Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2019, Vol. 59 Issue (1) : 1-8     DOI: 10.16511/j.cnki.qhdxxb.2018.22.057
INFORMATION SECURITY |
User random access authentication protocol for low earth orbit satellite networks
ZHU Hui1,2, CHEN Siyu1,2, LI Fenghua1, WU Heng1,2, ZHAO Haiqiang2, WANG Gang1
1. School of Cyber Engineering, Xidian University, Xi'an 710071, China;
2. Science and Technology on Communication Networks Laboratory, China Electronics Technology Group Corporation, Shijiazhuang 050081, China
Download: PDF(2863 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  Low earth orbit (LEO) satellite networks can be used as supplementary networks for ground-based networks to provide network services for complex areas. However, the satellite networks characteristics such as open channels, a dynamic network topology, and a large number of user terminals can lead to problems of security, quality of service (QoS), and network control center overloading. This paper presents a dynamic access authentication protocol based on Token and the satellite orbit predictability and accurate clock synchronization to construct pre-authentication vectors which implement user random access and seamless switching. Simulations show that this protocol satisfies the security requirements with low handover delay and low computational costs for efficient and secure access authentication for users in LEO satellite networks.
Keywords low earth orbit (LEO) satellite networks      random access      seamless switching      orbital position prediction     
Issue Date: 16 January 2019
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
ZHU Hui
CHEN Siyu
LI Fenghua
WU Heng
ZHAO Haiqiang
WANG Gang
Cite this article:   
ZHU Hui,CHEN Siyu,LI Fenghua, et al. User random access authentication protocol for low earth orbit satellite networks[J]. Journal of Tsinghua University(Science and Technology), 2019, 59(1): 1-8.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2018.22.057     OR     http://jst.tsinghuajournals.com/EN/Y2019/V59/I1/1
  
  
  
  
  
  
  
  
[1] LEOPOLD R J, MILLER A. The IRIDIUM communications system[C]//1993 IEEE MTT-S International Microwave Symposium Digest. Atlanta, USA, 1993:575-578.
[2] 付毅飞. 我国计划2020年建成"鸿雁星座"[N]. 科技日报, 2016-11-03(1). FU Y F. China plans to build "Swan Goose Constellation" in 2020[N]. Science and Technology Daily, 2016-11-03(1). (in Chinese)
[3] CAO J, MA M, LI H, et al. A survey on security aspects for LTE and LTE-A networks[J]. IEEE Communications Surveys & Tutorials, 2014, 16(1):283-302.
[4] CRUICKSHANK H S. A security system for satellite networks[C]//Proceedings of the 5th International Conference on Satellite Systems for Mobile Communications and Navigation. London, UK:IET, 1996:187-190.
[5] HE D J, CHEN C, CHAN S, et al. Secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Transactions on Wireless Communications, 2012, 11(1):48-53.
[6] GABA G S, SARO T. A lightweight authentication protocol based on ECC for satellite communication[J]. Pertanika Journal of Science & Technology, 2017, 25(4):1317-1330.
[7] HWANG M S, YANG C C, SHIU C Y. An authentication scheme for mobile satellite communication system[J]. ACM SIGOPS Operating Systems Review, 2003, 37(4):42-47.
[8] ZHENG G, MA H T, CHENG C, et al. Design and logical analysis on the access authentication scheme for satellite mobile communication networks[J]. IET Information Security, 2012, 6(1):6-13.
[9] CHEN T H, LEE W B, CHEN H B. A self-verification authentication mechanism for mobile satellite communication systems[J]. Computers & Electrical Engineering, 2009, 35(1):41-48.
[10] LEE C C, LI C T, CHANG R X. A simple and efficient authentication scheme for mobile satellite communication systems[J]. International Journal of Satellite Communications and Networking, 2012, 30(1):29-38.
[11] ZHANG Y Y, CHEN J H, HUANG B J. An improved authentication scheme for mobile satellite communication systems[J]. International Journal of Satellite Communications and Networking, 2015, 33(2):135-146.
[12] CHEN C L, CHENG K W, CHEN Y L, et al. An improvement on the self-verification authentication mechanism for a mobile satellite communication system[J]. Applied Mathematics & Information Sciences, 2014, 8(1L):97-106.
[13] TSAI J L, LO N W, WU T C. Secure anonymous authentication scheme without verification table for mobile satellite communication systems[J]. International Journal of Satellite Communications and Networking, 2014, 32(5):443-452.
[14] LIN H Y. Efficient dynamic authentication for mobile satellite communication systems without verification table[J] International Journal of Satellite Communications and Networking, 2016, 34(1):3-10.
[15] EVANS J V. Satellite systems for personal communications[J]. IEEE Antennas and Propagation Magazine, 1997, 39(3):7-20.
[16] DOLEV D, YAO A C. On the security of public key protocols[J]. IEEE Transactions on Information Theory, 1983, 29(2):198-208.
[17] BURROWS M, ABADI M, NEEDHAM R. A logic of authentication[J]. ACM SIGOPS Operating Systems Review, 1989, 23(5):1-13.
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd