The research on security technology of CCSDS-TC Protocol

Hong Chen,Na Zhou,Xiaojun Tong,Jie Liu
DOI: https://doi.org/10.13232/j.cnki.jnju.2018.03.009
2018-01-01
Abstract:Owing to the inherent openness of the spatial links,consultative committee for space data systems(CCSDS) space communication system is faced with security threats such as eavesdropping,tampering and camouflage.It is significant to study the security protocol and security technology of link layer in CCSDS.Firstly,this paper studies the security technology such as encryption technology,authentication technology and authentication encryption technology based on Telecommand(TC)space data link protocol of CCSDS space communication system.This paper also analyzes the services for users provided by TC protocol,the protocol data unit of TC protocol and the protocol implementation procedures.Then,this paper researches the security services such as encryption service, authentication service and authentication encryption service provided by space data link security(SDLS)protocol for the CCSDS link layer and protocol execution procedures of SDLS.The implementation and simulation of the TC protocol with SDLS protocol are carried out and TC services such as virtual channel packet extraction and virtual channel multiplexing are conducted by using OPNET network simulation platform,which supports obj ect-oriented modeling and provides finite state machines to model protocols and other processes.The correctness and feasibility of applying security technology such as AES encryption technology,SHA-256 authentication technology and GCM authentication encryption technology to TC protocol through SDLS protocol are verified.The results show that the security technology such as encryption,authentication and authentication encryption used in the SDLS protocol can provide security protection for the CCSDS link layer protocol.The encryption technology,authentication technology and authentication encryption technology provide security technical support and indispensable security guarantee for real space communication network.
What problem does this paper attempt to address?