Filters








1,040 Hits in 5.8 sec

An efficient and secure anonymous authentication scheme for mobile satellite communication systems

Eun-Jun Yoon, Kee-Young Yoo, Jeong-Woo Hong, Sang-Yoon Yoon, Dong-In Park, Myung-Jin Choi
2011 EURASIP Journal on Wireless Communications and Networking  
This paper proposes a new efficient and secure anonymous authentication scheme for mobile satellite communication systems.  ...  Compared with the related schemes, the proposed scheme achieves the following three main advantages: (1) It is just based on a secure one-way hash function for avoiding complex computations for both mobile  ...  Acknowledgements We would like to thank the anonymous reviewers for their helpful comments. This research was supported by Basic Science Research  ... 
doi:10.1186/1687-1499-2011-86 fatcat:xm3ojqf6lndmvfgcnnoj57zhgm

An efficient and provably secure key agreement scheme for satellite communication systems

Yuanyuan Zhang, Zhibo Zhai
2021 PLoS ONE  
The security of satellite communication systems has always been the concern of many scholars. Without authentication, user should not obtain his/her required services.  ...  Beyond that, the anonymity also needs to be protected during communications. In this study, we design an efficient and provably secure key agreement scheme for satellite communication systems.  ...  proposed an authentication scheme for mobile satellite communication system [9] . However, Chang et al. pointed out that their scheme couldn't proved perfect forward secrecy [10] .  ... 
doi:10.1371/journal.pone.0250205 pmid:33901206 fatcat:77nvgaqa6vh5de37vrnl3gn57m

A Lightweight Key Agreement and Authentication Scheme for Satellite-Communication Systems

Izwa Altaf, Muhammad Asad Saleem, Khalid Mahmood, Saru Kumari, Pradeep Chaudhary, Chien-Ming Chen
2020 IEEE Access  
Hence, our protocol offers a secure authentication and key agreement for mobile satellite systems.  ...  Therefore, a robust key agreement authentication scheme for mobile satellite environment is proposed in this article.  ...  The proposed scheme offers following main features: 1) A secure three party mobile user authentication key agreement scheme for satellite communication system is presented that provides shield against  ... 
doi:10.1109/access.2020.2978314 fatcat:t7m3n5jcbvg53f4cq57ejsbrse

Efficient Message Authentication Scheme with Conditional Privacy-Preserving and Signature Aggregation for Vehicular Cloud Network

Yong Xie, Fang Xu, Dong Li, Yu Nie
2018 Wireless Communications and Mobile Computing  
Because VCN is of distinguishing feature with super-large scale and unstable communication, it is a challenging task to study efficient authentication scheme for VCN without losing security and conditional  ...  A batch message verification and signature aggregation are included in the proposed scheme to improve the authentication efficiency and decrease the communication cost.  ...  [28] proposed a mutual authentication and key agreement scheme for secure vehicleto-vehicle communication.  ... 
doi:10.1155/2018/1875489 fatcat:2qhv34wvajec5io5zntfmxb5ri

Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects

Daojing He, Chun Chen, Jiajun Bu, Sammy Chan, Yan Zhang
2013 IEEE Communications Magazine  
Although the same may be said for all communication systems, roaming services have special requirements and vulnerabilities, and therefore deserve special attention.  ...  Seamless roaming over wireless networks is highly desirable to mobile users, but ensuring the security and efficiency of this process is challenging.  ...  Also, we are grateful to the anonymous reviewers for their valuable comments to improve the quality of the manuscript.  ... 
doi:10.1109/mcom.2013.6461199 fatcat:sxzktd7gjbespk52fcxmw2mrdq

A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network

Junyan Guo, Ye Du
2020 Security and Communication Networks  
To solve the vulnerability of these protocols, in this paper, we propose a new RLWE-based anonymous mutual authentication and key agreement protocol, which guarantees higher security with low computational  ...  However, due to the openness and publicity of the satellite wireless channel and the limited resources of the satellite nodes, the privacy and security cannot be perfectly guaranteed and may even be vulnerable  ...  Security and Communication Networks (ii) Satellite node is the service provider for end users in SIN.  ... 
doi:10.1155/2020/5167832 fatcat:h7em7amffrfu3jsi52gpqzzok4

Recent Advances and Challenges in Security and Privacy for V2X Communications

Jiaqi Huang, Dongfeng Fang, Yi Qian, Rose Qingyang Hu
2020 IEEE Open Journal of Vehicular Technology  
For security, detailed discussions on cryptography based schemes and trust based schemes are provided.  ...  Thus, security architectures and solutions for cellular based communications are also illustrated and discussed.  ...  ECPP minimizes the storage used for anonymous keys without losing the security level.  ... 
doi:10.1109/ojvt.2020.2999885 fatcat:d3ut2edr7jhvvltv6x56snw36u

