Skip to main content

A Lightweight Authentication and Key Agreement Scheme for Mobile Satellite Communication Systems

  • Conference paper
  • First Online:
  • 1193 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10143))

Abstract

Although many authentication and key agreement (AKA) schemes for the mobile satellite communication system have been proposed nowadays, the security performance of the existing schemes is still unable to satisfy the requirements of satellite communications. In 2015, Zhang et al. proposed an improved AKA scheme for satellite communication and they claimed that their scheme satisfied all the security requirements. However through a detailed analysis, in this paper we find that to some extent their scheme is vulnerable to replay attack, injection attack and verification table stolen attack. We further propose a new lightweight AKA scheme based on the synchronization mechanism of user’s temporary identity. The SVO logic is used to provide a formal security analysis. We also give an overall comparison of computation overhead and security performance among several related AKA schemes. Meanwhile a Java program is developed to test the time delay caused by the scheme on the user and NCC’s sides. All the results show that the proposed scheme has the advantages of high computation efficiency, good security performance and low time delay.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Min, S.: Discussion on space-based integrated information network. J. Space Int. 8, 46–54 (2013)

    Google Scholar 

  2. Lee, W.: Research on Key Management of Space Information Networks. Doctoral Dissertation. PLA Information Engineering University, Zhengzhou (2009)

    Google Scholar 

  3. Zhong, Y.: Research on key issues of security in space information network. Doctoral Dissertation. Xidian University, Xian (2011)

    Google Scholar 

  4. CCSDS 350.1-G-2.: Security Threats against Space Missions (2015). https://public.ccsds.org/Pubs/350x1g2.pdf

  5. CCSDS 713.5-B-1.: Space Communications Protocol Standards - Security Protocol (2015). https://public.ccsds.org/Pubs/713x5b1sc1.pdf

  6. Cruickshank, H.S.: A security system for satellite networks. In: 5th International Conference on Satellite Systems for Mobile Communications and Navigation, pp. 187–190. IET (1996)

    Google Scholar 

  7. Hwang, M.S., Yang, C.C., Shiu, C.Y.: An authentication scheme for mobile satellite communication systems. J. ACM SIGOPS Operating Syst. Rev. 37(4), 42–47 (2003)

    Article  Google Scholar 

  8. Chang, Y.F., Chang, C.C.: An efficient authentication protocol for mobile satellite communication systems. J. ACM SIGOPS Operating Syst. Rev. 39(1), 70–84 (2005)

    Article  Google Scholar 

  9. Chen, T.H., Lee, W.B., Chen, H.B.: A self-verification authentication mechanism for mobile satellite communication systems. J. Comput. Electr. Eng. 35(1), 41–48 (2009)

    Article  MATH  Google Scholar 

  10. Yoon, E.J., Yoo, K.Y., Hong, J.W., Yoon, S.Y., Park, D.I., Choi, M.J.: An efficient and secure anonymous authentication scheme for mobile satellite communication systems. J. EURASIP J. Wirel. Commun. Network. 2011(1), 1–10 (2011)

    Article  Google Scholar 

  11. Lasc, I., Dojen, R., Coffey, T.: Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications. J. Comput. Electr. Eng. 37(2), 160–168 (2011)

    Article  Google Scholar 

  12. Lee, C.C., Li, C.T., Chang, R.X.: A simple and efficient authentication scheme for mobile satellite communication systems. J. Int. J. Satell. Commun. Network. 30(1), 29–38 (2012)

    Article  Google Scholar 

  13. Zheng, G., Ma, H.T., Cheng, C., Tu, Y.C.: Design and logical analysis on the access authentication scheme for satellite mobile communication networks. J. IET Inf. Secur. 6(1), 6–13 (2012)

    Article  Google Scholar 

  14. Chang, C.C., Cheng, T.F., Wu, H.L.: An authentication and key agreement protocol for satellite communications. J. Int. J. Commun. Syst. 27(10), 1994–2006 (2014)

    Article  Google Scholar 

  15. Zhang, Y., Chen, J., Huang, B.: Security analysis of an authentication and key agreement protocol for satellite communications. J. Int. J. Commun. Syst. 27(12), 4300–4306 (2014)

    Article  Google Scholar 

  16. Zhang, Y., Chen, J., Huang, B.: An improved authentication scheme for mobile satellite communication systems. J. Int. J. Satell. Commun. Network. 33(2), 135–146 (2015)

    Article  Google Scholar 

  17. Syverson, P.F., Van Oorschot, P.C.: On unifying some cryptographic protocol logics. In: IEEE Computer Society Symposium on Research in Security and Privacy, pp. 14–28. IEEE (1994)

    Google Scholar 

Download references

Acknowledgements

This work is funded by National Natural Science Foundation of China (61402287, 61431008) and Shanghai Municipal Science and Technology Commission (14YF1401900).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aixin Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Wu, X., Zhang, A., Li, J., Zhao, W., Liu, Y. (2017). A Lightweight Authentication and Key Agreement Scheme for Mobile Satellite Communication Systems. In: Chen, K., Lin, D., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2016. Lecture Notes in Computer Science(), vol 10143. Springer, Cham. https://doi.org/10.1007/978-3-319-54705-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54705-3_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54704-6

  • Online ISBN: 978-3-319-54705-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics