期刊文献+

云计算环境下舰船运行信息访问的身份认证系统设计 被引量:2

Design of identity authentication system for ship operational information access in cloud computing environment
下载PDF
导出
摘要 舰船运行具有保密性,在对舰船运行信息访问中进行身份认证,提高舰船信息安全防护能力,在云计算环境下提出基于椭圆曲线加密编码技术的舰船运行信息访问的身份认证方法。采用随机线性编码技术进行舰船运行信息的码元检测和数字证书设计,结合公钥加密机制进行云计算环境下的舰船运行信息的椭圆曲线加密,根据访问中的身份信息进行签名验证和身份匹配,构建数字签名系统进行舰船运行信息访问的身份认证和信息检索。仿真结果表明,采用该方法进行舰船运行信息访问的身份认证的保密性较好,访问者的身份信息与授权权限的匹配能力较强,,抗攻击能力强。 Ship operation has confidentiality, in the access to ship operation information identity authentication, improve the ship information security protection ability, In the cloud computing environment, an identity authentication method of ship running information access based on elliptic curve encryption coding technology is proposed, and random linear coding technology is used to detect and code ship running information. The elliptic curve encryption of ship running information in cloud computing environment is carried out with public key encryption mechanism, and the signature verification and identity matching are carried out according to the identity information in the access. A digital signature system is constructed for identity authentication and information retrieval of ship operation information access. The simulation results show that this method has good confidentiality for ship running information access. The identity of the visitor and the ability to match the authorization.
作者 华学兵
出处 《舰船科学技术》 北大核心 2018年第5X期148-150,共3页 Ship Science and Technology
关键词 云计算环境 舰船运行信息 访问 身份认证 cloud computing environment ship operation information access identity authentication
  • 相关文献

参考文献3

二级参考文献29

  • 1郝玉洁,冯银付,赖攀.基于指纹识别的VPN身份认证研究[J].计算机应用,2009,29(2):350-352. 被引量:6
  • 2李端,钱富才,李力,高建军.动态规划问题研究[J].系统工程理论与实践,2007,27(8):56-64. 被引量:30
  • 3KARLOF C, SASTRY N, WAGNER D. TinySec : a link layer security architecture for wireless sensor networks [ C ]// Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems. Baltimore, USA, 2004. 被引量:1
  • 4CASADO L, TSIGAS P. ContikiSec: a secure network layer for wireless sensor networks under the Contiki operating system[C]// The 14th Nordic Conference on Secure IT Systems. Oslo, Norway, 2009. 被引量:1
  • 5BANDIRMALI N, ERTURK I. WSNSec: a scalable data link layer security protocol for WSNs [ J ]. Ad Hoc Net-works, 2012, 10(1) : 37-45. 被引量:1
  • 6PU Chuanchin, CHUNG Wanyoung. Group key update method for improving RC4 stream cipher in wireless sensor networks [C]//ICCIT'07. [S.l.], 2007. 被引量:1
  • 7TSUNOO Yukiyasu, SAITO Teruo, KUBO Hiroyasu, et al. a distinguishing attack on a fast software-implemented RC4- Like stream cipher [ J ]. IEEE Transactions on Information Theory, 2007, 53( 9): 3250-3255. 被引量:1
  • 8GRASSBERGER P, PROCACCIA I. Characterization of strange attractors [ J]. Physical Review Letters, 1983, 50 (5) : 346-349. 被引量:1
  • 9FARMER J D, SIDOROWICH J J. Predicting chaotic time series [ J ]. Physical Review Letters, 1987, 59 (8) : 845- 848. 被引量:1
  • 10董小龙,孙金标,焉彬.基于HLA仿真的空战动态效能评估研究[J].电光与控制,2009,16(3):17-20. 被引量:5

共引文献36

同被引文献18

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部