An efficient and secure anonymous authentication scheme for mobile satellite communication systems

被引:0
作者
Eun-Jun Yoon
Kee-Young Yoo
Jeong-Woo Hong
Sang-Yoon Yoon
Dong-In Park
Myung-Jin Choi
机构
[1] Kyungil University,School of Computer Engineering
[2] Kyungpook National University,School of Computer Science and Engineering
[3] Korea Institute of Science and Technology Information,Satellite Information Research Institute
[4] Korea Aerospace Research Institute,undefined
来源
EURASIP Journal on Wireless Communications and Networking | / 2011卷
关键词
mobile satellite communication system; user authentication; key establishment; public-key management; anonymity;
D O I
暂无
中图分类号
学科分类号
摘要
This paper proposes a new efficient and secure anonymous authentication scheme for mobile satellite communication systems. Compared with the related schemes, the proposed scheme achieves the following three main advantages: (1) It is just based on a secure one-way hash function for avoiding complex computations for both mobile users and network control center (NCC), (2) it does not require sensitive verification table which may cause NCC to become an attractive target for numerous attacks (e.g., insertion attacks and stolen-verifier attacks), and (3) it provides higher security level (e.g., secure mutual authentication and key establishment, confidential communication, user's privacy, simple key management, and session key independence). As a result, the proposed scheme is very suitable for lightweight-device environments because of very low computation overload on the part of both mobile user and NCC.
引用
收藏
相关论文
共 33 条
[1]  
Comparetto G(1999)Trends in mobile satellite technology IEEE Comput 30 44-52
[2]  
Ramirez R(1999)Smart antenna system and its application in low-earth-orbit satellite communication systems, in Proceedings of the Microwaves Antennas and Propagation 146 125-130
[3]  
Jeng SS(2003)Lightweight security for mobile commerce transactions Comput Commun 26 2052-2060
[4]  
Lin HP(1999)Security and authentication in PCS Comput Electr Eng 25 225-248
[5]  
Lam KY(1995)Authentication protocols for personal communication systems ACM SIGCOMM Comput Commun Rev 25 256-261
[6]  
Chung SL(1993)Secure mobile computing with location information Commun ACM 36 27-7
[7]  
Gu M(2000)Ten risks of PKI: what you're not being told about public-key infrastructure Comput Secur J 16 1-47
[8]  
Sun JG(2003)An authentication scheme for mobile satellite communication systems ACM SIGOPS Oper Syst Rev 145 42-84
[9]  
Lin HY(2005)An efficient authentication protocol for mobile satellite communication systems ACM SIGOPS Oper Syst Rev 39 70-48
[10]  
Lin HY(2009)A self-verification authentication mechanism for mobile satellite communication systems Comput Electr Eng 35 41-31