Abstract
LEO satellite-based mobile communication networks have gained enormous attention with the development of communication technology. However, the centralized authentication protocol in traditional satellite networks cannot accommodate to LEO satellite networks with frequent link switching. This paper proposes a fast and efficient authentication protocol in LEO satellite network by combining identity-based encryption and blockchain technology. We simulate the protocol in OPNET for validation with the node modules built in LEO satellite network. The new protocol demonstrates significant advantages in both performance and scalability with less communication overhead for different authentication scenarios in LEO satellite network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wu, J., Long, Y., Huang, Q., et al.: Design and application of IBE email encryption based on Pseudo RSA certificate. In: International Conference on Computational Intelligence and Security, pp. 282–286. IEEE Computer Society (2016)
Patel, D., Bothra, J., Patel, V.: Blockchain exhumed. In: Asia Security and Privacy (ISEASP), 2017 ISEA. IEEE (2017)
Cruickshank, H.S.: A security system for satellite networks. In: International Conference on Satellite Systems for Mobile Communications and Navigation, pp. 187–190. IET (2002)
Hwang, M.S., Yang, C.C., Shiu, C.Y.: An authentication scheme for mobile satellite communication systems. ACM SIGOPS Oper. Syst. Rev. 37(4), 42–47 (2003)
Chang, Y.F., Chang, C.C.: An efficient authentication protocol for mobile satellite communication systems. ACM SIGOPS Oper. Syst. Rev. 39(1), 70–84 (2005)
Zheng, G., Ma, H.T., Cheng, C., et al.: Design and logical analysis on the access authentication scheme for satellite mobile communication networks. IET Inf. Secur. 6(1), 6–13 (2012)
Qi, L., Zhi, L.: Authentication and access control in satellite network. In: Third International Symposium on Electronic Commerce and Security, pp. 17–20. IEEE Computer Society (2010)
Chen, L., Cheng, Z.: Security proof of Sakai-Kasahara’s identity-based encryption scheme. In: Smart, Nigel P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 442–459. Springer, Heidelberg (2005). https://doi.org/10.1007/11586821_29
Long, H.: OPNET Modeler and Computer Network Simulation. XiDian University Press, Xi’an (2006)
Zhibo, X., Ma, H.: Design and simulation of security authentication protocol for satellite network. Comput. Eng. Appl. 43(17), 130–132 (2007)
Acknowledgments
This material is based upon work supported by the China NSF grant No. 61472189, the CASC Innovation Fund No. F2016020013, the State Key Laboratory of Air Traffic Management System and Technology No. SKLATM201703, and the Postgraduate Research & Practice Innovation Program of Jiangsu Province No. KYCX17_0369.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Li, S., Liu, M., Wei, S. (2017). A Distributed Authentication Protocol Using Identity-Based Encryption and Blockchain for LEO Network. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10656. Springer, Cham. https://doi.org/10.1007/978-3-319-72389-1_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-72389-1_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72388-4
Online ISBN: 978-3-319-72389-1
eBook Packages: Computer ScienceComputer Science (R0)