIF M , KELECHI A , ALBREEM M ,et al. Sixth generation (6G) wireless networks:vision,research activities,challenges and potential solutions[J]. Symmetry, 2020,12:676.
|
[2] |
李凤华, 殷丽华, 吴巍 ,等. 天地一体化信息网络安全保障技术研究进展及发展趋势[J]. 通信学报, 2016,37(11): 156-168.
|
|
LI F H , YIN L H , WU W ,et al. Research status and development trends of security assurance for space-ground integration information network[J]. Journal on Communications, 2016,37(11): 156-168.
|
[3] |
SHENG M , ZHOU D , LIU R Z ,et al. Resource mobility in space information networks:opportunities,challenges,and approaches[J]. IEEE Network, 2019,33(1): 128-135.
|
[4] |
袁冰清, 蔡芸云, 王英翔 . 浅析北斗导航卫星系统[J]. 中国无线电, 2022(2): 46-47.
|
|
YUAN B Q , CAI Y Y , WANG Y X . Elementary analysis of Beidou navigation satellite system(BDS)[J]. China Radio, 2022(2): 46-47.
|
[5] |
王斯梁, 冯暄, 陈翼 ,等. 北斗导航系统信息安全研究[J]. 信息安全研究, 2020,6(12): 1068-1073.
|
|
WANG S L , FENG X , CHEN Y ,et al. Research of information security in Beidou navigation system[J]. Journal of Information Security Research, 2020,6(12): 1068-1073.
|
[6] |
曾勇, 王驭, 徐文斌 ,等. 天地一体化信息网络无线链路安全防护技术探讨[J]. 信息安全与通信保密, 2020,18(10): 100-106.
|
|
ZENG Y , WANG Y , XU W B ,et al. Discussion on the wireless link security protection technology of the space-ground integrated information network[J]. Information Security and Communications Privacy, 2020,18(10): 100-106.
|
[7] |
XUE K P , MENG W , LI S H ,et al. A secure and efficient access and handover authentication protocol for Internet of things in space information networks[J]. IEEE Internet of Things Journal, 2019,6(3): 5485-5499.
|
[8] |
LIU Y , NI L Q , PENG M G . A secure and efficient authentication protocol for satellite-terrestrial networks[J]. IEEE Internet of Things Journal, 2022,doi:10.1109/JIOT.2022.3152900.
|
[9] |
马军, 黄慧, 夏传福 ,等. 基于标识认证和SM2算法的用户终端接入认证协商协议[J]. 电子设计工程, 2020,28(19): 67-70,75.
|
|
MA J , HUANG H , XIA C F ,et al. Beidou terminal access authentication negotiation protocol based on identity authentication and SM2 algorithm[J]. Electronic Design Engineering, 2020,28(19): 67-70,75.
|
[10] |
李昊鹏, 陈立云, 卢昱 . 基于北斗的军事物联网身份认证方案研究[J]. 计算机应用研究, 2018,35(8): 2431-2434.
|
|
LI H P , CHEN L Y , LU Y . Research on identity authentication scheme based on Beidou in military Internet of Things[J]. Application Research of Computers, 2018,35(8): 2431-2434.
|
[11] |
赵东昊, 卢昱, 王增光 . 北斗战场通信网络身份认证方法[J]. 现代防御技术, 2019,47(3): 99-105.
|
|
ZHAO D H , LU Y , WANG Z G . Identity authentication method of“Beidou” battlefield communication network[J]. Modern Defence Technology, 2019,47(3): 99-105.
|
[12] |
朱辉, 陈思宇, 李凤华 ,等. 面向低轨卫星网络的用户随遇接入认证协议[J]. 清华大学学报(自然科学版), 2019,59(1): 1-8.
|
|
ZHU H , CHEN S Y , LI F H ,et al. User random access authentication protocol for low earth orbit satellite networks[J]. Journal of Tsinghua University (Science and Technology), 2019,59(1): 1-8.
|
[13] |
CHEN Y L , CHEN J H . An enhanced dynamic authentication scheme for mobile satellite communication systems[J]. International Journal of Satellite Communications and Networking, 2021,39(3): 250-262.
|
[14] |
KUMAR U , GARG M . A note on an enhanced dynamic authentication scheme for mobile satellite communication systems[J]. International Journal of Satellite Communications and Networking, 2022,40(5): 317-329.
|
[15] |
LIN H Y . Efficient dynamic authentication for mobile satellite communication systems without verification table[J]. International Journal of Satellite Communications and Networking, 2016,34(1): 3-10.
|
[16] |
LIU Y C , ZHANG A X , LI S H ,et al. A lightweight authentication scheme based on self-updating strategy for space information network[J]. International Journal of Satellite Communications and Networking, 2017,35(3): 231-248.
|
[17] |
吴克河, 李岩, 崔文超 ,等. 基于商密算法的北斗短报文安全通信协议研究[J]. 计算机与数字工程, 2018,46(11): 2291-2295,2374.
|
|
WU K H , LI Y , CUI W C ,et al. Research of Beidou short message security communication protocol based on commercial password[J]. Computer & Digital Engineering, 2018,46(11): 2291-2295,2374.
|
[18] |
ZHAO D H , LU Y , LIU X G ,et al. Design of emergency UAV network identity authentication protocol based on Beidou[J]. MATEC Web of Conferences, 2021,336:04004.
|
[19] |
韩旭, 陆思奇, 程庆丰 . 形式化工具Scyther优化与实例分析[J]. 信息安全研究, 2016,2(3): 272-279.
|
|
HAN X , LU S Q , CHENG Q F . The improvement and instance analysis of the formal verification tool scyther[J]. Journal of Information Security Research, 2016,2(3): 272-279.
|
[20] |
石小平, 马如慧, 曹进 ,等. 面向卫星网络断续连通场景的接入和切换认证机制[J]. 天地一体化信息网络, 2021,2(3): 24-34.
|
|
SHI X P , MA R H , CAO J ,et al. Access and handover authentication in intermittent connection scenario of satellite network[J]. Space-IntegratedGround Information Networks, 2021,2(3): 24-34.
|
[21] |
BERINGER L , PETCHER A , KATHERINE Q Y ,et al. Verified correctness and security of OpenSSL HMAC[C]// Proceedings of 24th USENIX Security Symposium. Berkeley:USENIX Association, 2015: 207-221.
|
[22] |
MA R H , CAO J , FENG D G ,et al. LAA:lattice-based access authentication scheme for IoT in space information networks[J]. IEEE Internet of Things Journal, 2020,7(4): 2791-2805.
|