Abstract

In view of the bad environment and intermittent communication of UAV network, based on the short message communication function of Beidou satellite navigation system, which can provide all-weather and no blind area communication service, a UAV network identity authentication protocol under emergency state when conventional means cannot communicate is designed.

Highlights

  • One time password authentication is usually divided into four ways: one-time password based on password sequence, one-time password based on time synchronization, one-time dynamic password based on event synchronization and one-time dynamic password based on challenge / response

  • This protocol achieves the security goal of the traditional one-time password authentication protocol, and enhances the security performance of the protocol and the resistance to eavesdropping and man in the middle attacks combined with the "Beidou" short message channel

  • Aiming at the problem of emergency authentication when the ordinary wireless channel can not communicate, combined with the Beidou satellite navigation system independently developed in China

Read more

Summary

One time password technology

One time password authentication is a dynamic password authentication method based on pseudo-random sequence. The authentication method based on one-time password ensures certain security, and does not need the support of CA. It has the advantages of small calculation and low energy consumption. The four kinds of one-time password forms are specific compared as follow We compare these authentication methods in terms of traffic, security, complexity, computation and hardware support. Through the comparative analysis of the above four one-time passwords, it can be seen that the authentication mechanism based on time synchronization has the advantages of small traffic volume, high security and small amount of user calculation. Speaking, compared with the other three authentication mechanisms, it has obvious advantages, and It is a feasible choice for UAV network emergency communication protocol

Initialization process
Identity authentication stage
Performance analysis
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.