Abstract
This paper discusses the security aspects of a registration protocol in a mobile satellite communication system. We propose a new mobile user authentication and data encryption scheme for mobile satellite communication systems. The scheme can remedy a replay attack.
- Prakash Chitre and Ferit Yegenoglu. Next-generation satellite networks: Architectures and implementations. IEEE Communications Magazine, pages 30--36, Mar. 1999. Google ScholarDigital Library
- Jean-Noel Colcy, Geoff Hall, and Rafael Steinhauser. Euteltracs: the european mobile satellite service. IEEE Communication Engineering, pages 81--88, Apr. 1995.Google Scholar
- Gary Comparetto and Rafols Ramirez. Trends in mobile satellite technology. IEEE Computer, pages 44--52, Feb. 1997. Google ScholarDigital Library
- H. S. Cruickshank. A security system for satellite networks. IEEE Satellite System for Mobile Communication and Navigation, pages 187--190, May 1996.Google ScholarCross Ref
- Carl E. Fossa, Richard A. Raines, Gregg H. Gunsch, and Michael A. Temple. An overview of the IRIDIUM low earth orbit (LEO) satellite system. In Proceedings of the IEEE 1998 National Aerospace and Electronics Conference, NAECON'1998, pages 152--159, 1998.Google ScholarCross Ref
- B. Gavish. Low earth orbit satellite based communication systems - research opportunities. European Journal Of Operational Research, 99(1):166--179, 1999.Google ScholarCross Ref
- Min-Shiang Hwang. Dynamic participation in a secure conference scheme for mobile communications. IEEE Transactions on Vehicular Technology 48(5), pages 1469--1474, Sep. 1999.Google ScholarCross Ref
- Min-Shiang Hwang and Wei-Pang Yang. Conference key distribution protocols for digital mobile communication systems. IEEE Journal on Selected Areas in Communications, 13(2):416--420, Feb. 1995. Google ScholarDigital Library
- S. S. Jeng and H. P. Lin. Smart antenna system and its application in low-earth-orbit satellite communication systems. IEE Proceedings Microwaves, Antennas and Propagation, 146(2):125--130, Apr. 1999.Google ScholarCross Ref
- Hung-Yu Lin. Security and authentication in PCS. Computers and Electrical Engineering, pages 225--148, Dec. 1999.Google ScholarCross Ref
Index Terms
An authentication scheme for mobile satellite communication systems
Recommendations
A new signature scheme without random oracles
Digital signature is commonly used for authentication of a user or data. In order to ensure the security of a signature scheme, it is important to design a signature scheme with a security proof. In 1999, Gennaro et al. and Cramer et al. respectively ...
Strong Authentication Scheme for Remote Autonomous Object
NISS '09: Proceedings of the 2009 International Conference on New Trends in Information and Service ScienceGenerally, a remote autonomous object acts with its own thread of control. In 2003, Novikov and Kiselev proposed an authentication scheme of the user from the remote autonomous object with public key cryptosystem which is applicable in the ...
A self-verification authentication mechanism for mobile satellite communication systems
In order to provide an opportunity to make personal communication as broad as possible, mobile satellite communication systems have recently drawn much attention. However, any communication system raises two major challenging issues: (1) how to ...
Comments