Short message encryption technology of Beidou communication based on SM9

IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Security and Privacy Pub Date : 2024-05-07 DOI:10.1002/spy2.411
Shi Jin, Yichun Wang, Zhaofeng Guo, Li Yang, Xiaosan Su
{"title":"Short message encryption technology of Beidou communication based on SM9","authors":"Shi Jin, Yichun Wang, Zhaofeng Guo, Li Yang, Xiaosan Su","doi":"10.1002/spy2.411","DOIUrl":null,"url":null,"abstract":"To reduce the security authentication time cost, forwarding delay, and enhance message security of Beidou communication short messages, this paper proposes a Beidou communication short message encryption technology based on SM9 (Mobile Code Secure Communication). This technology uses split hierarchical clustering algorithm to cluster the short message data of Beidou Communication, in order to unify the processing of similar short message data and improve the encryption efficiency of subsequent short messages. Based on the data clustering results, this paper constructs a short message forwarding verification model using the SM9 identification password algorithm, and provides the message content of the communication application protocol and the communication receiving information protocol to achieve low‐cost and efficient forwarding verification. In addition, this article improves the initial value selection of Logistic chaotic mapping by coupling the tent map with coupled mapping lattice (CML) in the spatiotemporal chaos model to generate a chaotic initial value sequence, thereby expanding the key space, enhancing the ability to resist exhaustive attacks, enhancing the randomness of the generated key parameters, and optimizing the encryption effect of short messages. The experimental results show that the short message security authentication time of the technology proposed in this article is basically controlled within 25 ms, and the minimum forwarding delay is only 23.9 ms, which can effectively resist attacks and improve the security of Beidou communication.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.5000,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/spy2.411","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

To reduce the security authentication time cost, forwarding delay, and enhance message security of Beidou communication short messages, this paper proposes a Beidou communication short message encryption technology based on SM9 (Mobile Code Secure Communication). This technology uses split hierarchical clustering algorithm to cluster the short message data of Beidou Communication, in order to unify the processing of similar short message data and improve the encryption efficiency of subsequent short messages. Based on the data clustering results, this paper constructs a short message forwarding verification model using the SM9 identification password algorithm, and provides the message content of the communication application protocol and the communication receiving information protocol to achieve low‐cost and efficient forwarding verification. In addition, this article improves the initial value selection of Logistic chaotic mapping by coupling the tent map with coupled mapping lattice (CML) in the spatiotemporal chaos model to generate a chaotic initial value sequence, thereby expanding the key space, enhancing the ability to resist exhaustive attacks, enhancing the randomness of the generated key parameters, and optimizing the encryption effect of short messages. The experimental results show that the short message security authentication time of the technology proposed in this article is basically controlled within 25 ms, and the minimum forwarding delay is only 23.9 ms, which can effectively resist attacks and improve the security of Beidou communication.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于 SM9 的北斗通信短报文加密技术
为降低北斗通信短报文的安全认证时间成本、转发时延,提高报文安全性,本文提出了一种基于SM9(移动码安全通信)的北斗通信短报文加密技术。该技术采用拆分分层聚类算法对北斗通信短报文数据进行聚类,以统一处理同类短报文数据,提高后续短报文的加密效率。基于数据聚类结果,本文利用SM9识别口令算法构建了短报文转发验证模型,并提供了通信应用协议和通信接收信息协议的报文内容,实现了低成本、高效率的转发验证。此外,本文通过将时空混沌模型中的帐篷图与耦合映射网格(CML)耦合生成混沌初值序列,改进了Logistic混沌映射的初值选择,从而扩展了密钥空间,增强了抵御穷举攻击的能力,提高了生成密钥参数的随机性,优化了短报文的加密效果。实验结果表明,本文提出的技术的短报文安全认证时间基本控制在25 ms以内,最小转发时延仅为23.9 ms,能够有效抵御攻击,提高了北斗通信的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
5.30%
发文量
80
期刊最新文献
IoT malware detection using static and dynamic analysis techniques: A systematic literature review An approach for mitigating cognitive load in password management by integrating QR codes and steganography Cryptographic methods for secured communication in SDN‐based VANETs: A performance analysis Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review Research on privacy leakage of celebrity's ID card number based on real‐name authentication
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1