Validation of authentication protocols for mobile satellite systems

被引:0
|
作者
Beheshtifard, Saeed [1 ]
机构
[1] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
关键词
D O I
暂无
中图分类号
Q81 [生物工程学(生物技术)]; Q93 [微生物学];
学科分类号
071005 ; 0836 ; 090102 ; 100705 ;
摘要
In recent times, a variety of protocols have been proposed so as to provide security for mobile satellite communication systems. These protocols should be tested to check their functional correctness before they are used practically. A variety of security protocols for the mobile satellite communication system have been proposed. The present study analyzes three most known authentication protocols for mobile satellite communication system from the security perspective regarding data DE synchronization attack. Data DE synchronization attacks on these protocols were tested and analyzed regarding strand spaces testing model. In addition, the improvements for the purpose of overcoming the security vulnerabilities of two protocols are mentioned.
引用
收藏
页码:1517 / 1521
页数:5
相关论文
共 50 条
  • [21] Benefits of Using Mobile Ad-Hoc Network Protocols in Federated Satellite Systems for Polar Satellite Missions
    Ruiz-De-Azua, Joan A.
    Camps, Adriano
    Auge, Anna Calveras
    [J]. IEEE ACCESS, 2018, 6 : 56356 - 56367
  • [22] Mobile satellite systems
    Lamminen, H
    [J]. JOURNAL OF TELEMEDICINE AND TELECARE, 1999, 5 (02) : 71 - 83
  • [23] Secure ubiquitous authentication protocols for RFID systems
    Morshed, Md Monzur
    Atkins, Anthony
    Yu, Hongnian
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2012,
  • [24] Lightweight Anonymous Authentication Protocols for RFID Systems
    Chen, Min
    Chen, Shigang
    Fang, Yuguang
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (03) : 1475 - 1488
  • [25] Secure ubiquitous authentication protocols for RFID systems
    Md Monzur Morshed
    Anthony Atkins
    Hongnian Yu
    [J]. EURASIP Journal on Wireless Communications and Networking, 2012
  • [26] Distributed authentication systems enhanced by quantum protocols
    Kapczynski, Adrian
    Sobota, Marcin
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 928 - 931
  • [27] Security flaws in authentication and key establishment protocols for mobile communications
    Shim, K
    Lee, YR
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (01) : 62 - 74
  • [28] A Progressive Approach to Design Authentication Protocols for Mobile Heterogeneous Networks
    Kenaza, Tayeb
    Aiash, Mahdi
    Loo, Jonathan
    Lasebae, Aboubaker
    Whitney, Gill
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1776 - 1781
  • [29] Efficient end-to-end authentication protocols for mobile networks
    Chang, CH
    Tu, K
    Chen, KC
    [J]. PIMRC'96 - THE SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PROCEEDINGS, VOLS 1-3, 1996, : 1252 - 1256
  • [30] Simulation and Analysis of Authentication Protocols for Mobile Internet of Things (MIoT)
    Kumar, Adarsh
    Gopal, Krishna
    Aggarwal, Alok
    [J]. 2014 INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2014, : 423 - 428