首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 187 毫秒
1.
CCSDS遥控协议数据认证保护研究   总被引:1,自引:0,他引:1  
针对CCSDS体制中分包遥控(Telecommand)系统所面临的安全威胁,结合空间通信环境的特点,总结了对遥控协议数据进行认证性保护的技术方法,讨论了认证算法在分包遥控协议中的应用位置。为了避免认证算法与COP-1闭环之间的冲突,提出了在数据链路层COP-1闭环之前进行认证操作的方法。结合国内外相关领域的研究进展,分析了在分包遥控协议中应用SHA-256进行数据认证性保护的必要性与可用性。  相似文献   

2.
空间通信网络的开放性使其面临巨大的安全威胁,在空间遥控链路中应用认证或加密等密码学算法以增强空间遥控数据传输的安全性成为该领域的主要研究方向。由于CCSDS空间遥控链路COP-1协议与所加入的认证机制对传输错误均具有敏感性,而恶意攻击或信道误码均能引起数据接收端的重传请求,使得数据发送端无法对链路中的协议异常行为进行检测。该文提出了一种新的重传请求机制,改进了现有的COP-1传输控制协议,并建立了空间遥控链路中恶意攻击者的攻击行为模型,基于假设检验的策略提出了CCSDS空间遥控链路异常行为检测算法。仿真实验结果表明,所提出的算法能够在各种信道状态下准确、无误地检测到链路中攻击者的存在。  相似文献   

3.
随着FPGA、ASIC技术在卫星遥控遥测领域的广泛应用,使得地面对卫星遥测的动态性能得到很大改善的同时,地面接收到的遥测数据量也急剧增加,目前基于PCM的遥测信息流体制已经逐渐不能满足现行卫星遥测的需求,提出了基于CCSDS标准下的分包体制的遥测信息流设计思想,在详细分析分包遥测特点的基础上,结合卫星动态管理实现的要求,给出了分包遥测的具体设计方案及应用方法.  相似文献   

4.
天地通信链路是航天器与地面测控站之间的数据通道,数据的安全性对航天器非常重要。针对航天器天地通信链路长、易受干扰、数据量大的特点,提出了一种适于航天器天地通信用的CCSDS分包遥测策略。结合空间通信协议规范,设计了可用于航天器空间网络和地面环境通信的方法,并在天地通信链路中进行试验验证。结果表明,采用CCSDS分包遥测策略,通过空间通信网络下传的遥测数据可被地面正确的获取和解析。同时,通过模块化的软件设计,可方便地将CCSDS分包遥测策略移植于多种航天器型号中。  相似文献   

5.
为了保证遥控信息在有噪信道中可靠传输,结合传统的BCH码算法,根据查表法设计了一种符合分包遥控标准的快速BCH(63,56)译码方法.该译码方法相对简单,便于硬件实现,并通过FPGA对其进行设计、仿真及验证,结果证明,此译码设计具有计算速度快、占用资源少的特点,并且能应用到航天分包遥控通信中.  相似文献   

6.
CCSDS分包遥控协议分析   总被引:1,自引:0,他引:1  
空间数据系统委员会(CCSDS,Consultative Committee for Space Data System)所发布的标准在窄间数据通信领域起着极其重要的作用,很多标准已经转化为ISO国际标准。分包遥控(TC)协议主要用于地面对航天器的控制,其安全性和准确性对航天器至关重要。着重对TC协议进行通信进程演算(CCS),通过演算没有发现协议中有死锁与活锁等问题,为今后CCSDS协议(如PSLS)的开发提供了有效的分析方法。  相似文献   

7.
随着空间技术的蓬勃发展和航空航天合作的日益国际化,各国的空间卫星与空间站实现信息和数据的交互成为发展趋势,针对这项需求空间数据系统咨询委员会(CCSDS)提出了统一的空间通信标准(CCSDS标准)。现设计一种基于IP OVER CCSDS的合路器,合路器实现对数据的接收、封装和传输,针对链路流控制模块进行优化。使合路器性能有显著提高。  相似文献   

