An enhanced dynamic authentication scheme for mobile satellite communication systems

被引:11
|
作者
Chen, Yulei [1 ]
Chen, Jianhua [1 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
关键词
authentication; ECC; impersonation attack; key agreement; satellite communication; KEY AGREEMENT SCHEME; 3-FACTOR AUTHENTICATION; SECURE; BIOMETRICS; PROTOCOL; DESIGN;
D O I
10.1002/sat.1385
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
Recently, Altaf et al. proposed a novel authentication and key-agreement scheme for satellite communication network. In this paper, we will prove that Altaf et al.'s scheme cannot provide perfect forward secrecy and resist the off-line password guessing attack and user impersonation attack. To overcome these weaknesses, we propose an enhanced dynamic authentication scheme for mobile satellite communication systems, making use of the advantages of one-way hash function and the discrete logarithm problem. We formally prove the security of the proposed scheme under the widely used BPR adversary model, and the heuristic discussion shows that the new scheme has good security and can resist all kinds of known malicious attacks. In addition, by comparing with other related schemes, we find that our scheme has better performance.
引用
收藏
页码:250 / 262
页数:13
相关论文
共 50 条
  • [21] Chain authentication in mobile communication systems
    Lin, CT
    Shieh, SP
    [J]. TELECOMMUNICATION SYSTEMS, 2000, 13 (2-4) : 213 - 240
  • [22] Chain authentication in mobile communication systems
    Chern-Tang Lin
    Shiuh-Pyng Shieh
    [J]. Telecommunication Systems, 2000, 13 : 213 - 240
  • [23] Validation of authentication protocols for mobile satellite systems
    Beheshtifard, Saeed
    [J]. INTERNATIONAL JOURNAL OF ADVANCED BIOTECHNOLOGY AND RESEARCH, 2016, 7 : 1517 - 1521
  • [24] Enhanced Communication Scheme for Mobile Agents
    Priya, Geetha B.
    Suba, S.
    Bansal, Tanya
    Boominathan, P.
    [J]. IAMA: 2009 INTERNATIONAL CONFERENCE ON INTELLIGENT AGENT & MULTI-AGENT SYSTEMS, 2009, : 1 - 6
  • [25] Modifying Authentication Techniques in Mobile Communication Systems
    Hassan, Zakaria Zakaria
    Elgarf, Talaat A.
    Zekry, Abdelhalim
    [J]. 2014 THIRD INTERNATIONAL CONFERENCE ON CYBER SECURITY, CYBER WARFARE AND DIGITAL FORENSIC (CYBERSEC), 2014, : 38 - 44
  • [26] Enhanced LT Decoding Scheme in Satellite Communication
    Zhang, Qixian
    Zhang, Sihai
    Zhou, Wuyang
    [J]. 2014 SIXTH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2014,
  • [27] Authentication for Satellite Communication Systems Using Physical Characteristics
    Abdrabou, Mohammed
    Gulliver, T. Aaron
    [J]. IEEE OPEN JOURNAL OF VEHICULAR TECHNOLOGY, 2023, 4 : 48 - 60
  • [28] An enhanced authentication protocol for personal communication systems
    Stach, JS
    Park, EK
    Su, Z
    [J]. 1998 IEEE WORKSHOP ON APPLICATION-SPECIFIC SOFTWARE ENGINEERING AND TECHNOLOGY (ASSET 98) - PROCEEDINGS, 1998, : 128 - 132
  • [29] A novel authentication and key-agreement scheme for satellite communication network
    Altaf, Izwa
    Akram, Muhammad Arslan
    Mahmood, Khalid
    Kumari, Saru
    Xiong, Hu
    Khan, Muhammad Khurram
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (07):
  • [30] Mobile Terminal User Authentication Scheme Based on Dynamic Gesture
    Zhiping Zhou
    Minmin Miao
    Ziwen Sun
    [J]. 2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 3902 - 3907