The present invention relates to satellite communication data security technology, particularly to a satellite in-orbit secure anomaly detection method.
As the application range of satellite communication networks continues to expand, the demand for satellite communication is also increasing. Satellite internet is receiving unprecedented attention. The launch of thousands of low-cost satellites into space poses greater challenges to the security of satellite communication. The abundance of inexpensive satellites makes it easier for hackers to conduct intrusion experiments. Once a hacker group completes an intrusion operation on a satellite, it becomes easy to launch large-scale satellite intrusions. Hackers can arbitrarily control satellites, even refusing to provide services, and can also disrupt social infrastructure such as power grids and water supply systems through signal interference and deception. Currently, research on satellite network security is still in its infancy. Research on cryptographic protocols applied in satellite networks mainly focuses on three aspects: secure transmission protocols for satellite communication networks, secure routing algorithms in satellite networks, and secure mobile management mechanisms in satellite networks.
Secure transmission protocols for satellite communication networks: The secure transmission protocols for satellite communication networks mainly rely on the design of key distribution and key management frameworks to achieve confidentiality, integrity, and availability on the transmission links, ensuring that the transmitted data is not eavesdropped on, tampered with, or destroyed during transmission.
Secure routing algorithms in satellite networks: To ensure the security of the routing process, cryptographic technology is used to authenticate and verify the integrity of information. To build and maintain secure routing, it is necessary to achieve security requirements that are verifiable, confidential, and non-repudiable.
Secure mobile management mechanisms in satellite networks: The process of secure mobility management includes secure handover and secure location management, with security requirements involving mutual authentication, key establishment, and the separation of key forward and backward.
At present, Low Earth Orbit (LEO) satellites have become a hot topic for researchers both domestically and internationally. This is because LEO satellites provide new solutions for communication in areas not covered by terrestrial networks. By utilizing the on-orbit computing and storage resources of LEO satellites, real-time monitoring and observation services can be provided for remote areas. Through connection with ground stations, monitoring data can be transmitted in real-time and processed and analyzed in orbit. It is also necessary to protect the monitored data. Existing satellite network security technologies based on cryptographic protocols focus on the security protection of the satellite communication process, and no research has been found on the protection of the on-orbit data processing process. Moreover, the existing satellite network protection technologies mainly protect the authenticity and confidentiality of the star-ground link and inter-satellite link, and there is a lack of research on the security protection technology for satellite collaborative computing. Therefore, on the one hand, existing technical solutions cannot ensure the security of satellite on-orbit data and the security of satellite collaborative computing. On the other hand, existing privacy set intersection protocols are relatively complex and require multiple rounds of interaction, with high computational and communication overhead, which is not suitable for situations where satellite resources are limited.
Generally, offshore wind farms are located in sea areas more than 10 kilometers away from the coast, where operator signals cannot cover the signal area of the offshore wind farm, and there are difficulties in communication between the sea and the land. The traditional management method through manual inspection requires a large investment of manpower costs for sailors and also requires the expenditure of expensive ship rental fees, and the data obtained lacks continuity and real-time nature. Therefore, in order to meet the various needs of offshore resource development, for areas such as offshore wind farms that terrestrial communication networks cannot cover, satellite communication can only be used to meet the real-time supervision needs of remote managers on site. At present, LEO satellites have become a hot topic for researchers both domestically and internationally because they can provide new solutions for communication in areas not covered by terrestrial communication networks, such as offshore wind farms. In the LEO satellite constellation, each satellite can provide communication for terminals within its coverage range, and if the communication target is not within the coverage range, cross-domain communication can be achieved through inter-satellite links. The satellite edge computing system is an on-orbit platform shared by the remote observation and monitoring industry, which can achieve identification and processing of images and data on the satellite platform, only returning key information or alarm information, instead of all observation results.