8.
Turbo码是一种性能优异且高效的信道编码方式,被空间数据系统咨询委员会(CCSDS)推荐为深空通信中可采用的信道编码方案之一。分析了Turbo码的编码和译码的基本原理,基于CCSDS给出的深空通信标准,设计并实现了Turbo码的编码和译码过程。通过Matlab软件仿真测试,初步探究了译码迭代次数、码率、译码算法等因素对误码率性能的影响,并对仿真结果进行了分析。  相似文献   

9.
航天器CCSDS遥测数据包处理方法研究   总被引:5,自引:0,他引:5  
杜冬梅 《电讯技术》2007,47(2):176-180
根据空间数据协商委员会(CCSDS)制定的标准,采用分包遥测数据格式,可利用航天器有限的遥测波道资源,合理、分时地将航天器各子系统的信息向地面传输,这就对地面遥测数据处理提出了新的、更高的要求.文中通过对CCSDS标准中分包遥测数据格式的分析,提出了解包思路和地面遥测数据处理系统的实现方法,并结合有关实战任务验证了该方法的合理性和可靠性.  相似文献   

10.
简要分析了空间数据系统咨询委员会(CCSDS,Consultative Committee for Space Data Systems)系列协议的特点。为了验证CCSDS根据空间数据通信特点提出的一系列建议中的网络层建议(SCPS-NP,Space Communications Protocol Specification—Network Protocol)的性能。通过OPNET通信仿真软件进行建模,基本实现了SCPS-NP协议要求的功能,对协议的性能进行了分析,对中国空间通信协议的发展方向提出了建议。  相似文献   

11.
We discuss some typical procedures to measure the efficiency of telecommand authentication systems in space missions. As a case‐study, the Packet Telecommand Standard used by the European Space Agency is considered. It is shown that, although acceptable under well consolidated evaluation suites, the standard presents some flaws particularly in regard to the randomness level of the pre‐signature. For this reason, some possible changes are proposed and evaluated that should be able to improve performance, even reducing the on‐board elaboration time.  相似文献   

12.
Compared with common near space satellite Telemetry, Telecommand, and Communication (TT&C), deep space TT&C presents a more challenging environment such as long distance, very low Signal to Noise Ratio (SNR). How to acquire main carrier exactly becomes a hot focus for deep space communications. Already there emerged some main carrier acquisition algorithms, but they all require high SNR and small modulation index. In this paper, we develop a new acquire algorithm. First we use the spectral energy center algorithm to shorten the original sequence, filter out some noise and make the spectral more symmetric. Then we adopt the spectral symmetry algorithm to make full use of the whole spectrum information, and utilize FFT to reduce computation complexity. Simulation results show that our algorithm can acquire main carrier successfully under large modulation index and get good performance with low Carrier to Noise Ratio (CNR).  相似文献   

13.
航天器上器件硬件资源和能量受限,对在测控系统中实现变速率解调所需的硬件资源提出了更高的要求。本文提出伪高倍速率解调和重复译码算法,在不降低采样率的情况下可实现不同符号率信号的解调。理论推导证明该方法可达到理想的解调误码性能,且耗费的硬件资源不到经典的DDC(Direct Digital Converter)芯片硬件资源的一半。计算机仿真和实际测试表明该方法能有效应用于微波统一测控系统的变速率解调。  相似文献   

14.
Efficient modeling techniques are required to accelerate design space exploration for integrated spiral inductors. In this letter, closed-form modeling techniques for the inductor's physical inductance and substrate eddy currents are introduced. The model provides several orders of magnitude performance improvement over field-solver-based approaches with typical errors of less than 4% while demonstrating excellent agreement with measured data from fabricated inductors  相似文献   

15.
Wireless communications for mobile telephone and data transmission is currently undergoing very rapid development. Code division multiple‐access (CDMA) implemented with direct sequence spread spectrum signaling is among the most promising multiplexing technologies for cellular telecommunications services. In this paper, jointly period inserted pilot symbols assisted recursive (PIPSAR) channel estimation and interference suppression techniques are proposed for uplink CDMA mobile communication systems. The uplink CDMA mobile communication system model is described in the form of space‐time domain through antenna array and multipath expression. Interference suppression is achieved by using adaptive minimum mean squared error (MMSE) digital filters that span several successive received chip oversampling vectors of a symbol interval. PIPSAR techniques are used to estimate channel parameters. The correlation between the successive periods is considered to further improve the performance of the proposed scheme. Analysis and simulations are used to evaluate the performance of the proposed scheme. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   

