An efficient provably secure authentication and key agreement protocol for satellite communication networks

被引:1
作者
Thakur, Garima [1 ]
Obaidat, Mohammad S. [2 ,3 ,4 ,5 ]
Sharma, Piyush [1 ]
Prajapat, Sunil [1 ]
Kumar, Pankaj [1 ]
机构
[1] Cent Univ Himachal Pradesh, Srinivasa Ramanujan Dept Math, Dharamshala 176206, India
[2] Univ Jordan, King Abdullah Sch Informat Technol 2, Amman, Jordan
[3] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
[4] SRM Univ, Sch Comp, Dept Computat Intelligence, Kattankulathur, Tamil Nadu, India
[5] Amity Univ, Sch Engn, Noida, Uttar Pradesh, India
关键词
authentication; BAN logic; satellite communications; session key agreement; SCHEME; VERIFICATION;
D O I
10.1002/spy2.404
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The leverage of satellite resources to establish a communication network offers a wide range of benefits, including the capability to support news gathering, broadcasting, and aeronautical and maritime tracking. The unique aspects of the satellite-linked terrestrial network provide high-speed services, dependable and consistent network quality, and comprehensive geographic coverage of remote regions. Unfortunately, these structural features also render the network vulnerable to unauthorized intrusion, potentially leading to significant disruptions. Consequently, the implementation of authentication measures presents an appealing solution for enhancing the overall service quality of this network. Recently, Kumar et al. presented an authentication and key agreement scheme for satellite communications. Strikingly, their scheme proves inadequate in safeguarding against several malicious attacks and reveals certain design weaknesses. In this article, we present a reliable and secure authentication protocol that takes advantage of the complexities inherent in the elliptic curve discrete logarithm problem. We assess the protocol's effectiveness against various types of attacks using formal proof, Burrows-Abadi-Needham logic, informal descriptive proof analysis, and the verification tool SCYTHER. Furthermore, we compare the computational, communication, and storage overhead of our proposed protocol to an existing one, demonstrating its efficiency and superiority.
引用
收藏
页数:22
相关论文
共 33 条
  • [1] 3GPP, 2020, Security architecture and procedures for 5G system (TS 33.501 version 16.3.0 Release 16)
  • [2] A novel authentication and key-agreement scheme for satellite communication network
    Altaf, Izwa
    Akram, Muhammad Arslan
    Mahmood, Khalid
    Kumari, Saru
    Xiong, Hu
    Khan, Muhammad Khurram
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (07)
  • [3] BURROWS M, 1990, ACM T COMPUT SYST, V8, P18, DOI [10.1145/77648.77649, 10.1145/74851.74852]
  • [4] An authentication and key agreement protocol for satellite communications
    Chang, Chin-Chen
    Cheng, Ting-Fang
    Wu, Hsiao-Ling
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) : 1994 - 2006
  • [5] A self-verification authentication mechanism for mobile satellite communication systems
    Chen, Tzung-Her
    Lee, Wei-Bin
    Chen, Hsing-Bai
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 41 - 48
  • [6] An enhanced dynamic authentication scheme for mobile satellite communication systems
    Chen, Yulei
    Chen, Jianhua
    [J]. INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2021, 39 (03) : 250 - 262
  • [7] Cremers Cas J. F., 2010, International Journal of Applied Cryptography, V2, P83, DOI 10.1504/IJACT.2010.038304
  • [8] Cremers CJF, 2008, LECT NOTES COMPUT SC, V5123, P414
  • [9] Cruickshank H. S., 1996, Fifth International Conference on Satellite Systems for Mobile Communications and Navigation (Conf. Publ.No.424), P187, DOI 10.1049/cp:19960437
  • [10] Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523