AHA-BV: Access and handover authentication protocol with batch verification for satellite-terrestrial integrated networks

被引:4
作者
Guo, Junyan [1 ,2 ]
Chang, Liyuan [1 ,2 ]
Song, Yue [1 ,2 ]
Yao, Shuang [3 ]
Zheng, Zhi [1 ,2 ]
Hao, Yihang [1 ,2 ]
Zhu, Shixuan [4 ]
Guo, Wei [1 ,2 ]
Zhao, Ming [5 ]
机构
[1] China Telecom Cybersecur Technol Co Ltd, Beijing 100020, Peoples R China
[2] China Telecom Co Ltd, Operat Ctr Network Secur Prod, Beijing 100020, Peoples R China
[3] China Elect Power Res Inst Co Ltd, Beijing 100192, Peoples R China
[4] China Telecom Cloud Technol Co Ltd, Beijing 100007, Peoples R China
[5] CIT Ind Cloud Co Ltd, Beijing 100004, Peoples R China
关键词
Satellite-terrestrial integrated network; Authentication protocol; Handover; Batch verification; Elliptic curve cryptography; KEY AGREEMENT; SPACE; SECURITY; SCHEME; INTERNET;
D O I
10.1016/j.csi.2024.103870
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
At present, the rapid development of satellite capabilities has prompted the proposal of satellite-terrestrial integrated networks (STIN), which solves the problem of limited signal coverage of terrestrial cellular networks, further promotes the globalization process, and realizes global data sharing and on -demand use. However, due to the high openness of satellite -to -ground links in STIN, users are vulnerable to attacks such as eavesdropping, replay, tampering, and impersonation when requesting access to satellite nodes and obtaining subscription services. To ensure the security and reliability, many authentication protocols have been proposed, but there are still some shortcomings, such as high authentication overhead, vulnerability to certain attacks. In addition, for inter -satellite handovers caused by the highly dynamic topology of satellites, the computational overhead of existing handover authentication mechanisms is too high to be applied to frequent inter -satellite handover scenarios in STIN. To address the above issues, in this paper, we propose a new access and handover authentication protocol with batch verification for STIN, namely the AHA-BV protocol. The AHA-BV protocol not only realizes mutual authentication and key negotiation between users and satellite access points without the participation of the network control center, but also ensures the conditional anonymity of users during the access authentication phase. Furthermore, the lightweight batch verification mechanism reduces the risk of computing bottlenecks when resource -constrained satellites receive a large number of access authentication requests. Not only that, the AHA-BV protocol can also achieve sustained trust in subscription services from STIN with low computational overhead during the inter -satellite handover authentication phase. Formal and heuristic security analysis show that the AHA-BV protocol can meet the security requirements of STIN. Performance analysis indicates that the AHA-BV protocol has low authentication overhead while ensuring security, and is more suitable for users under satellite dynamic topology to access and obtain subscription services from STIN.
引用
收藏
页数:16
相关论文
共 63 条
[1]   Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks" [J].
Alizadeh, Mojtaba ;
Zamani, Mazdak ;
Baharun, Sabariah ;
Manaf, Azizah Abdul ;
Sakurai, Kouichi ;
Anada, Hiroki ;
Keshavarz, Hassan ;
Chaudhry, Shehzad Ashraf ;
Khan, Muhammad Khurram .
PLOS ONE, 2015, 10 (11)
[2]   A Lightweight Key Agreement and Authentication Scheme for Satellite-Communication Systems [J].
Altaf, Izwa ;
Saleem, Muhammad Asad ;
Mahmood, Khalid ;
Kumari, Saru ;
Chaudhary, Pradeep ;
Chen, Chien-Ming .
IEEE ACCESS, 2020, 8 :46278-46287
[3]  
[Anonymous], 2014, International Journal of Engineering Research and General Science
[4]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[5]   SATMC: A SAT-based model checker for security protocols [J].
Armando, A ;
Compagna, L .
LOGICS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2004, 3229 :730-733
[6]  
Basin D., 2005, INT J INF SECUR, V4, P181, DOI [10.1007/s10207-004-0055-7, DOI 10.1007/S10207-004-0055-7]
[7]   Software Defined Space-Terrestrial Integrated Networks: Architecture, Challenges, and Solutions [J].
Bi, Yuanguo ;
Han, Guangjie ;
Xu, Shuang ;
Wang, Xingwei ;
Lin, Chuan ;
Yu, Zhibo ;
Sun, Peiyao .
IEEE NETWORK, 2019, 33 (01) :22-28
[8]  
Boichut Yohan., 2006, TFIT, V6, P467
[9]   SPACE AND TERRESTRIAL INTEGRATED NETWORKS: EMERGING RESEARCH ADVANCES, PROSPECTS, AND CHALLENGES [J].
Chao, Han-Chieh ;
Comer, Douglas E. ;
Kao, Odej .
IEEE NETWORK, 2019, 33 (01) :6-7
[10]   An improved and provably secure privacy preserving authentication protocol for SIP [J].
Chaudhry, Shehzad Ashraf ;
Naqvi, Husnain ;
Sher, Muhammad ;
Farash, Mohammad Sabzinejad ;
ul Hassan, Mahmood .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) :1-15