计算机工程与应用 ›› 2022, Vol. 58 ›› Issue (16): 56-70.DOI: 10.3778/j.issn.1002-8331.2201-0125

• 热点与综述 • 上一篇    下一篇

空天网络安全切换技术研究综述

韩孟达,曹利峰,雷依翰,杜学绘   

  1. 1.信息工程大学,郑州 450001
    2.河南省信息安全重点实验室,郑州 450001
  • 出版日期:2022-08-15 发布日期:2022-08-15

Overview on Technology of Security Handover in Aerospace Network

HAN Mengda, CAO Lifeng, LEI Yihan, DU Xuehui   

  1. 1.Information Engineering University, Zhengzhou 450001, China
    2.Henan Province Key Laboratory of Information Security, Zhengzhou 450001, China
  • Online:2022-08-15 Published:2022-08-15

摘要: 空天网络是天地一体化信息网络建设的重要组成部分,存在着网络高度暴露、节点高速运动、计算资源受限以及链路间歇连通等特点,给信息安全技术在空天网络的应用带来挑战,特别是节点的高速运动而带来的安全切换问题是实现节点可信保持、确保业务连续性的关键。在对空天网络切换分析的基础上,对空天网络节点的安全切换进行研究、分析与归纳,契合空天网络切换流程划分了安全切换的阶段过程,从切换感知、接入基站选择、切换认证等三个阶段阐述了当前的研究进展,给出了对比分析。最后对空天网络安全切换关键技术进行了总结,并对技术研究进行了展望。

关键词: 天地一体化信息网络, 空天网络, 接入认证, 安全切换

Abstract: The aerospace network is an important part of the construction of a space-ground integrated information network. It has the characteristics of high exposure of the network, high-speed movement of nodes, limited computing resources, and intermittent link connectivity, which pose challenges to the application of information security technology in the aerospace network. In particular, the problem of secure handover caused by the high-speed movement of the node is the key of achieving the credibility of the node and ensuring the continuity of the business. Based on the analysis of aerospace network handover, this paper studies, analyzes and summarizes the security handover of aerospace network nodes, and divides the phases of security handover according to the aerospace network handover process. The current research progress is expounded from three stages of handover perception, access base station selection and handover authentication, and a comparative analysis is given. Finally, the key technologies of aerospace network security handover are summarized, and the technical research is prospected.

Key words: space-ground integrated information network, aerospace network, authentication of access, security handover