Survey on Vehicular Ad Hoc Networks and Its Access Technologies Security Vulnerabilities and Countermeasures [article]

Kaveh Bakhsh Kelarestaghi, Mahsa Foruhandeh, Kevin Heaslip, Ryan Gerdes
2019 arXiv   pre-print
These access technologies extend from DSRC, Satellite Radio, and Bluetooth to VLC and 5G.  ...  end-to-end system perspective, (2) adversaries taking control of the VANETs entities will compromise the safety, privacy, and security of the road users and will be followed by legal exposures, as well  ...  In their proposed scheme, anonymization service, provides a solution for conflict between authentication and privacy.  ... 
arXiv:1903.01541v1 fatcat:ntanpbw3z5benhlbzn6vzqm7ne

Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges [article]

Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro
2021 arXiv   pre-print
Specifically, we classify the literature on security for SATCOM systems into two main branches, i.e., physical-layer security and cryptography schemes.  ...  Satellite-based Communication (SATCOM) systems are gaining renewed momentum in Industry and Academia, thanks to innovative services introduced by leading tech companies and the promising impact they can  ...  for mobile satellite communication systems,” International Journal of [104] M. Lichtman and J.  ... 
arXiv:2112.11324v2 fatcat:mdrumzffujdwzmzqwajk3hkxbm

BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

Songjie Wei, Shuai Li, Peilong Liu, Meilin Liu
2018 Security and Communication Networks  
The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching.  ...  LEO constellation has received intensive research attention in the field of satellite communication.  ...  Mechanisms for ensuring secure communication within satellite networks are key for achieving security within satellite network systems.  ... 
doi:10.1155/2018/7202806 fatcat:lj7ldywnr5a6pfcgsw2htjmeuq

A secure routing scheme for underwater acoustic networks

Xiujuan Du, Chunyan Peng, Keqin Li
2017 International Journal of Distributed Sensor Networks  
of route setup for authentication between source and destination node pair.  ...  Simulation results show the secure routing scheme has moderate network performance under the premise of secure communication.  ...  Funding The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the National Natural Science  ... 
doi:10.1177/1550147717713643 fatcat:ssjpc2pvuvbxhb3ri7aq5qxqvm

A Survey on Security in Vehicular Ad Hoc Networks [chapter]

Saira Gillani, Farrukh Shahzad, Amir Qayyum, Rashid Mehmood
2013 Lecture Notes in Computer Science  
Vehicular Ad-hoc Networks (VANETs) are the most prominent enabling network technology for Intelligent Transportation Systems.  ...  We also provide taxonomy and critically review the notable security solutions -available for VANETs in literature.  ...  This system uses proof of knowledge technique for authentication based defense scheme. This nonframeability scheme is basically designed for law enforcement authorities.  ... 
doi:10.1007/978-3-642-37974-1_5 fatcat:3cqgkwnp4ngwrjfdobsaq4jdfe

A Secure Authentication Infrastructure for IoT Enabled Smart Mobile Devices – An Initial Prototype

K. A. Rafidha Rehiman, S. Veni
2016 Indian Journal of Science and Technology  
IoT include technologies to acquire and process contextual information like sensors, Near Field Communicators, Global Positioning Systems etc.  ...  The Iot brings many opportunities to the society but these technologies penetrate all the aspects related to the communicator and require solution to improve security and privacy.  ...  In Real time authentication system for RFID applications, Swathi Kumari introduced a new security layer for authentication.  ... 
doi:10.17485/ijst/2016/v9i9/86791 fatcat:b4zqqny73fh6lceqwrq73bz24u

An Analytic Study of Security Solutions for VANET

Indu Bhardwaj, Sibaram Khara
2015 International Journal of Computer Applications  
Therefore there is a need for optimizing the Security of vehicular Adhoc networks by Mitigating malicious attacks.  ...  Vehicular ad-hoc networks (VANETs) are renowned form of mobile ad-hoc networks.  ...  [10] (2015) Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET The system initialization, anonymous identity generation, message signing, and message  ... 
doi:10.5120/ijca2015907563 fatcat:eal65oqxxregpgq5mf22lcjq7q

A Survey of Internet of Things (IoT) Authentication Schemes

Mohammed El-hajj, Ahmad Fadlallah, Maroun Chamoun, Ahmed Serhrouchni
2019 Sensors  
Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system  ...  The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other.  ...  After doing a security analysis for some of previous scheme for the authentication of devices in Low-earth-orbit satellite (LEOs) communication systems, the authors of [147] proposed an authentication  ... 
doi:10.3390/s19051141 fatcat:sc6et2p5vneyvietpdr4gr4ena
« Previous Showing results 1 — 15 out of 1,040 results