An enhanced authentication with key agreement scheme for satellite communication systems

被引:30
作者
Qi, Mingping [1 ]
Chen, Jianhua [1 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan, Hubei, Peoples R China
关键词
authentication; elliptic curve cryptography; satellite communication systems; smartcard;
D O I
10.1002/sat.1218
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
To ensure secure communication in satellite communication systems, recently, Zhang et al presented an authentication with key agreement scheme and claimed that their scheme satisfies various security requirements. However, this paper demonstrates that Zhang et al's scheme is insecure against the stolen-verifier attack and the denial of service attack. Furthermore, to authenticate a user, Zhang et al's scheme requires large computational load to exhaustively retrieve the user's identity and password from the account database according to a temporary identity and then update the temporary identity in the database. To overcome the weaknesses existing in Zhang et al's scheme, we proposed an enhanced authentication with key agreement scheme for satellite communication systems. The analyses of our proposed scheme show that the proposed scheme possesses perfect security properties and eliminates the weaknesses of Zhang et al's scheme well. Therefore, from the authors' viewpoints, the proposed scheme is more suitable for the authentication scheme of mobile satellite communication systems.
引用
收藏
页码:296 / 304
页数:9
相关论文
共 12 条
  • [1] An authentication and key agreement protocol for satellite communications
    Chang, Chin-Chen
    Cheng, Ting-Fang
    Wu, Hsiao-Ling
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) : 1994 - 2006
  • [2] A self-verification authentication mechanism for mobile satellite communication systems
    Chen, Tzung-Her
    Lee, Wei-Bin
    Chen, Hsing-Bai
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 41 - 48
  • [3] Cruickshank H. S., 1996, Fifth International Conference on Satellite Systems for Mobile Communications and Navigation (Conf. Publ.No.424), P187, DOI 10.1049/cp:19960437
  • [4] An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments
    He, Debiao
    Chen, Yitao
    Chen, Jianhua
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2013, 38 (08) : 2055 - 2061
  • [5] Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications
    Lasc, Ioana
    Dojen, Reiner
    Coffey, Tom
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 160 - 168
  • [6] A simple and efficient authentication scheme for mobile satellite communication systems
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chang, Rui-Xiang
    [J]. INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2012, 30 (01) : 29 - 38
  • [7] Maral G, 2010, INT J SAT COMM NETWO, V9, P209
  • [8] Min-Shiang Hwang, 2003, Operating Systems Review, V37, P42, DOI 10.1145/958965.958970
  • [9] OMAC: A new access control architecture for overlay multicast communications
    Mohamed, Emad Eldin
    Barka, Ezedin
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (06) : 761 - 775
  • [10] Network Mobility in satellite networks: architecture and the protocol
    Shahriar, Abu Zafar M.
    Atiquzzaman, Mohammed
    Ivancic, William
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (02) : 177 - 197