Improvement of Key Exchange Protocol to prevent Man-in-the-middle Attack in the Satellite Environment

被引:0
|
作者
Song, In-A [1 ]
Lee, Young-Seok [1 ]
机构
[1] Kunsan Natl Univ, Dept Informat & Telecommun Engn, Kunsan, South Korea
关键词
Diffie-Hellman; Key Exchange Protocol; Timestamp; Satellite Communication; AGREEMENT SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Satellite communication is easily exposed to attacks like eavesdropping of information, abnormal sending of packet, reusing of message, forgery/alteration of data etc. To prevent these attacks, Key Exchange protocol is conducted between NCC (Network Control Centre) and RCST (Return Channel Satellite Terminal). ETSI (European Telecommunication Standards Institute) designed a Main Key Exchange protocol exchanging keys through cookie-based user authentication. Exposure of data at the early time when NCC and RCST exchange cookies, however, brings Man-in-the-middle attack. Replay attack is also possible because it doesn't make any encryption during data transmission. Though Certificate-based protocol was suggested to prevent Man-in-the-middle attack, it is not appropriate for satellite environment. This paper suggests the protocol which can prevent Man-in-the-middle attack using Timestamp, and compare the proposed protocol with existing protocols through performance analysis, showing its resource management and the efficiency of communication. The procedure of preventing Man-in-the-middle attack of the suggested protocol is examined through safety analysis, and it can prevent Replay attack with addition of ID parameter.
引用
收藏
页码:408 / 413
页数:6
相关论文
共 50 条
  • [1] A Novel Key Exchange Protocol Provably Secure Against Man-in-the-Middle Attack
    Chowdhury, Abhijit
    Nath, Shubhajit
    Howlader, Jaydeep
    [J]. NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 : 275 - 280
  • [2] Preventing Man-In-The-Middle Attack in Diffie-Hellman Key Exchange Protocol
    Khader, Aqeel Sahi
    Lai, David
    [J]. 2015 22ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2015, : 204 - 208
  • [3] Advanced Protocol to Prevent Man-in-the-middle Attack in SCADA System
    Oh, Sangkyo
    Chung, Hyunji
    Lee, Sangjin
    Lee, Kyungho
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 1 - 8
  • [4] Man-in-the-Middle Attack to the HTTPS Protocol
    Callegati, Franco
    Cerroni, Walter
    Ramilli, Marco
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (01) : 78 - 81
  • [5] Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack
    Anna M. Johnston
    Peter S. Gemmell
    [J]. Journal of Cryptology, 2002, 15 : 139 - 148
  • [6] Authenticated key exchange provably secure against the man-in-the-middle attack
    Johnston, AM
    Gemmell, PS
    [J]. JOURNAL OF CRYPTOLOGY, 2002, 15 (02) : 139 - 148
  • [7] Strengthening Megrelishvili Protocol Against Man-in-The-Middle Attack
    Arzaki, Muhammad
    [J]. 2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 274 - 280
  • [8] RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack
    Zhai, Li
    Wu, ChuanKun
    [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 41 - 47
  • [9] Deniable Authentication Protocol Resisting Man-in-the-Middle Attack
    Han, Song
    Liu, Wanquan
    Chang, Elizabeth
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 161 - 164
  • [10] Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution
    Alhazmi, Shatha
    Kandel, Prashanna
    Sabovik, Jayne
    Matondo-Mvula, Nadine
    Elleithy, Khaled
    [J]. 2023 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, LISAT, 2023,