4.5 Article

Robust Authentication and Session Key Agreement Protocol for Satellite Communications

Journal

CMC-COMPUTERS MATERIALS & CONTINUA
Volume 71, Issue 3, Pages 5891-5910

Publisher

TECH SCIENCE PRESS
DOI: 10.32604/cmc.2022.023697

Keywords

Satellite communications; authentication; session key agreement; secure communication; security protocols; formal verification

Ask authors/readers for more resources

This paper discusses the importance of satellite networks and the vulnerabilities in existing protocols for satellite communications. It proposes a secure authentication and session key agreement protocol using elliptic curve cryptography (ECC), and demonstrates its security through validation tools and model checkers, as well as comparing it with similar methods.
Satellite networks are recognized as the most essential communication infrastructures in the world today, which complement land networks and provide valuable services for their users. Extensive coverage and service stability of these networks have increased their popularity. Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks, securing satellite communications is vital. So far, several protocols have been proposed for authentication and key exchange of satellite communications, but none of them fully meet the security requirements. In this paper, we examine one of these protocols and identify its security vulnerabilities. Moreover, we propose a robust and secure authentication and session key agreement protocol using the elliptic curve cryptography (ECC). We show that the proposed protocol meets common security requirements and is resistant to known security attacks. Moreover, we prove that the proposed scheme satisfies the security features using the Automated Validation of Internet Security Protocols and Applications (AVISPA) formal verification tool and On-the fly Model-Checker (OFMC) and ATtack SEarcher (ATSE) model checkers. We have also proved the security of the session key exchange of our protocol using the Real or Random (RoR) model. Finally, the comparison of our scheme with similar methods shows its superiority.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available