Reference Hub3
A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications

A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications

Ioana Lasc, Reiner Dojen, Tom Coffey
Copyright: © 2011 |Volume: 5 |Issue: 1 |Pages: 17
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781613507551|DOI: 10.4018/jisp.2011010103
Cite Article Cite Article

MLA

Lasc, Ioana, et al. "A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications." IJISP vol.5, no.1 2011: pp.33-49. http://doi.org/10.4018/jisp.2011010103

APA

Lasc, I., Dojen, R., & Coffey, T. (2011). A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications. International Journal of Information Security and Privacy (IJISP), 5(1), 33-49. http://doi.org/10.4018/jisp.2011010103

Chicago

Lasc, Ioana, Reiner Dojen, and Tom Coffey. "A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications," International Journal of Information Security and Privacy (IJISP) 5, no.1: 33-49. http://doi.org/10.4018/jisp.2011010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Many peer-to-peer security protocols proposed for wireless communications use one-time shared secrets for authentication purposes. This paper analyses online update mechanisms for one-time shared secrets. A new type of attack against update mechanisms, called desynchronisation attack, is introduced. This type of attack may lead to a permanent denial of service condition. A case study demonstrates the effectiveness of desynchronisation attacks against a security protocol for mobile satellite communications. A new mutual authentication protocol for satellite communications, incorporating a resynchronisation capability, is proposed to counter the disruptive effects of desynchronisation attacks. The new protocol has an esynchronisation phase that is initiated whenever desynchronisation is suspected. Thus, the possibility of causing permanent denial of service conditions by mounting desynchronisation attacks is eliminated. A security analysis of the proposed protocol establishes its resistance against attacks like replay attacks, dictionary attacks, and desynchronisation attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.