Abstract
Nowadays, space information networks (SIN) has been widely used in navigation, observation and military activities due to its advantages of wide coverage, convenient communication and the ability to provide users with multiple services. However, because of the openness of the spatial channel, there are security threats such as information eavesdropping, interception and forgery. So far, many scholars have proposed a series of authentication protocols to support both parties’ authentication and key negotiation in SIN to ensure the security of access and communication. However, most of these protocols lack a login authentication mechanism, which will be vulnerable to smart card theft attacks. In addition, these protocols only support authentication services in the home domain. When users move to a foreign region to use these protocols for access verification, there will be security vulnerabilities, such as authentication failure and the leakage of session keys. To better solve this problem, we design a new ECC-based anonymous authentication protocol with three-factor login verification in this paper. Our protocol not only supports users to authenticate in the home domain, but also supports users to access SIN when roaming to foreign regions. Furthermore, through formal and informal security analysis methods, we prove that our protocol can securely authenticate each other, negotiate the session key and resist various attacks. In addition, combined with performance analysis, our protocol is more suitable for SIN than other related protocols.
Similar content being viewed by others
References
Yao H, Wang L, Wang X, Lu Z, Liu Y (2018) The space-terrestrial integrated network: an overview. IEEE Commun Mag 56(9):178–185
Yang Q, Xue K, Xu J, Wang J, Li F, Yu N (2018) AnFRA: anonymous and fast roaming authentication for space information network. IEEE Trans Info Foren Sec 14(2):486–497
Keller H, Salzwedel H (1996) Link strategy for the mobile satellite system Iridium. Proc Vehic Technol Conf VTC 2:1220–1224
Pulliam J, Zambre Y, Karmarkar A, Mehta V, Touch J, Haines J, Everett M (2008) TSAT network architecture. In: MILCOM 2008-2008 IEEE military communications conference. IEEE, pp 1–7
Paziewski J, Wielgosz P (2015) Accounting for galileo–GPS inter-system biases in precise satellite positioning. J Geodesy 89(1):81–93
Jiang C, Wang X, Wang J, Chen HH, Ren Y (2015) Security in space information networks. IEEE Commun Mag 53(8):82–88
Li FH, Yang L, Wu W, Zhang LJ, Shi Z (2016) Research status and development trends of security assurance for space-ground integration information network. J Commun 37(11):156–168
Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc Royal Soc London A Math Phys Sci 426(1871):233–271
Cruickshank HS (1996) A security system for satellite networks. International Conference on Satellite Systems for Mobile Communications & Navigation. IET
Hwang MS, Yang CC, Shiu CY (2003) An authentication scheme for mobile satellite communication systems. ACM SIGOPS Oper Sys Rev 37(4):42–47
Chang YF, Chang CC (2005) An efficient authentication protocol for mobile satellite communication systems. ACM SIGOPS Oper Sys Rev 39(1):70–84
Chen TH, Lee WB, Chen HB (2009) A self-verification authentication mechanism for mobile satellite communication systems. Comput Elec Eng 35(1):41–48
Lasc I, Dojen R, Coffey T (2011) Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications. Comput Elec Eng 37(2):160–168
Yantao Z, Jianfeng M (2010) A highly secure identity-based authenticated key-exchange protocol for satellite communication. J Commun Netw 12(6):592–599
Song IA, Lee YS (2016) Improvement of key exchange protocol to prevent Man-in-The-Middle attack in the satellite environment. In: 2016 Eighth international conference on ubiquitous and future networks (ICUFN). IEEE, pp 408–413
Zhao W, Zhang A, Li J, Wu X, Liu Y (2016) Analysis and design of an authentication protocol for space information network. In: MILCOM 2016-2016 IEEE military communications conference. IEEE, pp 43–48
Qi M, Chen J, Chen Y (2019) A secure authentication with key agreement scheme using ECC for satellite communication systems. Int J Sat Commun Netw 37(3):234–244
Guo H, Gao Y, Xu T, Zhang X, Ye J (2019) A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks. Ad Hoc Netw 95:101965
Wu F, Xu L, Kumari S, Li X, Shen J, Choo KKR, Das AK (2017) An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J Netw Comput Appl 89:72–85
Amara M, Siad A (2011) Elliptic curve cryptography and its applications. In: International workshop on systems, signal processing and their applications, WOSSPA. IEEE, pp 247–250
Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 523–540
Das AK, Sutrala AK, Kumari S, Odelu V, Wazid M, Li X (2016) An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Sec Commun Netw 9(13):2070–2092
Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29 (2):198–208
Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, Vasilakos AV (2018) An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput Elec Eng 69:534–554
Amin R, Biswas GP (2016) A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw 36:58–80
Von Oheimb D (2005) The high-level protocol specification language HLPSL developed in the EU project AVISPA. In: Proceedings of APPSEM 2005 workshop, pp 1–17
Acknowledgements
The authors would like to thank all the anonymous reviewers for their helpful advice. This paper is supported by the National Natural Science Foundation of China (Grant No. 61672092).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interests
The authors declare that they have no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Guo, J., Du, Y. A secure three-factor anonymous roaming authentication protocol using ECC for space information networks. Peer-to-Peer Netw. Appl. 14, 898–916 (2021). https://doi.org/10.1007/s12083-020-01050-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-020-01050-w