Skip to main content

Chaotic-Maps Based Access Authentication Protocol for Remote Communication Using Space Information Networks

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 449))

  • 947 Accesses

Abstract

Space Information Networks (SIN) allow terrestrial mobile nodes to gain access to the Internet anywhere and at any time. Due to its dynamic network coverage, it has been gaining wider attention from researchers and network service providers. In comparison to terrestrial networks, the majority of data transmission in SIN is through air interface, which makes it vulnerable to adversarial attacks such as illegal data access, eavesdropping attack, etc. To prevent unauthorized user access, this research work focuses on designing a secure and lightweight access authentication mechanism using extended Chebyshev chaotic maps for resource-constrained mobile nodes as an act of the first line of defense. The proposed scheme achieves several security functionalities, including resistance to impersonation attack, session key secrecy, mutual authentication, and key leakage attack. Furthermore, the soundness of the proposed scheme is validated using the ProVerif tool. Finally, the performance analysis depicts that the proposed scheme is highly efficient compared to existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, J., Shi, Y., Fadlullah, Z.M., Kato, N.: Space-air-ground integrated network: a survey. IEEE Commun. Surv. Tutorials 20(4), 2714–2741 (2018)

    Article  Google Scholar 

  2. Cruickshank, H.S.: A security system for satellite networks. In: Fifth International Conference on Satellite Systems for Mobile Communications and Navigation, pp. 187–190. IET (1996)

    Google Scholar 

  3. Hwang, M.S., Yang, C.C., Shiu, C.Y.: An authentication scheme for mobile satellite communication systems. ACM SIGOPS Operat. Syst. Rev. 37(4), 42–47 (2003)

    Article  Google Scholar 

  4. Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3), 669–674 (2008)

    Google Scholar 

  5. Fraire, J.A., Henn, S., Dovis, F., Garello, R., Taricco, G.: Sparse satellite constellation design for LoRa-based direct-to-satellite Internet of Things. In: GLOBECOM 2020–2020 IEEE Global Communications Conference, pp. 1–6. IEEE (2020)

    Google Scholar 

  6. Kumar, U., Garg, M.: CCAKESC: chaotic map-based construction of a new authenticated key exchange protocol for satellite communication. Int. J. Satell. Commun. Netw. (2021). https://doi.org/10.1002/sat.1435

  7. Qi, M., Chen, J., Chen, Y.: A secure authentication with key agreement scheme using ECC for satellite communication systems. Int. J. Satell. Commun. Network. 37(3), 234–244 (2019)

    Article  Google Scholar 

  8. Xu, S., Liu, X., Ma, M., Chen, J.: An improved mutual authentication protocol based on perfect forward secrecy for satellite communications. Int. J. Satell. Commun. Network. 38(1), 62–73 (2020)

    Article  Google Scholar 

  9. Altaf, I., Akram, M.A., Mahmood, K., Kumari, S., Xiong, H., Khan, M.K.: A novel authentication and key-agreement scheme for satellite communication network. Trans. Emerg. Telecommun. Technol. 32(7), e3894 (2021)

    Google Scholar 

  10. Lai, C., Chen, Z.: Group-based handover authentication for space-air-ground integrated vehicular networks. In: ICC 2021-IEEE International Conference on Communications, pp. 1–6. IEEE (2021)

    Google Scholar 

  11. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)

    Article  MathSciNet  Google Scholar 

  12. Blanchet, B., Smyth, B., Cheval, V., Sylvestre, M.: ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial. Version from, pp. 05–16 (2018)

    Google Scholar 

  13. Bergamo, P., D’Arco, P., De Santis, A., Kocarev, L.: Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circ. Syst. I Regul. Pap. 52(7), 1382–1393 (2005)

    Article  MathSciNet  Google Scholar 

  14. Meng, W., Xue, K., Xu, J., Hong, J., Yu, N.: Low-latency authentication against satellite compromising for space information network. In: 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), pp. 237–244. IEEE (2018)

    Google Scholar 

  15. Xue, K., Meng, W., Li, S., Wei, D.S., Zhou, H., Yu, N.: A secure and efficient access and handover authentication protocol for Internet of Things in space information networks. IEEE Internet Things J. 6(3), 5485–5499 (2019)

    Article  Google Scholar 

  16. Guo, J., Du, Y., Zhang, Y., Li, M.: A provably secure ECC-based access and handover authentication protocol for space information networks. J. Netw. Comput. Appl. 193, 103183 (2021)

    Google Scholar 

Download references

Acknowledgement

This work is supported by Science and Engineering Research Board (SERB), a statutory body of the Department of Science and Technology, Govt. of India under Grant No. SRG/2020/002458.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Susmita Mandal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mandal, S., Sravan, S.S., Ramesh, L. (2022). Chaotic-Maps Based Access Authentication Protocol for Remote Communication Using Space Information Networks. In: Barolli, L., Hussain, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2022. Lecture Notes in Networks and Systems, vol 449. Springer, Cham. https://doi.org/10.1007/978-3-030-99584-3_20

Download citation

Publish with us

Policies and ethics