Font Size: a A A

The Research On Network Security Control Technique During Transfer Of Integrated Navigation Information

Posted on:2010-08-25Degree:MasterType:Thesis
Country:ChinaCandidate:B ZhaoFull Text:PDF
GTID:2132360275478677Subject:Navigation, guidance and control
Abstract/Summary:PDF Full Text Request
In the currently international situation, the military network communication is the foundation of the information development of military system, and also the key to ensure the victory of the war in the sea. So it is very important to protect the secure transfer of information for the navigation information with high secret in the information system used by warship.At present there are several kinds of network transport secure protocols which are used frequently, such as SSH, SSL, and so on. SSL protocol provides higher security to data transport services, but due to the need to build their own server certificates and other reasons, this protocol does not suitable for secure transfer of the navigation information in the military network. SSH protocol is a protocol for secure remote login and other secure network services in an insecure network. It provides support of secure remote login, the secure file transfer, the access control and port forwarding. In this paper, a method based on the SSH protocol to implement the secure application of TCP/IP was gave.Cryptography is the science how to study the theory of secret communication and the method of decoding. This article researched on the symmetric key system, the asymmetric key system, digital signature algorithm, and so on, and finally gave mixed encryption algorithm and improved digital signature algorithm to adapt to the requirements the navigation information transport for the military applications. The mixed encryption algorithm and the improved digital signature algorithm are suit for the security of the navigation information transport. So they can be the suitable methods for transmission.Authentication is a technology which is based on security encryption algorithm. It can guarantee the safety of login; prevent the hacker's attacks as the middle-men, or the password attacks. It plays a key role in the security transport. Through researching on the one-time password authentication technology, this article gives the design and realization of one-time password authentication module based on the MD5 algorithm. In this paper, the security data transmission system designed is mainly used in the security of the navigation information transmission, and an emergency of rapid communication and security forces for a variety of command and transmission of information security. It provides a new solution for the security transmission of the navigation information in the military network.
Keywords/Search Tags:integrated navigation, security, authentication, encryption, secure channel
PDF Full Text Request
Related items