A novel authentication and key-agreement scheme for satellite communication network

被引:22
|
作者
Altaf, Izwa [1 ]
Akram, Muhammad Arslan [1 ]
Mahmood, Khalid [1 ]
Kumari, Saru [2 ]
Xiong, Hu [3 ]
Khan, Muhammad Khurram [4 ]
机构
[1] COMSATS Univ Islamabad, Dept Comp Sci, Islamabad, Punjab, India
[2] Chaudhary Charan Singh Univ, Dept Math, Meerut, Uttar Pradesh, India
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Peoples R China
[4] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
关键词
USER AUTHENTICATION; PROTOCOL;
D O I
10.1002/ett.3894
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In these days, satellite communication networks are playing a significant role in facilitating the crucial infrastructural services that include environmental monitoring, electronic surveillance, public safety, intelligence operations for law enforcement, government agencies, and the military. However, security researchers have uncovered that many protocols for these satellite communication networks have some vulnerabilities and flaws that can allow remote attackers to intercept, block, and manipulate critical communication over the network. Therefore, in this article, we introduce an efficient and simple authentication key agreement protocol for securing mobile satellite communication systems. Our proposed protocol resists against denial of service, smart-card stolen, replay, user impersonation, and stolen verifier attack. Furthermore, our protocol provides various functionality features like perfect-forward secrecy, mutual-authentication, dynamic identity, and session-key agreement. Moreover, the performance analysis of our protocol shows that the communication and computation cost of the proposed protocol is far less than the existing protocols. Hence, our proposed protocol offers simple, efficient, secure authentication, and key agreement for mobile satellite systems.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Communication Lower Bounds of Key-Agreement Protocols via Density Increment Arguments
    Huang, Mi-Ying
    Mao, Xinyu
    Yang, Guangxu
    Zhang, Jiapeng
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2023, PT III, 2023, 14371 : 185 - 206
  • [42] The Diffle-Hellman key-agreement scheme in the strand-space model
    Herzog, JC
    [J]. 16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, : 234 - 247
  • [43] Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network
    Koya, Aneesh M.
    Deepthi, P. P.
    [J]. COMPUTER NETWORKS, 2018, 140 : 138 - 151
  • [44] A lightweight authentication and key agreement scheme for smart grid
    Yan, Lili
    Chang, Yan
    Zhang, Shibin
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (02):
  • [45] An Efficient Mutual Authentication and Symmetric Key Agreement Scheme for Wireless Body Area Network
    Chunka, Chukhu
    Banerjee, Subhasish
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2021, 46 (09) : 8457 - 8473
  • [46] Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN
    Zheng, Lu
    Feng, Tao
    Su, Chunhua
    [J]. Tongxin Xuebao/Journal on Communications, 2024, 45 (06): : 101 - 116
  • [47] An Efficient Mutual Authentication and Symmetric Key Agreement Scheme for Wireless Body Area Network
    Chukhu Chunka
    Subhasish Banerjee
    [J]. Arabian Journal for Science and Engineering, 2021, 46 : 8457 - 8473
  • [48] Robust Remote Mutual Authentication Scheme with Key Agreement
    Chou, Chih-Ho
    Tsai, Kuo-Yu
    Wu, Tzong-Chen
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (07): : 1283 - 1289
  • [49] Security Analysis of the PACE Key-Agreement Protocol
    Bender, Jens
    Fischlin, Marc
    Kuegler, Dennis
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 33 - 48
  • [50] An improved remote user authentication scheme with key agreement
    Kumari, Saru
    Khan, Muhammad Khurram
    Li, Xiong
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1997 - 2012