An efficient and secure anonymous authentication scheme for mobile satellite communication systems

被引:8
|
作者
Yoon, Eun-Jun [1 ]
Yoo, Kee-Young [3 ]
Hong, Jeong-Woo [4 ]
Yoon, Sang-Yoon [4 ]
Park, Dong-In [4 ]
Choi, Myung-Jin [2 ]
机构
[1] Kyungil Univ, Sch Comp Engn, Kyungsan Si 712701, Kyungsangpuk Do, South Korea
[2] Korea Aerosp Res Inst, Satellite Informat Res Inst, Taejon 305333, South Korea
[3] Kyungpook Natl Univ, Sch Comp Sci & Engn, Taegu 702701, South Korea
[4] Korea Inst Sci & Technol Informat, Taejon 305806, South Korea
基金
新加坡国家研究基金会;
关键词
mobile satellite communication system; user authentication; key establishment; public-key management; anonymity;
D O I
10.1186/1687-1499-2011-86
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a new efficient and secure anonymous authentication scheme for mobile satellite communication systems. Compared with the related schemes, the proposed scheme achieves the following three main advantages: (1) It is just based on a secure one-way hash function for avoiding complex computations for both mobile users and network control center (NCC), (2) it does not require sensitive verification table which may cause NCC to become an attractive target for numerous attacks (e. g., insertion attacks and stolen-verifier attacks), and (3) it provides higher security level (e. g., secure mutual authentication and key establishment, confidential communication, user's privacy, simple key management, and session key independence). As a result, the proposed scheme is very suitable for lightweight-device environments because of very low computation overload on the part of both mobile user and NCC.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] An efficient and secure anonymous authentication scheme for mobile satellite communication systems
    Eun-Jun Yoon
    Kee-Young Yoo
    Jeong-Woo Hong
    Sang-Yoon Yoon
    Dong-In Park
    Myung-Jin Choi
    [J]. EURASIP Journal on Wireless Communications and Networking, 2011
  • [2] Secure anonymous authentication scheme without verification table for mobile satellite communication systems
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    [J]. INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2014, 32 (05) : 443 - 452
  • [3] A simple and efficient authentication scheme for mobile satellite communication systems
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chang, Rui-Xiang
    [J]. INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2012, 30 (01) : 29 - 38
  • [4] An anonymous authentication scheme for mobile communication
    Liu Jin-ye
    Gu Li-ze
    Luo Shou-shan
    Yang Yi-xian
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 359 - +
  • [5] An improved authentication scheme for mobile satellite communication systems
    Zhang, Yuanyuan
    Chen, Jianhua
    Huang, Baojun
    [J]. INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2015, 33 (02) : 135 - 146
  • [6] Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors
    Xiong Li
    Maged Hamada Ibrahim
    Saru Kumari
    Rahul Kumar
    [J]. Telecommunication Systems, 2018, 67 : 323 - 348
  • [7] Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors
    Li, Xiong
    Ibrahim, Maged Hamada
    Kumari, Saru
    Kumar, Rahul
    [J]. TELECOMMUNICATION SYSTEMS, 2018, 67 (02) : 323 - 348
  • [8] An anonymous and provably secure authentication scheme for mobile user
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Amin, Ruhul
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (09) : 1529 - 1544
  • [9] Anonymous Mutual Authentication Scheme for Secure Inter-Device Communication in Mobile Networks
    Chung, Youngseok
    Choi, Seokjin
    Won, Dongho
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2016, PT IV, 2016, 9789 : 289 - 301
  • [10] An efficient and secure anonymous mobility network authentication scheme
    Kuo, Wen-Chung
    Wei, Hong-Ji
    Cheng, Jiin-Chiou
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 18 - 24