An efficient provably secure authentication and key agreement protocol for satellite communication networks

被引:0
|
作者
Thakur, Garima [1 ]
Obaidat, Mohammad S. [2 ,3 ,4 ,5 ]
Sharma, Piyush [1 ]
Prajapat, Sunil [1 ]
Kumar, Pankaj [1 ]
机构
[1] Cent Univ Himachal Pradesh, Srinivasa Ramanujan Dept Math, Dharamshala 176206, India
[2] Univ Jordan, King Abdullah Sch Informat Technol 2, Amman, Jordan
[3] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
[4] SRM Univ, Sch Comp, Dept Computat Intelligence, Kattankulathur, Tamil Nadu, India
[5] Amity Univ, Sch Engn, Noida, Uttar Pradesh, India
关键词
authentication; BAN logic; satellite communications; session key agreement; SCHEME; VERIFICATION;
D O I
10.1002/spy2.404
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The leverage of satellite resources to establish a communication network offers a wide range of benefits, including the capability to support news gathering, broadcasting, and aeronautical and maritime tracking. The unique aspects of the satellite-linked terrestrial network provide high-speed services, dependable and consistent network quality, and comprehensive geographic coverage of remote regions. Unfortunately, these structural features also render the network vulnerable to unauthorized intrusion, potentially leading to significant disruptions. Consequently, the implementation of authentication measures presents an appealing solution for enhancing the overall service quality of this network. Recently, Kumar et al. presented an authentication and key agreement scheme for satellite communications. Strikingly, their scheme proves inadequate in safeguarding against several malicious attacks and reveals certain design weaknesses. In this article, we present a reliable and secure authentication protocol that takes advantage of the complexities inherent in the elliptic curve discrete logarithm problem. We assess the protocol's effectiveness against various types of attacks using formal proof, Burrows-Abadi-Needham logic, informal descriptive proof analysis, and the verification tool SCYTHER. Furthermore, we compare the computational, communication, and storage overhead of our proposed protocol to an existing one, demonstrating its efficiency and superiority.
引用
收藏
页数:22
相关论文
共 50 条
  • [31] A Secure and Efficient Authentication Protocol for Satellite-Terrestrial Networks
    Liu, Yang
    Ni, Leiqing
    Peng, Mugen
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (07) : 5810 - 5822
  • [32] A secure authentication with key agreement scheme using ECC for satellite communication systems
    Qi, Mingping
    Chen, Jianhua
    Chen, Yitao
    INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2019, 37 (03) : 234 - 244
  • [33] A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
    Wu, Fan
    Xu, Lili
    Kumari, Saru
    Li, Xiong
    Das, Ashok Kumar
    Khan, Muhammad Khurram
    Karuppiah, Marimuthu
    Baliyan, Renuka
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3527 - 3542
  • [34] Provably Secure Mutual Authentication and Key Agreement Scheme with User Anonymity
    Hwang, Tzonelih
    Gope, Prosanta
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [35] Provably Secure and Lightweight Authentication Key Agreement Scheme for Smart Meters
    Chai, Sheng
    Yin, Haotian
    Xing, Bin
    Li, Zhukun
    Guo, Yunyi
    Zhang, Di
    Zhang, Xin
    He, Da
    Zhang, Jie
    Yu, Xiaoling
    Wang, Wei
    Huang, Xin
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (05) : 3816 - 3827
  • [36] A provably secure authenticated key agreement protocol for wireless communications
    Guo, Hua
    Xu, Chang
    Mu, Yi
    Li, Zhoujun
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (03) : 563 - 572
  • [37] An authentication and key agreement protocol for satellite communications
    Chang, Chin-Chen
    Cheng, Ting-Fang
    Wu, Hsiao-Ling
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) : 1994 - 2006
  • [38] Provably secure cross-domain authentication key agreement protocol based on heterogeneous signcryption scheme
    Tao, Fushou
    Shi, Ting
    Li, Shijin
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 2261 - 2266
  • [39] Provably secure group authentication and key agreement for machine type communication using Chebyshev's polynomial
    Roychoudhury, Probidita
    Roychoudhury, Basav
    Saikia, Dilip Kumar
    COMPUTER COMMUNICATIONS, 2018, 127 : 146 - 157
  • [40] An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks
    Ma, Mimi
    He, Debiao
    Wang, Huaqun
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8065 - 8075