Research on the data link layer secure protocol of TES network based on ECC

A workable and efficient data link layer security protocol had been proposed on the need of safety information transfer requirements of the TES system.The protocol provides a software registration solution for the remote sites and a information encryption method base on the elliptic curves cryptogra...

Full description

Saved in:
Bibliographic Details
Main Authors: WU Zhi-jun, KAN Hong-tao
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74650242/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537627259404288
author WU Zhi-jun
KAN Hong-tao
author_facet WU Zhi-jun
KAN Hong-tao
author_sort WU Zhi-jun
collection DOAJ
description A workable and efficient data link layer security protocol had been proposed on the need of safety information transfer requirements of the TES system.The protocol provides a software registration solution for the remote sites and a information encryption method base on the elliptic curves cryptography(ECC) algorithm as well as a combined key allocation method.The protocol takes the characters of the TES system into account,improves its ability to identify remote sites,and provides ways to prevent information stealing and network attacks.
format Article
id doaj-art-8334bad271264d64a88b9ac877ec58c6
institution Kabale University
issn 1000-436X
language zho
publishDate 2009-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-8334bad271264d64a88b9ac877ec58c62025-01-14T08:27:36ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-0130869274650242Research on the data link layer secure protocol of TES network based on ECCWU Zhi-junKAN Hong-taoA workable and efficient data link layer security protocol had been proposed on the need of safety information transfer requirements of the TES system.The protocol provides a software registration solution for the remote sites and a information encryption method base on the elliptic curves cryptography(ECC) algorithm as well as a combined key allocation method.The protocol takes the characters of the TES system into account,improves its ability to identify remote sites,and provides ways to prevent information stealing and network attacks.http://www.joconline.com.cn/zh/article/74650242/satellite communicationTES networksecurity protocolECC
spellingShingle WU Zhi-jun
KAN Hong-tao
Research on the data link layer secure protocol of TES network based on ECC
Tongxin xuebao
satellite communication
TES network
security protocol
ECC
title Research on the data link layer secure protocol of TES network based on ECC
title_full Research on the data link layer secure protocol of TES network based on ECC
title_fullStr Research on the data link layer secure protocol of TES network based on ECC
title_full_unstemmed Research on the data link layer secure protocol of TES network based on ECC
title_short Research on the data link layer secure protocol of TES network based on ECC
title_sort research on the data link layer secure protocol of tes network based on ecc
topic satellite communication
TES network
security protocol
ECC
url http://www.joconline.com.cn/zh/article/74650242/
work_keys_str_mv AT wuzhijun researchonthedatalinklayersecureprotocoloftesnetworkbasedonecc
AT kanhongtao researchonthedatalinklayersecureprotocoloftesnetworkbasedonecc