An efficient provably secure authentication and key agreement protocol for satellite communication networks

被引:1
作者
Thakur, Garima [1 ]
Obaidat, Mohammad S. [2 ,3 ,4 ,5 ]
Sharma, Piyush [1 ]
Prajapat, Sunil [1 ]
Kumar, Pankaj [1 ]
机构
[1] Cent Univ Himachal Pradesh, Srinivasa Ramanujan Dept Math, Dharamshala 176206, India
[2] Univ Jordan, King Abdullah Sch Informat Technol 2, Amman, Jordan
[3] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
[4] SRM Univ, Sch Comp, Dept Computat Intelligence, Kattankulathur, Tamil Nadu, India
[5] Amity Univ, Sch Engn, Noida, Uttar Pradesh, India
关键词
authentication; BAN logic; satellite communications; session key agreement; SCHEME; VERIFICATION;
D O I
10.1002/spy2.404
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The leverage of satellite resources to establish a communication network offers a wide range of benefits, including the capability to support news gathering, broadcasting, and aeronautical and maritime tracking. The unique aspects of the satellite-linked terrestrial network provide high-speed services, dependable and consistent network quality, and comprehensive geographic coverage of remote regions. Unfortunately, these structural features also render the network vulnerable to unauthorized intrusion, potentially leading to significant disruptions. Consequently, the implementation of authentication measures presents an appealing solution for enhancing the overall service quality of this network. Recently, Kumar et al. presented an authentication and key agreement scheme for satellite communications. Strikingly, their scheme proves inadequate in safeguarding against several malicious attacks and reveals certain design weaknesses. In this article, we present a reliable and secure authentication protocol that takes advantage of the complexities inherent in the elliptic curve discrete logarithm problem. We assess the protocol's effectiveness against various types of attacks using formal proof, Burrows-Abadi-Needham logic, informal descriptive proof analysis, and the verification tool SCYTHER. Furthermore, we compare the computational, communication, and storage overhead of our proposed protocol to an existing one, demonstrating its efficiency and superiority.
引用
收藏
页数:22
相关论文
共 33 条
  • [11] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [12] A provably secure ECC-based access and handover authentication protocol for space information networks
    Guo, Junyan
    Du, Ye
    Zhang, Yahang
    Li, Meihong
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 193
  • [13] RAKS: robust authentication and key agreement scheme for satellite infrastructure
    Khan, Akber Ali
    Kumar, Vinod
    Srinivas, Jangirala
    Kumari, Saru
    Gupta, Mridul Kumar
    [J]. TELECOMMUNICATION SYSTEMS, 2022, 81 (01) : 83 - 98
  • [14] The state of elliptic curve cryptography
    Koblitz, N
    Menezes, A
    Vanstone, S
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 173 - 193
  • [15] A note on an enhanced dynamic authentication scheme for mobile satellite communication systems
    Kumar, Uddeshaya
    Garg, Manish
    [J]. INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2022, 40 (05) : 317 - 329
  • [16] Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications
    Lasc, Ioana
    Dojen, Reiner
    Coffey, Tom
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 160 - 168
  • [17] A simple and efficient authentication scheme for mobile satellite communication systems
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chang, Rui-Xiang
    [J]. INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2012, 30 (01) : 29 - 38
  • [18] Min-Shiang Hwang, 2003, Operating Systems Review, V37, P42, DOI 10.1145/958965.958970
  • [19] A Provably Secure Three-Factor Authentication Protocol Based on Chebyshev Chaotic Mapping for Wireless Sensor Network
    Mo, Jiaqing
    Hu, Zhongwang
    Shen, Wei
    [J]. IEEE ACCESS, 2022, 10 : 12137 - 12152
  • [20] Efficient utilization of elliptic curve cryptography in design of a three-factor authentication protocol for satellite communications
    Ostad-Sharif, Arezou
    Abbasinezhad-Mood, Dariush
    Nikooghadam, Morteza
    [J]. COMPUTER COMMUNICATIONS, 2019, 147 : 85 - 97