Since LEO satellites are an on-orbit platform shared by the remote monitoring industry, offshore wind farms are usually composed of a large number of wind turbines and corresponding sensors. Protecting the security of these sensor data is very important. This data is commercial data and is related to energy security. Hackers or attackers will analyze the data to find the weak links of key components and physically damage the infrastructure of the wind farm. Therefore, it is necessary to protect the data transmitted to the satellite and processed on the satellite. To ensure the reliability and security of data transmission and processing for offshore wind farms, to ensure the stable operation of the wind farm, and to promote the development and utilization of clean energy, it is necessary to address the security threats of satellite edge computing. As mentioned earlier, existing satellite network protection technologies mainly protect the communication links of the satellite network, focusing on the authenticity and confidentiality of the star-ground link and inter-satellite link. They establish mutual trust between various entities in the satellite network through various authentication protocols and key establishment protocols. However, there is relatively little research on the security protection of data in satellite collaborative computing. Moreover, satellite network security technologies based on cryptographic protocols mainly focus on the security of the satellite communication process, mainly focusing on the design of key distribution and management of the satellite system, the security of the routing process, and the security of star-ground and satellite switching. However, there is insufficient research on the protection of the on-orbit data processing process. Due to the significant limitations of on-board resources of satellites, the energy supply of satellites usually depends on solar panels, and the computing power, storage capacity, and power are usually limited. They cannot meet the energy consumption requirements of high computational complexity public key systems. Deploying a security system under the condition of limited satellite resources is an urgent problem to be solved.
At the same time, completing the on-orbit anomaly data identification of LEO satellites while protecting data security is also an urgent problem to be solved.
It should be noted that the information disclosed in the above background technology section is only used for understanding the background of this application, and therefore can include information that does not constitute existing technology known to ordinary technicians in the field.
The main objective of the present invention is to overcome the deficiencies of the aforementioned background technology and provide a satellite in-orbit secure anomaly detection method for offshore wind farms.
To achieve the aforementioned purpose, the present invention employs the following technical solution:
A satellite in-orbit secure anomaly detection method for offshore wind farms, comprising a system initialization phase, an anomaly data organization phase, and an anomaly data intersection phase;
Furthermore, the system initialization phase includes:
Furthermore, the anomaly data organization phase includes:
Furthermore, the anomaly data intersection phase includes:
Furthermore, the first type of satellite and the second type of satellite are Low Earth Orbit LEO satellites.
A system for in-orbit secure anomaly detection for offshore wind farms using satellites, characterized by comprising a trusted authority center, the first type of satellite, and the second type of satellite, wherein the system implements the secure anomaly detection of anomaly data for offshore wind farms using the satellite in-orbit secure anomaly detection method.
A computer-readable storage medium storing a computer program, characterized by: when the computer program is executed by a processor, it implements the satellite in-orbit secure anomaly detection method.
The present invention has the following beneficial effects:
In response to the challenges mentioned earlier, the invention proposes a method for secure anomaly detection while the satellite is in orbit, specifically for offshore wind farm scenarios. This method can achieve secure anomaly data identification while protecting the confidentiality of the offshore wind farm's data. The method of the invention utilizes existing cryptographic technology and multi-party secure computation technology, making it suitable for situations where satellite resources are limited, and enables efficient and secure on-orbit data processing.
The use of the invention can effectively achieve secure anomaly detection for on-orbit data in offshore wind farm scenarios, with the main advantages including: first, ensuring that the true values of the wind farm's anomaly data are only accessible to the remote managers of the wind farm and the offshore access points; second, ensuring the security and confidentiality of the data transmitted during the collaborative computation between satellites to find the intersection of anomaly data; and third, achieving efficient and secure collaborative data processing by satellites, greatly reducing computational and communication overhead.
The method of the invention uses an XOR filter and a simple private set intersection protocol to achieve secure on-orbit anomaly detection. The method first generates an XOR filter using all anomaly data and uses the fingerprint of the XOR filter to complete the interaction process of the simple private set intersection protocol, significantly reducing on-orbit computational and communication overhead through the combination with the XOR filter.
The anomaly detection method of the invention meets the security requirements for confidentiality, allowing satellites to only learn the intersection results of two sets without knowing the true values of the data in the two sets, nor the true values of the intersection data.
Other beneficial effects of the embodiment of the invention will be further described in the following text.
The following provides a detailed description of the implementation of the invention. It should be emphasized that the description is exemplary and does not limit the scope and application of the invention.
It should be noted that when a component is referred to as “fixed to” or “mounted on” another component, it can be directly on the other component or indirectly on that other component. When a component is referred to as “connected to” another component, it can be directly connected to the other component or indirectly connected to that other component. Additionally, the connection can serve both to fix and to couple or communicate.
It is understood that terms indicating direction or positional relationships such as “length,” “width,” “top,” “bottom,” “front,” “back,” “left,” “right,” “vertical,” “horizontal,” “top,” “bottom,” “inside,” “outside,” etc., are based on the directional or positional relationships shown in the accompanying drawings. They are used merely for the purpose of describing the embodiment of the invention and simplifying the description, rather than indicating or implying that the device or component referred to must have a specific orientation, be constructed and operated in a specific orientation. Therefore, they should not be understood as limiting the invention.
