Improvement of Key Exchange Protocol to prevent Man-in-the-middle Attack in the Satellite Environment

被引:0
|
作者
Song, In-A [1 ]
Lee, Young-Seok [1 ]
机构
[1] Kunsan Natl Univ, Dept Informat & Telecommun Engn, Kunsan, South Korea
关键词
Diffie-Hellman; Key Exchange Protocol; Timestamp; Satellite Communication; AGREEMENT SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Satellite communication is easily exposed to attacks like eavesdropping of information, abnormal sending of packet, reusing of message, forgery/alteration of data etc. To prevent these attacks, Key Exchange protocol is conducted between NCC (Network Control Centre) and RCST (Return Channel Satellite Terminal). ETSI (European Telecommunication Standards Institute) designed a Main Key Exchange protocol exchanging keys through cookie-based user authentication. Exposure of data at the early time when NCC and RCST exchange cookies, however, brings Man-in-the-middle attack. Replay attack is also possible because it doesn't make any encryption during data transmission. Though Certificate-based protocol was suggested to prevent Man-in-the-middle attack, it is not appropriate for satellite environment. This paper suggests the protocol which can prevent Man-in-the-middle attack using Timestamp, and compare the proposed protocol with existing protocols through performance analysis, showing its resource management and the efficiency of communication. The procedure of preventing Man-in-the-middle attack of the suggested protocol is examined through safety analysis, and it can prevent Replay attack with addition of ID parameter.
引用
收藏
页码:408 / 413
页数:6
相关论文
共 50 条
  • [21] Secret key generation based on private pilot under man-in-the-middle attack
    Yu HUANG
    Liang JIN
    Na LI
    Zhou ZHONG
    Xiaoming XU
    [J]. Science China(Information Sciences), 2017, 60 (10) : 93 - 106
  • [22] Modeling of Man-in-the-Middle Attack in the Wireless Networks
    Chen, Zhe
    Guo, Shize
    Zheng, Kangfeng
    Yang, Yixian
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2255 - 2258
  • [23] Using JPCAP to prevent man-in-the-middle attacks in a local area network environment
    [J]. Fayyaz, F. (faheem.fayyaz@hotmail.com), 2012, Institute of Electrical and Electronics Engineers Inc. (31):
  • [24] Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
    Yao Z.
    Zhu Z.
    Ye G.
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (08): : 103 - 110
  • [25] On the Security of HB# against a Man-in-the-Middle Attack
    Ouafi, Khaled
    Overbeck, Raphael
    Vaudenay, Serge
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 108 - 124
  • [26] Man-in-the-middle attack on quantum secure communications with authentication
    Lin, Tzu Han
    Hwang, Tzonelish
    [J]. QUANTUM INFORMATION PROCESSING, 2014, 13 (04) : 917 - 923
  • [27] Detection of Stealth Man-In-The-Middle Attack in Wireless LAN
    Kumar, Vikas
    Chakraborty, Sandip
    Barbhuiya, Ferdous A.
    Nandi, Sukumar
    [J]. 2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 290 - 295
  • [28] Man-in-the-middle Pilot Attack for Physical Layer Authentication
    Wang Shaoyu
    Huang Kaizhi
    Xu Xiaoming
    Ma Keming
    Chen Yajun
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (11) : 3141 - 3148
  • [29] Man-in-the-middle attack on quantum secure communications with authentication
    Tzu Han Lin
    Tzonelish Hwang
    [J]. Quantum Information Processing, 2014, 13 : 917 - 923
  • [30] Defending Against Man-In-The-Middle Attack in Repeated Games
    Li, Shuxin
    Li, Xiaohong
    Hao, Jianye
    An, Bo
    Feng, Zhiyong
    Chen, Kangjie
    Zhang, Chengwei
    [J]. PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 3742 - 3748