An efficient provably secure authentication and key agreement protocol for satellite communication networks

被引:0
|
作者
Thakur, Garima [1 ]
Obaidat, Mohammad S. [2 ,3 ,4 ,5 ]
Sharma, Piyush [1 ]
Prajapat, Sunil [1 ]
Kumar, Pankaj [1 ]
机构
[1] Cent Univ Himachal Pradesh, Srinivasa Ramanujan Dept Math, Dharamshala 176206, India
[2] Univ Jordan, King Abdullah Sch Informat Technol 2, Amman, Jordan
[3] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
[4] SRM Univ, Sch Comp, Dept Computat Intelligence, Kattankulathur, Tamil Nadu, India
[5] Amity Univ, Sch Engn, Noida, Uttar Pradesh, India
来源
关键词
authentication; BAN logic; satellite communications; session key agreement; SCHEME; VERIFICATION;
D O I
10.1002/spy2.404
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The leverage of satellite resources to establish a communication network offers a wide range of benefits, including the capability to support news gathering, broadcasting, and aeronautical and maritime tracking. The unique aspects of the satellite-linked terrestrial network provide high-speed services, dependable and consistent network quality, and comprehensive geographic coverage of remote regions. Unfortunately, these structural features also render the network vulnerable to unauthorized intrusion, potentially leading to significant disruptions. Consequently, the implementation of authentication measures presents an appealing solution for enhancing the overall service quality of this network. Recently, Kumar et al. presented an authentication and key agreement scheme for satellite communications. Strikingly, their scheme proves inadequate in safeguarding against several malicious attacks and reveals certain design weaknesses. In this article, we present a reliable and secure authentication protocol that takes advantage of the complexities inherent in the elliptic curve discrete logarithm problem. We assess the protocol's effectiveness against various types of attacks using formal proof, Burrows-Abadi-Needham logic, informal descriptive proof analysis, and the verification tool SCYTHER. Furthermore, we compare the computational, communication, and storage overhead of our proposed protocol to an existing one, demonstrating its efficiency and superiority.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] An efficient and provably secure key agreement scheme for satellite communication systems
    Zhang, Yuanyuan
    Zhai, Zhibo
    [J]. PLOS ONE, 2021, 16 (04):
  • [2] Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
    Srinivas, Jangirala
    Mishra, Dheerendra
    Mukhopadhyay, Sourav
    Kumari, Saru
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 875 - 895
  • [3] Provably secure biometric based authentication and key agreement protocol for wireless sensor networks
    Jangirala Srinivas
    Dheerendra Mishra
    Sourav Mukhopadhyay
    Saru Kumari
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 875 - 895
  • [4] An efficient key agreement protocol for secure authentication
    Kim, YS
    Huh, EN
    Hwang, J
    Lee, BW
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 746 - 754
  • [5] A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN
    Gupta, Ankur
    Tripathi, Meenakshi
    Sharma, Aakar
    [J]. COMPUTER COMMUNICATIONS, 2020, 160 : 311 - 325
  • [6] An efficient key agreement and authentication protocol for secure communication in industrial IoT applications
    R. Vinoth
    Lazarus Jegatha Deborah
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 1431 - 1443
  • [7] An efficient key agreement and authentication protocol for secure communication in industrial IoT applications
    Vinoth, R.
    Deborah, Lazarus Jegatha
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (3) : 1431 - 1443
  • [8] A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
    Tan Zuowen
    [J]. CHINA COMMUNICATIONS, 2011, 8 (02) : 26 - 33
  • [9] A Lightweight, Efficient, and Physically Secure Key Agreement Authentication Protocol for Vehicular Networks
    Wang, Shaoqiang
    Fan, Ziyao
    Su, Yu
    Zheng, Baosen
    Liu, Zhaoyuan
    Dai, Yinfei
    [J]. ELECTRONICS, 2024, 13 (08)
  • [10] A new provably secure authentication and key agreement protocol for SIP using ECC
    Wu, Liufei
    Zhang, Yuqing
    Wang, Fengjiao
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 286 - 291