Furthermore, the terms “first” and “second” are used solely for descriptive purposes and should not be understood as indicating or implying relative importance or the quantity of the technical features indicated. Thus, features specified as “first” and “second” may explicitly or implicitly include one or more of such features. In the description of the embodiment of the invention, the term “multiple” means two or more unless otherwise specifically limited.
XOR filters provide efficient data insertion and querying. In this invention, XOR filters are used for rapid filtering of data items. Given an array B with a capacity c slightly larger than the length of the set S ∈ U, for example: c=└1.23·|S|┘+32, U represents all possible sets. A random fingerprint function f(·) is selected to map each item in the set U to a k bits value. The XOR filter mainly consists of two functions:
XOR. Build(S,f(·)→{B,(h0,h1,h2)}: Given a set S and a fingerprint function f(·), it repeatedly selects three hash functions, namely (h0(·):S→{0, . . . , c/3−1}, h1(·):S→{c/3, . . . , 2c/3−1}, h2(·):S=→{2c/3, . . . , c−1}), until it successfully identifies the array B and hash functions allocated to the set S, and outputs the array B and hash functions.
XOR. Test(x,B)→True/False: Given an element x ∈ S, if it satisfies f(x)=B[h0(x)] xor B[h1(x)] xor B[h2 (x)], it outputs True, otherwise it outputs False.
Given security parameters k, 1,
2 and
T are cyclic groups that satisfy |q|=k.
Bilinearity: ∀P, Q ∈ G, and ∀a, b ∈ q, it can be obtained e(aP, bQ)=e(P,Q)ab.
Non-degeneracy: There exists P, Q ∈ G, such that e(P, Q)≠1G
Computability: ∀P, Q ∈ G, there is an effective algorithm to calculate ∀P, Q ∈ G.
A bilinear parameter generator gen(·) refers to a probabilistic algorithm that takes parameter K as input and outputs a septuple (q, 1,
2,
T, e, P, Q). Among them, q represents a large prime number that satisfies |q|=k,
1,
2 is an additive cyclic group,
T is a multiplicative cyclic group, P ∈
1 and Q ∈
2 are generators, and e:
1×
2→
T is a bilinear mapping that satisfies non-degeneracy and computability.
The coverage of terrestrial communication networks (wireless networks and fixed telephones) is limited, while LEO satellites can provide communication services and remote monitoring services for remote areas that terrestrial communication networks cannot cover. This invention proposes an inter-satellite on-orbit secure anomaly detection scheme for LEO satellites, as shown in
An embodiment of the present invention provides a satellite in-orbit secure anomaly detection method for offshore wind farms, which includes a system initialization phase, an anomaly data organization phase, and an anomaly data intersection phase;
In a preferred embodiment, the system initialization phase includes:
In a preferred embodiment, the anomaly data organization phase includes:
In a preferred embodiment, the anomaly data intersection phase includes:
An embodiment of the present invention also provides a system for in-orbit secure anomaly detection for offshore wind farms using satellites, which includes a trusted authority center, the first type of satellite, and the second type of satellite, wherein the system implements the secure anomaly detection of anomaly data for offshore wind farms using the satellite in-orbit secure anomaly detection method.
The satellite in-orbit secure anomaly detection method of the present invention meets the security requirements for confidentiality, allowing satellites to only learn the intersection results of two sets without knowing the true values of the data in either set, nor the true values of the intersection data. The method of the invention utilizes an XOR filter and a simple private set intersection protocol to achieve secure on-orbit anomaly detection, generating an XOR filter using all anomaly data, and using the fingerprint of the XOR filter to complete the interaction process of the simple private set intersection protocol, significantly reducing on-orbit computational and communication overhead by combining the XOR filter.
The following further describes specific embodiments of the present invention.
To achieve efficient on-orbit secure identification of anomaly data for offshore wind farms, an embodiment of the present invention proposes a method for secure anomaly detection while the satellite is in orbit.
The implementation process of the satellite in-orbit secure anomaly detection method of the present invention is divided into three parts: 1) system initialization; 2) anomaly data organization; 3) anomaly data intersection. The processing flow is as follows:
In the system initialization phase, the remote manager of the offshore wind farm is assumed to be the trusted authority center TA. The trusted authority center TA will perform the following steps to generate the entire system.
(1) Given the security parameter k, the trusted authority center TA calls the bilinear parameter generator gen(k) to generate parameters (q, 1,
2,
T, e, P, Q), where P ∈
1, Q ∈
2.
