Anti-hijacking detection signal authentication method
Technical Field
The invention relates to the technical field of remote detection,
in particular, the invention relates to an anti-hijack detection signal authentication method.
Background
With the continuous development of aerospace technologies, the requirements of various applications such as ground high-resolution remote sensing and space astronomical observation on the comprehensive performance of a spacecraft are higher and higher, and a detection platform with high pointing accuracy and high stability index needs to be explored urgently to meet the requirements of future spacecraft development.
The microsatellite or the high-altitude unmanned aerial vehicle has the advantages of flexibility, low cost and short period, and the development of miniaturized remote sensing detection instruments is more and more at present, for example, Chinese patent invention patent CN110920934A provides a structure of a ground remote sensing satellite, which comprises a platform cabin, a load cabin, a star sensor, a ground remote sensing camera, a ground data transmission antenna, a firework unlocking device, a magnetic suspension actuator and a satellite and rocket separation device, wherein the magnetic suspension actuator is used for controlling the attitude of the load cabin after the load cabin is separated from the platform cabin; the remote ground sensing camera is used for carrying out high-resolution imaging observation on the ground; the ground data transmission antenna is used for transmitting the detection data of the ground remote sensing camera to the ground receiving station; the firer unlocking device is used for connecting the platform cabin and the load cabin when the satellite is launched, detonating after the satellite enters the orbit and removing the constraint on the load cabin; the satellite and rocket separation device is used for connecting the satellite and the carrier rocket during launching, and the separation of the satellite and the carrier rocket is realized after the satellite enters the orbit. The invention realizes the physical isolation of the load cabin and the platform cabin, avoids the interference of the platform cabin to the load cabin and can realize high-precision remote sensing observation to the ground.
However, the above remote sensing detection method still has the following disadvantages: the microsatellite or the high-altitude unmanned aerial vehicle has small volume and small transmission bandwidth, so the protection capability is small, and the possibility of interference, interception and even hijacking is realized in the signal transmission process, so that the ground acquisition device cannot acquire real detection target information or is acquired by other parties to acquire the detection target information, and once important information content is involved, the loss is large.
Therefore, in order to solve the above problems, it is necessary to design a reasonable anti-hijacking detection signal authentication method.
Disclosure of Invention
The invention aims to provide a simple and reasonable anti-hijacking detection signal authentication method which divides an authentication key into two parts, wherein a detection device does not know a passive part, and an interception device does not know an active part, so that the content in important signals is effectively prevented from being intercepted or hijacked, and the transmission security is higher.
In order to achieve the purpose, the invention is realized by adopting the following technical scheme:
an anti-hijacking detection signal authentication method comprises the following steps:
s1: dividing the authentication key into an active part and a passive part;
s2: when the detection device sends out the information of the detection target, a basic signal abstract is generated and sent, and the active part of the authentication key is also sent;
s3: the acquisition device acquires a signal and then performs preset demodulation on an active part of the authentication key;
s4: the acquisition device judges whether the matching degree of the active part of the demodulated authentication key and the passive part of the authentication key stored by the acquisition device is higher than a first threshold value or not, and if so, the active part and the passive part of the authentication key are sent back to the detection device; otherwise, returning to the step S2;
s5: the detection device acquires the combination of the active part and the passive part of the authentication key to obtain a complete authentication key, and completely encrypts detection target information according to the complete authentication key and then sends the detection target information;
s6: the acquisition device demodulates the acquired completely encrypted detection target information, judges whether the matching degree of the demodulated signal and the basic signal abstract is higher than a second threshold value or not, and if so, the detection target information is true; otherwise, the detection target information is false.
Preferably, in step S1, the active part and the passive part of the authentication key are independent authentication keys.
Preferably, in step S2, the basic signal summary is a symmetric digital signal.
Preferably, in step S3, the demodulating the active part of the authentication key includes forward demodulation and backward demodulation.
Preferably, when step S4 is executed, the obtaining device sequentially obtains the passive part of each stored authentication key, and compares the passive part with the active part of the demodulated authentication key, and only if the matching degree of forward demodulation and backward demodulation of the passive part of one authentication key and the active part of the authentication key is higher than the first threshold, the passive part of the authentication key and the obtained active part of the authentication key are sent back to the detecting device.
