Chinese Space Science and Technology ›› 2025, Vol. 45 ›› Issue (5): 183-196.doi: 10.16708/j.cnki.1000-758X.2025.0069

Previous Articles    

A trusted satellite access and transmission mechanism based on verification technology

DING Yi1,WANG Yang1,GUO Wenxin1,CHENG Zijing2,LI Jie1,JIN Jun1,*   

  1. 1.School of Information, Beijing Wuzi University, Beijing 101149, China
    2.Space Star Technology Co., Ltd., Beijing 100094, China
  • Received:2025-02-24 Revision received:2025-05-30 Accepted:2025-06-06 Online:2025-08-05 Published:2025-10-01

Abstract: Satellite communication is an indispensable part of modern communication network, and its trustworthiness is essential to ensure the reliable and accurate transmission. This paper proposes a trusted satellite access and data transmission mechanism, aiming at the area of channel resource allocation and the transmission of critical information within satellite communication system. Firstly, to address the challenge of trust related to channel allocation caused by the scarcity of satellite resources, a verification model for the execution of channel allocation policy is constructed based on verifiable technology to verify whether the policy is executed correctly. Secondly, to mitigate the risks of tampering and attacks during the transmission of vital information such as remote sensing images and navigation data, a verifiable data transmission model is designed by using the methods of verifiable technology, encryption and distributed secure transmission, etc., thereby enhancing the integrity and authenticity of the transmitted data. On the basis of these models, instance designs for satellite communication system are explored: a satellite channel allocation system and a secure satellite data transmission system. The former ensures openness, transparency and verifiability of the channel allocation, while the latter ensures the security and accuracy of data transmission. Security analysis and experimental results show that the proposed mechanism can effectively detect such threats as policy tampering, data eavesdropping, and spoofing attacks, with only minimal computational overhead. The mechanism meets the dual requirements of security and efficiency in practical applications, providing both theoretical support and practical demonstration for building a trusted satellite communication network.

Key words: satellite communication, verifiable random function, channel allocation, data transmission, double verification method