Analysis and Design on Key Updating Policies for Satellite Networks

  • Yuxuan Ji Institute of Software, Chinese Academy of Sciences National Key Laboratory of Integrated Information System Technology 4# South Fourth Street, Zhong Guan Cun, Beijing 100190, P.R. CHINA
  • Hengtai Ma Institute of Software, Chinese Academy of Sciences National Key Laboratory of Integrated Information System Technology 4# South Fourth Street, Zhong Guan Cun, Beijing 100190, P.R. CHINA
  • Gang Zheng Institute of Software, Chinese Academy of Sciences National Key Laboratory of Integrated Information System Technology 4# South Fourth Street, Zhong Guan Cun, Beijing 100190, P.R. CHINA E-mail:

Abstract

Satellite networks are becoming increasingly important because of the exciting global communication services they provide. Key management policies have been successfully deployed in terrestrial networks to guarantee the information security. However, long propagation, storage and computation constraints bring new challenges in designing efficient and cost-effective key updating policies for satellite networks. Based on the structure and communication features of satellite networks, a dynamic key management model for satellite networks (DKM-SN) is presented, which includes certificates owned by each satellite, primary keys and session keys both of which are shared between two satellites. Furthermore, a protocol is designed for updating certificates for satellites; different policies for updating primary and session keys are studied and their efficiency and security are analyzed and compared. In addition, simulation environment for satellite networks is built and the key updating processes are implemented in Walker constellation. From the simulation results, further contrasts on key updating time and storage costs between the applications of IBM hybrid key management model (HKMM) and DKM-SN in satellite networks are presented. Finally, important suggestions in designing key updating policies are given.

References

[1] J. Kohl, C. Neuman, The Kerberos Network Authentication Service (V5), http://www.ietf.org/rfc/rfc1510.txt, RFC 1510, 1993.

[2] V. Le, S. M. Matyas, D. B. Johnson and J. D. Wilkins, A Public Key Extension to the Common Cryptographic Architecture, IBM System Journal, Vol. 32, pp. 461-485, 1993.
http://dx.doi.org/10.1147/sj.323.0461

[3] B. C. Neuman and S. G. Stubblebine, A Note on the Use of Timestamps as Nonces, ACM Operating Systems Reviews, Vol. 27, pp. 10-14, 1993.
http://dx.doi.org/10.1145/155848.155852

[4] Philippe Janson and Gene Tsudik, Secure and Minimal Protocols for Authenticated Key Distribution, Computer Communications, Vol. 18, pp. 645-653, 1995.
http://dx.doi.org/10.1016/0140-3664(95)99807-O

[5] CCSDS, Security Threats Against Space Missions, Washington: Informational Report, CCSDS 350.1-G-1, Green Book, Issue 1, 2006.

[6] A. Roy-Chowdhury et al., Security Issues in Hybrid Networks with a Satellite Component, IEEE Wireless Communications, Vol. 12, pp. 50-61, 2005.
http://dx.doi.org/10.1109/MWC.2005.1561945

[7] H S Cruickshank, A Security System for Satellite Networks, Fifth International Conference on Satel- lite Systems for Mobile Communications and Navigation, London: IEE, pp. 187-190, 1996.

[8] Tanya Vladimirova, Roohi Banu and Martin N. Sweeting, On-Board Security Services in Small Satellites, MAPLD International Conference, Washington: NASA Office of Logic Design, 2005.

[9] C. Boyd and A. Mathuria, Key Establishment Protocols for Secure Mobile Communication: a Selective Survey, Lecture Notes in Computer Science, Vol. 1438, pp. 344-355, 1998.
http://dx.doi.org/10.1007/BFb0053746

[10] J. Schaad, M. Myers, Public-Key Infrastructure (X.509), www.ietf.org/html.charters/pkix- charter.html, IETF, PKIX 2797.

[11] X. Ying, Z. Gang, Modeling and Distributed Simulation for Satellite Networks, Computer Simula- tion, Vol. 25, pp. 65-69, 2008.

[12] ANSI X9.62, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), American National Standards Institute, 1999.

[13] ANSI. X9.63, Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography, American National Standards Institute, 2001.
Published
2008-12-01
How to Cite
JI, Yuxuan; MA, Hengtai; ZHENG, Gang. Analysis and Design on Key Updating Policies for Satellite Networks. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, [S.l.], v. 3, n. 4, p. 343-352, dec. 2008. ISSN 1841-9844. Available at: <http://univagora.ro/jour/index.php/ijccc/article/view/2402>. Date accessed: 27 sep. 2020. doi: https://doi.org/10.15837/ijccc.2008.4.2402.

Keywords

key updating, satellite networks, model, protocol, simulation