As a preferred embodiment of the present invention, when step S2 is executed, the detecting means deletes the active part of the original authentication key and accepts the active part of the new authentication key at predetermined intervals.
As a preferred embodiment of the present invention, in step S5, after the detecting device obtains the complete authentication key from the combination of the active part and the passive part of the authentication key, the detecting device does not accept the active part of the new authentication key before completely encrypting the signal of the detecting object according to the complete authentication key and then sending out the encrypted signal.
As a preferred embodiment of the present invention, when the detection target information is false, the detection device is marked and the active part of the new authentication key is no longer sent to the detection device in step S6.
The anti-hijacking detection signal authentication method has the beneficial effects that: the method is simple and reasonable, the authentication key is divided into two parts, the detection device does not know the passive part, the interception device does not know the active part, the content in the important signal is effectively prevented from being intercepted or hijacked, and the transmission safety is higher.
Drawings
Fig. 1 is a flow chart illustrating an anti-hijacking detection signal authentication method according to the present invention.
Detailed Description
The following are specific examples of the present invention and further describe the technical solutions of the present invention, but the present invention is not limited to these examples.
Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the modules and structures set forth in these embodiments does not limit the scope of the invention unless specifically stated otherwise.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the invention, its application, or uses.
Techniques, methods, and systems known to those of ordinary skill in the relevant art may not be discussed in detail, but are intended to be part of the specification where appropriate.
Example (b): as shown in fig. 1, which is only one embodiment of the present invention, an anti-hijacking detection signal authentication method includes the following steps:
s1: dividing the authentication key into an active part and a passive part;
s2: when the detection device sends out the information of the detection target, a basic signal abstract is generated and sent, and the active part of the authentication key is also sent;
s3: the acquisition device acquires a signal and then performs preset demodulation on an active part of the authentication key;
s4: the acquisition device judges whether the matching degree of the active part of the demodulated authentication key and the passive part of the authentication key stored by the acquisition device is higher than a first threshold value or not, and if so, the active part and the passive part of the authentication key are sent back to the detection device; otherwise, returning to the step S2;
s5: the detection device acquires the combination of the active part and the passive part of the authentication key to obtain a complete authentication key, and completely encrypts and then sends detection target information according to the complete authentication key;
s6: the acquisition device demodulates the acquired completely encrypted detection target information, judges whether the matching degree of the demodulated signal and the basic signal abstract is higher than a second threshold value or not, and if so, the detection target information is true; otherwise, the detection target information is false.
In step S1, the active part and the passive part of the authentication key are both independent authentication keys.
In step S2, the basic signal is summarized as a symmetric digital signal.
In step S3, demodulating the active portion of the authentication key includes forward demodulation and reverse demodulation.
When step S4 is executed, the obtaining device sequentially obtains the passive part of each stored authentication key, and compares the passive part with the active part of the demodulated authentication key, and sends the passive part of the authentication key and the active part of the obtained authentication key back to the detecting device only when the forward demodulation and reverse demodulation matching degrees of the passive part of one authentication key and the active part of the authentication key are higher than the first threshold.
When step S2 is executed, the detecting device deletes the active part of the original authentication key and accepts the active part of the new authentication key at predetermined intervals.
When step S5 is executed, after the detecting device obtains the complete authentication key from the combination of the active part and the passive part of the authentication key, it does not accept the active part of the new authentication key until the signal of the detected object is completely encrypted according to the complete authentication key and then sent out.
When the detection target information is false, the detection device is marked and the active part of the new authentication key is not sent to the detection device any more when step S6 is executed.
The anti-hijacking detection signal authentication method is simple and reasonable, the authentication key is divided into two parts, the detection device does not know the passive part, and the interception device does not know the active part, so that the content in the important signal is effectively prevented from being intercepted or hijacked, and the transmission safety is higher.
The present invention is not limited to the above-described specific embodiments, and various modifications and variations are possible. Any modifications, equivalents, improvements and the like made to the above embodiments in accordance with the technical spirit of the present invention should be included in the scope of the present invention.