An enhanced dynamic authentication scheme for mobile satellite communication systems

被引:12
作者
Chen, Yulei [1 ]
Chen, Jianhua [1 ]
机构
[1] Wuhan Univ, Sch Math & Stat, Wuhan 430072, Peoples R China
关键词
authentication; ECC; impersonation attack; key agreement; satellite communication; KEY AGREEMENT SCHEME; 3-FACTOR AUTHENTICATION; SECURE; BIOMETRICS; PROTOCOL; DESIGN;
D O I
10.1002/sat.1385
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
Recently, Altaf et al. proposed a novel authentication and key-agreement scheme for satellite communication network. In this paper, we will prove that Altaf et al.'s scheme cannot provide perfect forward secrecy and resist the off-line password guessing attack and user impersonation attack. To overcome these weaknesses, we propose an enhanced dynamic authentication scheme for mobile satellite communication systems, making use of the advantages of one-way hash function and the discrete logarithm problem. We formally prove the security of the proposed scheme under the widely used BPR adversary model, and the heuristic discussion shows that the new scheme has good security and can resist all kinds of known malicious attacks. In addition, by comparing with other related schemes, we find that our scheme has better performance.
引用
收藏
页码:250 / 262
页数:13
相关论文
共 36 条
  • [1] A novel authentication and key-agreement scheme for satellite communication network
    Altaf, Izwa
    Akram, Muhammad Arslan
    Mahmood, Khalid
    Kumari, Saru
    Xiong, Hu
    Khan, Muhammad Khurram
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (07)
  • [2] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
  • [3] An authentication and key agreement protocol for satellite communications
    Chang, Chin-Chen
    Cheng, Ting-Fang
    Wu, Hsiao-Ling
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) : 1994 - 2006
  • [4] A self-verification authentication mechanism for mobile satellite communication systems
    Chen, Tzung-Her
    Lee, Wei-Bin
    Chen, Hsing-Bai
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 41 - 48
  • [5] Trends in mobile satellite technology
    Comparetto, G
    Ramirez, R
    [J]. COMPUTER, 1997, 30 (02) : 44 - 52
  • [6] Cruickshank H. S., 1996, Fifth International Conference on Satellite Systems for Mobile Communications and Navigation (Conf. Publ.No.424), P187, DOI 10.1049/cp:19960437
  • [7] Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    Dodis, Yevgeniy
    Ostrovsky, Rafail
    Reyzin, Leonid
    Smith, Adam
    [J]. SIAM JOURNAL ON COMPUTING, 2008, 38 (01) : 97 - 139
  • [8] ON THE SECURITY OF PUBLIC KEY PROTOCOLS
    DOLEV, D
    YAO, AC
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
  • [9] Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks
    He, Debiao
    Zhang, Yuanyuan
    Chen, Jianhua
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (02) : 229 - 243
  • [10] Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment
    He, Debiao
    Wu, Shuhua
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2013, 70 (01) : 323 - 329