(2) The trusted authority center TA selects three hash functions H(·): {0,1}*→q, H1(·):{0,1}*→
1, H2(·): {0,1}*→
2.
(3) The trusted authority center TA initializes the XOR filter, selects a fingerprint function with an output of k bits, and simultaneously selects a sufficiently large array to create the XOR filter, initializing it to 0.
During the registration phase of the first type of satellite Sata, the trusted authority center TA first computes the identity-based sequence {right arrow over (u)}a=(ua,1, ua,2, . . . , ua,l)=(α·H1(ida), α2·H2(ida), . . . , α1·H2(ida)), where 1=2k is the size of the fingerprint. The trusted authority center TA also securely sends the sequence da to the first type of satellite Sata. When the second type of satellite Satb registers, the trusted authority center TA generates an identity-based key ub=α·H2(idb), and securely sends it to the second type of satellite Satb. During the construction phase of the offshore wind farm, the component supplier o selects a key s, and sends it to the offshore wind farm.
The remote manager of the offshore wind farm organizes all anomaly data from all component suppliers to generate a protected sequence of data items, for example, X=(x1, x2, . . . , xm). Where if xi(i ∈ {1, 2, . . . , m}) belongs to supplier o, the protected data item is represented as xi=H(ai∥so∥Tk), where ai is a potentially anomalous value, Tk denotes the identifier for time period k, and is sent to the first type of satellite Sata via the ground station. To securely and efficiently compute the anomaly detection process, the first type of satellite Sata performs the following steps:
Secondly, the first type of satellite Sata selects a random number ra ∈ *q, and calculates the element Ra=ra·(Σi=0l
q is derived from P(Fa,i)=(α+f1)(α+f2) . . . (α+fl
At time Tk, the offshore access point collects sensor data from all components of the offshore wind farm, represented as Y=(y1, y2, . . . , yn). The data item generated by supplier o is represented as yj=H(bj∥so∥Tk), j ∈ {1, 2, . . . , n}.
Upon receiving msg1, the second type of satellite Satb moves to the vicinity of the offshore access point and receives the Y data sequence. To calculate the intersection of X and Y, the second type of satellite Satb first generates two empty sets, defined as Yb ∈ Ø, Fb ∈ Ø. For each data item yj ∈ Y, the second type of satellite Satb checks XOR.Test(yj, Ba)=True/False. If the result is True, the second type of satellite Satb stores yj in the set Yb. For each data item yj ∈ Yb, the second type of satellite Satb calculates the fingerprint fj=f(yj), and stores it in the data set Fb. For each fingerprint fd ∈ Fb, d ∈ {1, . . . , lb}, the second type of satellite Satb selects a random number td ∈ *q, chooses a random permutation function π:[lb]→[lb], and generates (Td, Ud), that is
Furthermore, for each fingerprint fd, the second type of satellite Satb generates a set Zd=(zd,1, za,2, . . . , zd,v), where zd,i=H(yπ(d),i∥e(H2(idb)t
Upon receiving msg2, the first type of satellite Sata performs the following steps. For d ∈ {1,2, . . . , 1b}, the first type of satellite Sata checks whether all fingerprints fd exist in the set Zd, that is
If the above equation holds, then the first type of satellite Sata determines whether each data item xπ(d),j(∀j ∈ {1, 2, . . . , w}) exists in the set Zd, that is
If the above equation holds, the first type of satellite Sata places xx (d),j in the final intersection set Ps, ultimately obtaining the set Ps=X ∩ Y={p1, p2, . . . , pe} as the identified anomaly data.
In summary, the present invention proposes a method for secure anomaly detection on-orbit for LEO satellites, which can complete the secure anomaly data identification on-orbit for LEO satellites while protecting the confidentiality of data from offshore wind farms. The method of the invention utilizes existing cryptographic technology and multi-party secure computation technology, making it suitable for situations where satellite resources are limited, and achieves efficient and secure on-orbit data processing. In this method, satellites can only learn the intersection results of the two sets and cannot know the true values of the data in either set, nor the true values of the intersection data, meeting the security requirements for confidentiality. The anomaly data identification using the XOR filter and a simple private set intersection protocol, along with the fingerprint of the XOR filter to complete the interaction process of the simple private set intersection protocol, significantly reduces computational and communication overhead.