16.
Security is an important concern in any modern network. This also applies to Wireless Sensor Networks (WSNs), especially those used in applications that monitor sensitive information (e.g., health care applications). However, the highly constrained nature of sensors imposes a difficult challenge: their reduced availability of memory, processing power and energy hinders the deployment of many modern cryptographic algorithms considered secure. For this reason, the choice of the most memory-, processing- and energy-efficient security solutions is of vital importance in WSNs. To date, a number of extensive analyses comparing different encryption algorithms and key management schemes have been developed, while very little attention has been given to message authentication solutions. In this paper, aiming to close this gap, we identify cipher-based Message Authentication Codes (MACs) and Authenticated Encryption with Associated Data (AEAD) schemes suitable for WSNs and then evaluate their features and performance on a real platform (TelosB). As a result of this analysis, we identify the recommended choices depending on the characteristics of the target network and available hardware.  相似文献   

17.
One form of multimedia finding increasing utility in factory automation is stereo imaging. Its uses include remote operation, telepresence, and object positioning. Stereo imaging, with doubled frames, requires high data-rate collection and transmission. Image compression techniques can be utilized to reduce the transmission bandwidth and/or storage space requirements of the stereo pair. This paper develops image compression techniques specific to stereo imaging and compares the performance with nonstereo methods. Disparity compensated residual image coding exploits the redundancy between the two images in a stereo pair. Stereo residuals possess special features that can be exploited within a discrete cosine transform (DCT) image coding framework. Use of these features results in several decibels of performance enhancement across a range of scene types. This approach provides its best performance below 0.75 b/pixel bitrate for 8-b grayscale imagery and below 2 b/pixel for 24-b color imagery  相似文献   

18.
Time Petri nets (TPNs) have been widely used for the verification and validation of real-time systems during the software development process. Their quantitative analysis consists in applying enumerative techniques that suffer the well known state space explosion problem. To overcome this problem, several methods have been proposed in the literature, that either provide rules to obtain equivalent nets with a reduced state space or avoid the construction of the whole state space. In this paper, we propose a method that consists in computing performance bounds to predict the average operational behavior of TPNs by exploiting their structural properties and by applying operational laws. Performance bound computation was first proposed for timed (Timed PNs) and stochastic Petri nets (SPNs). We generalize the results obtained for Timed PNs and SPNs to make the technique applicable to TPNs and their extended stochastic versions: TPN with firing frequency intervals (TPNFs) and extended TPNs (XTPNs). Finally, we apply the proposed bounding techniques on the case study of a robot-control application taken from the literature.  相似文献   

19.
The two tasks involved in the design of VLSI systems, synthesizing the circuit and then analyzing it to verify the desired behavior and performance, are becoming intertwined, and performance constraints are being used to drive synthesis. This approach requires the ability to explore efficiently many design options and to find global optima over the several consistently aligned representation levels simultaneously. General requirements for performance-directed synthesis are characterized, followed by an overview of algorithms used for performance optimizations both within and between the several levels of representation. The need for techniques for simultaneous constraint optimization and a perspicuous characterization of the total design space is highlighted  相似文献   

20.
Optimum combining in digital mobile radio with cochannel interference   总被引:5,自引:0,他引:5  
This paper studies optimum signal combining for space diversity reception in cellular mobile radio systems. With optimum combining, the signals received by the antennas are weighted and combined to maximize the output signal-to-interference-plus-noise ratio. Thus, with cochannel interference, space diversity is used not only to combat Rayleigh fading of the desired signal (as with maximal ratio combining) but also to reduce the power of interfering signals at the receiver. We use analytical and computer simulation techniques to determine the performance of optimum combining when the received desired and interfering signals are subject to Rayleigh fading. Results show that optimum combining is significantly better than maximal ratio combining even when the number of interferers is greater than the number of antennas. Results for typical cellular mobile radio systems show that optimum combining increases the output signal-to-interference ratio at the receiver by several decibels. Thus, systems can require fewer base station antennas and/or achieve increased channel capacity through greater frequency reuse. We also describe techniques for implementing optimum combining with least mean square (LMS) adaptive arrays.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号