Skip to main content
Log in

A secure three-factor anonymous roaming authentication protocol using ECC for space information networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Nowadays, space information networks (SIN) has been widely used in navigation, observation and military activities due to its advantages of wide coverage, convenient communication and the ability to provide users with multiple services. However, because of the openness of the spatial channel, there are security threats such as information eavesdropping, interception and forgery. So far, many scholars have proposed a series of authentication protocols to support both parties’ authentication and key negotiation in SIN to ensure the security of access and communication. However, most of these protocols lack a login authentication mechanism, which will be vulnerable to smart card theft attacks. In addition, these protocols only support authentication services in the home domain. When users move to a foreign region to use these protocols for access verification, there will be security vulnerabilities, such as authentication failure and the leakage of session keys. To better solve this problem, we design a new ECC-based anonymous authentication protocol with three-factor login verification in this paper. Our protocol not only supports users to authenticate in the home domain, but also supports users to access SIN when roaming to foreign regions. Furthermore, through formal and informal security analysis methods, we prove that our protocol can securely authenticate each other, negotiate the session key and resist various attacks. In addition, combined with performance analysis, our protocol is more suitable for SIN than other related protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Yao H, Wang L, Wang X, Lu Z, Liu Y (2018) The space-terrestrial integrated network: an overview. IEEE Commun Mag 56(9):178–185

    Article  Google Scholar 

  2. Yang Q, Xue K, Xu J, Wang J, Li F, Yu N (2018) AnFRA: anonymous and fast roaming authentication for space information network. IEEE Trans Info Foren Sec 14(2):486–497

    Article  Google Scholar 

  3. Keller H, Salzwedel H (1996) Link strategy for the mobile satellite system Iridium. Proc Vehic Technol Conf VTC 2:1220–1224

    Article  Google Scholar 

  4. Pulliam J, Zambre Y, Karmarkar A, Mehta V, Touch J, Haines J, Everett M (2008) TSAT network architecture. In: MILCOM 2008-2008 IEEE military communications conference. IEEE, pp 1–7

  5. Paziewski J, Wielgosz P (2015) Accounting for galileo–GPS inter-system biases in precise satellite positioning. J Geodesy 89(1):81–93

    Article  Google Scholar 

  6. Jiang C, Wang X, Wang J, Chen HH, Ren Y (2015) Security in space information networks. IEEE Commun Mag 53(8):82–88

    Article  Google Scholar 

  7. Li FH, Yang L, Wu W, Zhang LJ, Shi Z (2016) Research status and development trends of security assurance for space-ground integration information network. J Commun 37(11):156–168

    Google Scholar 

  8. Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc Royal Soc London A Math Phys Sci 426(1871):233–271

    MathSciNet  MATH  Google Scholar 

  9. Cruickshank HS (1996) A security system for satellite networks. International Conference on Satellite Systems for Mobile Communications & Navigation. IET

  10. Hwang MS, Yang CC, Shiu CY (2003) An authentication scheme for mobile satellite communication systems. ACM SIGOPS Oper Sys Rev 37(4):42–47

    Article  Google Scholar 

  11. Chang YF, Chang CC (2005) An efficient authentication protocol for mobile satellite communication systems. ACM SIGOPS Oper Sys Rev 39(1):70–84

    Article  Google Scholar 

  12. Chen TH, Lee WB, Chen HB (2009) A self-verification authentication mechanism for mobile satellite communication systems. Comput Elec Eng 35(1):41–48

    Article  Google Scholar 

  13. Lasc I, Dojen R, Coffey T (2011) Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications. Comput Elec Eng 37(2):160–168

    Article  Google Scholar 

  14. Yantao Z, Jianfeng M (2010) A highly secure identity-based authenticated key-exchange protocol for satellite communication. J Commun Netw 12(6):592–599

    Article  Google Scholar 

  15. Song IA, Lee YS (2016) Improvement of key exchange protocol to prevent Man-in-The-Middle attack in the satellite environment. In: 2016 Eighth international conference on ubiquitous and future networks (ICUFN). IEEE, pp 408–413

  16. Zhao W, Zhang A, Li J, Wu X, Liu Y (2016) Analysis and design of an authentication protocol for space information network. In: MILCOM 2016-2016 IEEE military communications conference. IEEE, pp 43–48

  17. Qi M, Chen J, Chen Y (2019) A secure authentication with key agreement scheme using ECC for satellite communication systems. Int J Sat Commun Netw 37(3):234–244

    Article  Google Scholar 

  18. Guo H, Gao Y, Xu T, Zhang X, Ye J (2019) A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks. Ad Hoc Netw 95:101965

    Article  Google Scholar 

  19. Wu F, Xu L, Kumari S, Li X, Shen J, Choo KKR, Das AK (2017) An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J Netw Comput Appl 89:72–85

    Article  Google Scholar 

  20. Amara M, Siad A (2011) Elliptic curve cryptography and its applications. In: International workshop on systems, signal processing and their applications, WOSSPA. IEEE, pp 247–250

  21. Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: International conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 523–540

  22. Das AK, Sutrala AK, Kumari S, Odelu V, Wazid M, Li X (2016) An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Sec Commun Netw 9(13):2070–2092

    Article  Google Scholar 

  23. Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29 (2):198–208

    Article  MathSciNet  Google Scholar 

  24. Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552

    Article  MathSciNet  Google Scholar 

  25. Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, Vasilakos AV (2018) An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput Elec Eng 69:534–554

    Article  Google Scholar 

  26. Amin R, Biswas GP (2016) A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw 36:58–80

    Article  Google Scholar 

  27. Von Oheimb D (2005) The high-level protocol specification language HLPSL developed in the EU project AVISPA. In: Proceedings of APPSEM 2005 workshop, pp 1–17

Download references

Acknowledgements

The authors would like to thank all the anonymous reviewers for their helpful advice. This paper is supported by the National Natural Science Foundation of China (Grant No. 61672092).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junyan Guo.

Ethics declarations

Conflict of interests

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Guo, J., Du, Y. A secure three-factor anonymous roaming authentication protocol using ECC for space information networks. Peer-to-Peer Netw. Appl. 14, 898–916 (2021). https://doi.org/10.1007/s12083-020-01050-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-01050-w

Keywords

Navigation