Skip to main content

A Distributed Authentication Protocol Using Identity-Based Encryption and Blockchain for LEO Network

  • Conference paper
  • First Online:
Book cover Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10656))

Abstract

LEO satellite-based mobile communication networks have gained enormous attention with the development of communication technology. However, the centralized authentication protocol in traditional satellite networks cannot accommodate to LEO satellite networks with frequent link switching. This paper proposes a fast and efficient authentication protocol in LEO satellite network by combining identity-based encryption and blockchain technology. We simulate the protocol in OPNET for validation with the node modules built in LEO satellite network. The new protocol demonstrates significant advantages in both performance and scalability with less communication overhead for different authentication scenarios in LEO satellite network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wu, J., Long, Y., Huang, Q., et al.: Design and application of IBE email encryption based on Pseudo RSA certificate. In: International Conference on Computational Intelligence and Security, pp. 282–286. IEEE Computer Society (2016)

    Google Scholar 

  2. Patel, D., Bothra, J., Patel, V.: Blockchain exhumed. In: Asia Security and Privacy (ISEASP), 2017 ISEA. IEEE (2017)

    Google Scholar 

  3. Cruickshank, H.S.: A security system for satellite networks. In: International Conference on Satellite Systems for Mobile Communications and Navigation, pp. 187–190. IET (2002)

    Google Scholar 

  4. Hwang, M.S., Yang, C.C., Shiu, C.Y.: An authentication scheme for mobile satellite communication systems. ACM SIGOPS Oper. Syst. Rev. 37(4), 42–47 (2003)

    Article  Google Scholar 

  5. Chang, Y.F., Chang, C.C.: An efficient authentication protocol for mobile satellite communication systems. ACM SIGOPS Oper. Syst. Rev. 39(1), 70–84 (2005)

    Article  Google Scholar 

  6. Zheng, G., Ma, H.T., Cheng, C., et al.: Design and logical analysis on the access authentication scheme for satellite mobile communication networks. IET Inf. Secur. 6(1), 6–13 (2012)

    Article  Google Scholar 

  7. Qi, L., Zhi, L.: Authentication and access control in satellite network. In: Third International Symposium on Electronic Commerce and Security, pp. 17–20. IEEE Computer Society (2010)

    Google Scholar 

  8. Chen, L., Cheng, Z.: Security proof of Sakai-Kasahara’s identity-based encryption scheme. In: Smart, Nigel P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 442–459. Springer, Heidelberg (2005). https://doi.org/10.1007/11586821_29

    Chapter  Google Scholar 

  9. Long, H.: OPNET Modeler and Computer Network Simulation. XiDian University Press, Xi’an (2006)

    Google Scholar 

  10. Zhibo, X., Ma, H.: Design and simulation of security authentication protocol for satellite network. Comput. Eng. Appl. 43(17), 130–132 (2007)

    Google Scholar 

Download references

Acknowledgments

This material is based upon work supported by the China NSF grant No. 61472189, the CASC Innovation Fund No. F2016020013, the State Key Laboratory of Air Traffic Management System and Technology No. SKLATM201703, and the Postgraduate Research & Practice Innovation Program of Jiangsu Province No. KYCX17_0369.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Songjie Wei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, S., Liu, M., Wei, S. (2017). A Distributed Authentication Protocol Using Identity-Based Encryption and Blockchain for LEO Network. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10656. Springer, Cham. https://doi.org/10.1007/978-3-319-72389-1_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72389-1_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72388-4

  • Online ISBN: 978-3-319-72389-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics