Improvement of Key Exchange Protocol to prevent Man-in-the-middle Attack in the Satellite Environment

被引:0
|
作者
Song, In-A [1 ]
Lee, Young-Seok [1 ]
机构
[1] Kunsan Natl Univ, Dept Informat & Telecommun Engn, Kunsan, South Korea
关键词
Diffie-Hellman; Key Exchange Protocol; Timestamp; Satellite Communication; AGREEMENT SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Satellite communication is easily exposed to attacks like eavesdropping of information, abnormal sending of packet, reusing of message, forgery/alteration of data etc. To prevent these attacks, Key Exchange protocol is conducted between NCC (Network Control Centre) and RCST (Return Channel Satellite Terminal). ETSI (European Telecommunication Standards Institute) designed a Main Key Exchange protocol exchanging keys through cookie-based user authentication. Exposure of data at the early time when NCC and RCST exchange cookies, however, brings Man-in-the-middle attack. Replay attack is also possible because it doesn't make any encryption during data transmission. Though Certificate-based protocol was suggested to prevent Man-in-the-middle attack, it is not appropriate for satellite environment. This paper suggests the protocol which can prevent Man-in-the-middle attack using Timestamp, and compare the proposed protocol with existing protocols through performance analysis, showing its resource management and the efficiency of communication. The procedure of preventing Man-in-the-middle attack of the suggested protocol is examined through safety analysis, and it can prevent Replay attack with addition of ID parameter.
引用
收藏
页码:408 / 413
页数:6
相关论文
共 50 条
  • [31] Man-in-the-Middle Attack Mitigation in Internet of Medical Things
    Salem, Osman
    Alsubhi, Khalid
    Shaafi, Aymen
    Gheryani, Mostafa
    Mehaoua, Ahmed
    Boutaba, Raouf
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (03) : 2053 - 2062
  • [32] A stealthy man-in-the-middle attack strategy for switched systems
    Sun, Dawei
    Hwang, Inseok
    Goppert, James
    [J]. INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2024, 55 (06) : 1206 - 1223
  • [33] Toward a hardware man-in-the-middle attack on PCIe bus
    Khelif, Mohamed Amine
    Lorandel, Jordane
    Romain, Olivier
    Regnery, Matthieu
    Baheux, Denis
    Barbu, Guillaume
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2020, 77
  • [34] Analyzing the technique of a man-in-the-middle attack based on Bluetooth
    Qin, Xiang-Lin
    [J]. Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (08): : 1159 - 1162
  • [35] Man-in-the-middle attack against cyber-physical systems under random access protocol
    Zhang, Xiao-Guang
    Yang, Guang-Hong
    Wasly, Saud
    [J]. INFORMATION SCIENCES, 2021, 576 : 708 - 724
  • [36] Detecting Man-in-the-Middle Attack in Fog Computing for Social Media
    Aliyu, Farouq
    Sheltami, Tarek
    Mahmoud, Ashraf
    Al-Awami, Louai
    Yasar, Ansar
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1159 - 1181
  • [37] Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack
    Arnaldy, Defiana
    Perdana, Audhika Rahmat
    [J]. 2019 2ND INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2019): ARTIFICIAL INTELLIGENCE ROLES IN INDUSTRIAL REVOLUTION 4.0, 2019, : 188 - 192
  • [38] Nino Man-In-The-Middle attack on Bluetooth Secure Simple Pairing
    Hypponen, Konstantin
    Haataja, Keijo M. J.
    [J]. 2007 THIRD IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET, 2007, : 64 - 68
  • [39] Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP
    Chen, Zhe
    Guo, Shize
    Zheng, Kangfeng
    Li, Haitao
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 263 - +
  • [40] Comprehensive Demonstration of Man-in-the-Middle Attack in PDC and PMU Network
    Swain, Kamakshi Prashadini
    Tiwari, Amit
    Sharma, Ankush
    Chakrabarti, Saikat
    Karkare, Amey
    [J]. 2022 22ND NATIONAL POWER SYSTEMS CONFERENCE, NPSC, 2022,