A NEW EFFICIENT KEY AGREEMENT SCHEME FOR VSAT SATELLITE COMMUNICATIONS BASED ON ELLIPTIC CURVE CRYPTOSYSTEM

被引:0
|
作者
Hong, Jeong-Woo [1 ]
Yoon, Sang-Yoon [1 ]
Park, Dong-In [1 ]
Choi, Myung-Jin [2 ]
Yoon, Eun-Jun [3 ]
Yoo, Kee-Young [3 ]
机构
[1] Korea Inst Sci & Technol Informat, Taejon 305806, South Korea
[2] Korea Aerosp Res Inst, Satellite Informat Res Inst, Taejon 305333, South Korea
[3] Kyungpook Natl Univ, Sch Elect Engn & Comp Sci, Taegu 702701, South Korea
来源
INFORMATION TECHNOLOGY AND CONTROL | 2011年 / 40卷 / 03期
关键词
authentication; VSAT; key agreement; satellite communication; elliptic curve cryptosystem; NETWORKS; TECHNOLOGY; SECURITY; SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A satellite communication is suitable for broadcasting service and long-hual transmission based on telecommunications. In the satellite communication environment, unauthorized user should not have to obtain his/her required services from the satellite communication systems without authentication. Therefore, authentication is an important security technique to prevent illegal service requests. Quite recently, Lee-Lin-Hwang [C. C. Lee, T. C. Lin, M. S. Hwang. A key agreement scheme for satellite communications, Information Technology and Control, 2010, Vol. 39, No. 1, 43-47.] proposed a secure scheme based on key agreement scheme with mutual authentication to solve the security problems on the VSAT satellite communications. However, Lee-Lin-Hwang's scheme is inefficiently designed because it is based on the RSA cryptosystem. Therefore, the scheme cannot be applicable for the low-power satellite communication environments because it involves high communication and computation costs. Based on these motivations, this paper proposes a new efficient and secure key agreement scheme for VSAT satellite communications based on elliptic curve cryptosystem (ECC) to minimize the complexity of computational costs between VSAT and HUB and fit VSAT satellite communication environments. Compared with previous schemes, the newly proposed scheme has the following more practical merits: (1) it provides secure session key agreement function by adopting elliptic curve cryptosystem, (2) it can reduce the total execution time and memory requirement due to the elliptic curve cryptography, and (3) it not only is secure against well-known cryptographical attacks but also provides perfect forward secrecy. As a result, the proposed scheme is extremely suitable for use in satellite communication environments since it provides security, reliability, and efficiency.
引用
收藏
页码:252 / 259
页数:8
相关论文
共 50 条
  • [1] A SECURE AND EFFICIENT AUTHENTICATION WITH KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Qu, Juan
    Feng, Yuming
    Huang, Yi
    [J]. ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2015, (34): : 101 - 112
  • [3] Remote mutual authentication and key agreement scheme based on elliptic curve cryptosystem
    Yoon, Eun-Jun
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2011, 19 (03) : 335 - 347
  • [4] A highly efficient threshold key escrow scheme based on elliptic curve cryptosystem
    Zhang, Wenjuan
    Yu, Meisheng
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 1177 - 1180
  • [5] A Highly Efficient Threshold Key Escrow Scheme Based on Elliptic Curve Cryptosystem
    Zhang, WenJuan
    Yu, MeiSheng
    [J]. ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 2, 2008, : 527 - 532
  • [6] A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem
    Shen, Han
    Kumar, Neeraj
    He, Debiao
    Shen, Jian
    Chilamkurti, Naveen
    [J]. JOURNAL OF SUPERCOMPUTING, 2016, 72 (09): : 3588 - 3600
  • [7] A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem
    Han Shen
    Neeraj Kumar
    Debiao He
    Jian Shen
    Naveen Chilamkurti
    [J]. The Journal of Supercomputing, 2016, 72 : 3588 - 3600
  • [8] Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
    Qu, Juan
    Tan, Xiao-Ling
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2014, 2014
  • [9] An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks
    Li, Xuelei
    Wen, Qiaoyan
    Zhang, Hua
    Jin, Zhengping
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2013, 23 (05) : 311 - 324
  • [10] An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
    Jeng, Fuh-Gwo
    Wang, Chung-Ming
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (08) : 1161 - 1167