Analysis and Design on Key Updating Policies for Satellite Networks

Authors

  • Yuxuan Ji Institute of Software, Chinese Academy of Sciences National Key Laboratory of Integrated Information System Technology 4# South Fourth Street, Zhong Guan Cun, Beijing 100190, P.R. CHINA
  • Hengtai Ma Institute of Software, Chinese Academy of Sciences National Key Laboratory of Integrated Information System Technology 4# South Fourth Street, Zhong Guan Cun, Beijing 100190, P.R. CHINA
  • Gang Zheng Institute of Software, Chinese Academy of Sciences National Key Laboratory of Integrated Information System Technology 4# South Fourth Street, Zhong Guan Cun, Beijing 100190, P.R. CHINA E-mail:

Keywords:

key updating, satellite networks, model, protocol, simulation

Abstract

Satellite networks are becoming increasingly important because of the exciting global communication services they provide. Key management policies have been successfully deployed in terrestrial networks to guarantee the information security. However, long propagation, storage and computation constraints bring new challenges in designing efficient and cost-effective key updating policies for satellite networks. Based on the structure and communication features of satellite networks, a dynamic key management model for satellite networks (DKM-SN) is presented, which includes certificates owned by each satellite, primary keys and session keys both of which are shared between two satellites. Furthermore, a protocol is designed for updating certificates for satellites; different policies for updating primary and session keys are studied and their efficiency and security are analyzed and compared. In addition, simulation environment for satellite networks is built and the key updating processes are implemented in Walker constellation. From the simulation results, further contrasts on key updating time and storage costs between the applications of IBM hybrid key management model (HKMM) and DKM-SN in satellite networks are presented. Finally, important suggestions in designing key updating policies are given.

References

J. Kohl, C. Neuman, The Kerberos Network Authentication Service (V5), http://www.ietf.org/rfc/rfc1510.txt, RFC 1510, 1993.

V. Le, S. M. Matyas, D. B. Johnson and J. D. Wilkins, A Public Key Extension to the Common Cryptographic Architecture, IBM System Journal, Vol. 32, pp. 461-485, 1993. http://dx.doi.org/10.1147/sj.323.0461

B. C. Neuman and S. G. Stubblebine, A Note on the Use of Timestamps as Nonces, ACM Operating Systems Reviews, Vol. 27, pp. 10-14, 1993. http://dx.doi.org/10.1145/155848.155852

Philippe Janson and Gene Tsudik, Secure and Minimal Protocols for Authenticated Key Distribution, Computer Communications, Vol. 18, pp. 645-653, 1995. http://dx.doi.org/10.1016/0140-3664(95)99807-O

CCSDS, Security Threats Against Space Missions, Washington: Informational Report, CCSDS 350.1-G-1, Green Book, Issue 1, 2006.

A. Roy-Chowdhury et al., Security Issues in Hybrid Networks with a Satellite Component, IEEE Wireless Communications, Vol. 12, pp. 50-61, 2005. http://dx.doi.org/10.1109/MWC.2005.1561945

H S Cruickshank, A Security System for Satellite Networks, Fifth International Conference on Satel- lite Systems for Mobile Communications and Navigation, London: IEE, pp. 187-190, 1996.

Tanya Vladimirova, Roohi Banu and Martin N. Sweeting, On-Board Security Services in Small Satellites, MAPLD International Conference, Washington: NASA Office of Logic Design, 2005.

C. Boyd and A. Mathuria, Key Establishment Protocols for Secure Mobile Communication: a Selective Survey, Lecture Notes in Computer Science, Vol. 1438, pp. 344-355, 1998. http://dx.doi.org/10.1007/BFb0053746

J. Schaad, M. Myers, Public-Key Infrastructure (X.509), www.ietf.org/html.charters/pkix- charter.html, IETF, PKIX 2797.

X. Ying, Z. Gang, Modeling and Distributed Simulation for Satellite Networks, Computer Simula- tion, Vol. 25, pp. 65-69, 2008.

ANSI X9.62, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), American National Standards Institute, 1999.

ANSI. X9.63, Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography, American National Standards Institute, 2001.

Published

2008-12-01

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.