当前位置: X-MOL 学术J. Netw. Comput. Appl. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A provably secure ECC-based access and handover authentication protocol for space information networks
Journal of Network and Computer Applications ( IF 8.7 ) Pub Date : 2021-08-25 , DOI: 10.1016/j.jnca.2021.103183
Junyan Guo 1 , Ye Du 1 , Yahang Zhang 2 , Meihong Li 1
Affiliation  

At present, space information networks are widely used in various fields and gradually attract more and more users to access. However, because the wireless channel in space information networks is public, it is extremely vulnerable to attacks such as eavesdropping, replay and impersonation attacks, which may lead to the leakage of privacy and secret information. In recent years, many authentication schemes have been proposed to prevent malicious nodes from accessing and stealing resources, but most of these schemes either do not take into account the security of satellite relay nodes or the handover problems caused by dynamic topology. To solve the above-mentioned problems, we propose a novel ECC-based authentication scheme, which not only confirms the validity of the satellite node when user and ground station authenticate each other, but also designs the handover schemes based on two possible signal handover scenarios. For the handover involving the ground station, we also design an efficient multi-user batch handover authentication scheme, which can greatly reduce the computation overhead and delay. In the security analysis, we prove the security of our protocol based on the ROM model and AVISPA formal verification tool, and verify that our protocol can meet the security attributes and resist various forms of attacks through informal security analysis. Finally, security and performance analysis results demonstrate that our protocol is more suitable for user access and handover in space information networks while ensuring higher security requirements.



中文翻译:

一种可证明安全的基于 ECC 的空间信息网络接入和切换认证协议

目前,空间信息网络广泛应用于各个领域,并逐渐吸引越来越多的用户接入。但是,由于空间信息网络中的无线信道是公共的,极易受到窃听、重放和冒充攻击等攻击,从而可能导致隐私和秘密信息的泄露。近年来,为了防止恶意节点访问和窃取资源,提出了许多认证方案,但这些方案要么没有考虑到卫星中继节点的安全性,要么没有考虑到动态拓扑引起的切换问题。针对上述问题,我们提出了一种新的基于ECC的认证方案,它不仅在用户和地面站相互认证时确认卫星节点的有效性,但也设计了基于两种可能的信号切换场景的切换方案。对于涉及地面站的切换,我们还设计了一种高效的多用户批量切换认证方案,可以大大降低计算开销和延迟。在安全分析中,我们基于ROM模型和AVISPA形式验证工具来证明我们的协议的安全性,并通过非正式的安全分析验证我们的协议能够满足安全属性并抵抗各种形式的攻击。最后,安全和性能分析结果表明,我们的协议更适合空间信息网络中的用户访问和切换,同时保证更高的安全要求。我们还设计了一种高效的多用户批量切换认证方案,可以大大降低计算开销和延迟。在安全分析中,我们基于ROM模型和AVISPA形式验证工具来证明我们的协议的安全性,并通过非正式的安全分析验证我们的协议能够满足安全属性并抵抗各种形式的攻击。最后,安全和性能分析结果表明,我们的协议更适合空间信息网络中的用户访问和切换,同时保证更高的安全要求。我们还设计了一种高效的多用户批量切换认证方案,可以大大降低计算开销和延迟。在安全分析中,我们基于ROM模型和AVISPA形式验证工具来证明我们的协议的安全性,并通过非正式的安全分析验证我们的协议能够满足安全属性并抵抗各种形式的攻击。最后,安全和性能分析结果表明,我们的协议更适合空间信息网络中的用户访问和切换,同时保证更高的安全要求。并通过非正式的安全分析验证我们的协议能够满足安全属性并抵抗各种形式的攻击。最后,安全和性能分析结果表明,我们的协议更适合空间信息网络中的用户接入和切换,同时保证更高的安全要求。并通过非正式的安全分析验证我们的协议能够满足安全属性并抵抗各种形式的攻击。最后,安全和性能分析结果表明,我们的协议更适合空间信息网络中的用户访问和切换,同时保证更高的安全要求。

更新日期:2021-08-31
down
wechat
bug