The use of this invention can effectively achieve secure anomaly detection for on-orbit data in scenarios of offshore wind farms, with the main advantages including: first, ensuring that the true values of the wind farm's anomaly data are only accessible to the remote managers of the wind farm and the offshore access points; second, ensuring the security and confidentiality of the data transmitted during the collaborative computation between satellites to find the intersection of anomaly data; third, achieving efficient and secure collaborative data processing by satellites, greatly reducing computational and communication overhead.
The present invention also provides a storage medium for storing a computer program that, when executed, performs at least the methods described above.
The present invention also provides a control device comprising a processor and a storage medium for storing a computer program, wherein the processor, when executing the computer program, performs at least the methods described above.
The present invention also provides a processor that executes a computer program, which performs at least the methods described above.
The storage medium can be implemented by any type of volatile or non-volatile storage device, or a combination thereof. Non-volatile memory can be Read Only Memory (ROM), Programmable Read-Only Memory (PROM), Erasable Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Ferromagnetic Random Access Memory (FRAM), Flash Memory, magnetic storage, optical discs, or Compact Disc Read-Only Memory (CD-ROM); magnetic storage can be disk drives or tape drives. Volatile memory can be Random Access Memory (RAM), used as external high-speed cache. By way of non-limiting example, many forms of RAM are available, such as Static Random Access Memory (SRAM), Synchronous Static Random Access Memory (SSRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (DDR SDRAM), Enhanced Synchronous Dynamic Random Access Memory (ESDRAM), SyncLink Dynamic Random Access Memory (SLDRAM), Direct Rambus Random Access Memory (DRRAM). The storage medium described in the present invention is intended to include, but is not limited to, these and any other suitable types of memory.
In the several embodiments provided by the present invention, it should be understood that the disclosed systems and methods can be implemented in other ways. The device embodiments described above are merely exemplary; for example, the division of the units is only a logical functional division, and other division methods can be used in actual implementation, such as combining multiple units or integrating them into another system, or some features can be ignored or not executed. In addition, the coupling or direct coupling, or communication connections between the various components shown or discussed can be through some interfaces, indirect coupling or communication connections of devices or units, and can be electrical, mechanical, or other forms.
The units described above as separate components can be, or can also not be, physically separate. The components shown as units can be, or can also not be, physical units, that is, they can be located in one place or distributed across multiple network units; parts or all of the units can be selected according to actual needs to achieve the purpose of the present embodiment.
Furthermore, in the various embodiments of the present invention, the functional units can all be integrated into one processing unit, or each unit can be a separate unit on its own, or two or more units can be integrated into one unit; the above-integrated units can be implemented in the form of hardware, or in the form of hardware plus software functional units.
Ordinary technicians in the field can understand that: all or part of the steps of the above-mentioned method embodiments can be completed by hardware related to program instructions, the aforementioned programs can be stored in a computer-readable storage medium, and the program performs the steps of the above-mentioned method embodiments when executed; and the aforementioned storage medium includes: mobile storage devices, Read-Only Memory (ROM), Random Access Memory (RAM), magnetic disks, or optical discs, and various other media that can store program code.
Alternatively, if the integrated units of the present invention are implemented in the form of software functional modules and sold or used as independent products, they can also be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present invention, or the part that contributes to the existing technology, can be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for a computer device (which can be a personal computer, server, or network device, etc.) to perform all or part of the methods described in the various embodiments of the present invention. And the aforementioned storage medium includes: mobile storage devices, ROM, RAM, magnetic disks, or optical discs, and various other media that can store program code.
The methods disclosed in the several method embodiments provided by the present invention can be combined in any way that does not conflict to obtain new method embodiments.
The features disclosed in the several product embodiments provided by the present invention can be combined in any way that does not conflict to obtain new product embodiments.
The features disclosed in the several method or device embodiments provided by the present invention can be combined in any way that does not conflict to obtain new method embodiments or device embodiments.
The above content is a further detailed explanation of the present invention in conjunction with specific preferred embodiments, and it should not be construed that the specific implementation of the present invention is limited to these descriptions. For technicians in the technical field of the present invention, as long as they do not depart from the conception of the present invention, they can also make several equivalent substitutions or obvious modifications, and those with the same performance or purpose should be considered as falling within the scope of protection of the present invention.
Number | Date | Country | Kind |
---|---|---|---|
2023115462267 | Nov 2023 | CN | national |
This application is a continuation application of PCT/CN filed on 2023 Dec. 1, which claims priority to CN patent application NO. CN202311546226.7 filed on 2023 Nov. 20. The contents of the above-mentioned application are all hereby incorporated by reference.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/CN2023/135747 | Dec 2023 | WO |
Child | 18929295 | US |