Abstract
U.S. NASA, European ESA, Japanese NASDA and other institutions all have adopted the CCSDS as space communication standards; CCSDS has shown the latest technological developments in space communication system. This paper analyzed security threats in space communications system. The TC data protection methods were summarized firstly, then the performance of several encryption algorithms used in TC protocol was compared. SCPS-SP protocol and SCPS-SP data security process were introduced also. At last, an interoperation method between SCPS –SP and IPSec will be put forward.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
CCSDS 132.0-B-1 TM space data Link protocol, Recommendation for Space Data System Standards. Blue Book, Issue 1, Washington, DC, CCSDS (September 2003)
CCSDS 132.0-B-1 TC space data Link protocol, Recommendation for Space Data System Standards. Blue Book, Issue 1, Washington, DC, CCSDS (September 2003)
CCSDS 732.0-B-2 AOS Space Data Link protocol, Recommendation for Space Data System Standards. Blue Book, Issue 2, Washington, DC, CCSDS (July 2006)
CCSDS 713.0-B-1 Space Communications Protocol Specification(SCPS)-Network protocol(SCPS-NP), Recommendation for Space Data System Standards. Blue Book, Issue 1, Washington, DC, CCSDS (May 1999)
CCSDS 713.5-B-1 Space Communications Protocol Specification(SCPS)-Security protocol(SCPS-SP), Recommendation for Space Data System Standards. Blue Book, Issue 2, Washington, DC, CCSDS (July 2006)
CCSDS 714.0-B-2 Space Communications Protocol Specification(SCPS)- Transport protocol(SCPS-TP), Recommendation for Space Data System Standards. Blue Book, Issue 2, Washington, DC, CCSDS (July 2006)
CCSDS 717.0-B-1 Space Communications Protocol Specification (SCPS)-File Protocol (SCPS-FP), Recommendation for Space Data System Standards. Blue Book, Issue 1, Washington, DC, CCSDS (May 1999)
CCSDS 350.0-G-1 the Application of CCSDS Protocols to Secure Systems, Report concerning space data System standards. Green Book, Issue1, Washington DC, CCSDS, (March 1999)
CCSDS 232.0.B-l,TC Space data link protocol. Washington, USA, National Aeronautics Space Administration (2003)
Spinsante S, Chiaraluce F, Gambi E. New Perspectives in Telecommand Security: The Application of EAX to TC Segment s. In: Proc. Data Systems in Aerospace (DASIA), Naples, Italy (2007)
Horster, P., Michels, M., Petersen, H.: Authenticated encryption schemes with low communication costs. Electronics Letters 30(15), 1212–1213 (1994)
Lee, W., Chang, C.: Authenticated encryption scheme without using a one-way function. Electronics Letters 31(19), 1656–1657 (1995)
Chen, K.: Signature with message recovery. Electronics Letters 34(20), 1934 (1998)
Zheng, Y.: Digital signcryption or how to achieve cost (Signature & encryption) < < cost(Signature) + cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)
Whiting D, Housley R, and Ferguson. Counter with CBC-MAC (CCM). IETF Network working Group, Request For Comments, 3610 (September 2003)
Bellare, M., Rogaway, P., Wagner, D.: The EAX mode of operation. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 389–407. Springer, Heidelberg (2004)
McGrew, D.A., Viega, J.: The security and performance of the galois/Counter mode (GCM) of operation. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 343–355. Springer, Heidelberg (2004)
Kohno, T., Viega, J., Whiting, D., The, C.W.C.-A.E.S.: dual-use mode. Internet Draft, Cryto Form Research Group (May 20, 2003) (work in progress)
Huang, Z., Li, L., Mi, X.-m., Gu, X.-m.: Space Communication Protocol Specification (SCPS) and Application: Status, Problem and Prospect. Telecommunication Engineering 47(06), 8–11 (2007)
Duan, X.-f., An, H.-z., Xie, S.-m.: Space Communi-cation Security Protocols. Communications Technology 42(12), 101–102 (2009)
Liu, Y., Dong, Y., Li, Z.-h.: Discussion of Data Security about Space-Earth All-in-One Networking and Analysis of CCSDS SCPS. Chinese Space Science and Technology 1, 35–36 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chang-Qing, G., Ya-Hui, Y. (2011). Research on the Authenticated Encryption Technology in CCSDS. In: Zeng, D. (eds) Applied Informatics and Communication. ICAIC 2011. Communications in Computer and Information Science, vol 224. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23214-5_43
Download citation
DOI: https://doi.org/10.1007/978-3-642-23214-5_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23213-8
Online ISBN: 978-3-642-23214-5
eBook Packages: Computer ScienceComputer Science (R0)