A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
An efficient and secure anonymous authentication scheme for mobile satellite communication systems
2011
EURASIP Journal on Wireless Communications and Networking
This paper proposes a new efficient and secure anonymous authentication scheme for mobile satellite communication systems. ...
Compared with the related schemes, the proposed scheme achieves the following three main advantages: (1) It is just based on a secure one-way hash function for avoiding complex computations for both mobile ...
Acknowledgements We would like to thank the anonymous reviewers for their helpful comments. This research was supported by Basic Science Research ...
doi:10.1186/1687-1499-2011-86
fatcat:xm3ojqf6lndmvfgcnnoj57zhgm
An efficient and provably secure key agreement scheme for satellite communication systems
2021
PLoS ONE
The security of satellite communication systems has always been the concern of many scholars. Without authentication, user should not obtain his/her required services. ...
Beyond that, the anonymity also needs to be protected during communications. In this study, we design an efficient and provably secure key agreement scheme for satellite communication systems. ...
proposed an authentication scheme for mobile satellite communication system [9] . However, Chang et al. pointed out that their scheme couldn't proved perfect forward secrecy [10] . ...
doi:10.1371/journal.pone.0250205
pmid:33901206
fatcat:77nvgaqa6vh5de37vrnl3gn57m
A Lightweight Key Agreement and Authentication Scheme for Satellite-Communication Systems
2020
IEEE Access
Hence, our protocol offers a secure authentication and key agreement for mobile satellite systems. ...
Therefore, a robust key agreement authentication scheme for mobile satellite environment is proposed in this article. ...
The proposed scheme offers following main features: 1) A secure three party mobile user authentication key agreement scheme for satellite communication system is presented that provides shield against ...
doi:10.1109/access.2020.2978314
fatcat:t7m3n5jcbvg53f4cq57ejsbrse
Efficient Message Authentication Scheme with Conditional Privacy-Preserving and Signature Aggregation for Vehicular Cloud Network
2018
Wireless Communications and Mobile Computing
Because VCN is of distinguishing feature with super-large scale and unstable communication, it is a challenging task to study efficient authentication scheme for VCN without losing security and conditional ...
A batch message verification and signature aggregation are included in the proposed scheme to improve the authentication efficiency and decrease the communication cost. ...
[28] proposed a mutual authentication and key agreement scheme for secure vehicleto-vehicle communication. ...
doi:10.1155/2018/1875489
fatcat:2qhv34wvajec5io5zntfmxb5ri
Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects
2013
IEEE Communications Magazine
Although the same may be said for all communication systems, roaming services have special requirements and vulnerabilities, and therefore deserve special attention. ...
Seamless roaming over wireless networks is highly desirable to mobile users, but ensuring the security and efficiency of this process is challenging. ...
Also, we are grateful to the anonymous reviewers for their valuable comments to improve the quality of the manuscript. ...
doi:10.1109/mcom.2013.6461199
fatcat:sxzktd7gjbespk52fcxmw2mrdq
A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network
2020
Security and Communication Networks
To solve the vulnerability of these protocols, in this paper, we propose a new RLWE-based anonymous mutual authentication and key agreement protocol, which guarantees higher security with low computational ...
However, due to the openness and publicity of the satellite wireless channel and the limited resources of the satellite nodes, the privacy and security cannot be perfectly guaranteed and may even be vulnerable ...
Security and Communication Networks (ii) Satellite node is the service provider for end users in SIN. ...
doi:10.1155/2020/5167832
fatcat:h7em7amffrfu3jsi52gpqzzok4
Recent Advances and Challenges in Security and Privacy for V2X Communications
2020
IEEE Open Journal of Vehicular Technology
For security, detailed discussions on cryptography based schemes and trust based schemes are provided. ...
Thus, security architectures and solutions for cellular based communications are also illustrated and discussed. ...
ECPP minimizes the storage used for anonymous keys without losing the security level. ...
doi:10.1109/ojvt.2020.2999885
fatcat:d3ut2edr7jhvvltv6x56snw36u
Survey on Vehicular Ad Hoc Networks and Its Access Technologies Security Vulnerabilities and Countermeasures
[article]
2019
arXiv
pre-print
These access technologies extend from DSRC, Satellite Radio, and Bluetooth to VLC and 5G. ...
end-to-end system perspective, (2) adversaries taking control of the VANETs entities will compromise the safety, privacy, and security of the road users and will be followed by legal exposures, as well ...
In their proposed scheme, anonymization service, provides a solution for conflict between authentication and privacy. ...
arXiv:1903.01541v1
fatcat:ntanpbw3z5benhlbzn6vzqm7ne
Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges
[article]
2021
arXiv
pre-print
Specifically, we classify the literature on security for SATCOM systems into two main branches, i.e., physical-layer security and cryptography schemes. ...
Satellite-based Communication (SATCOM) systems are gaining renewed momentum in Industry and Academia, thanks to innovative services introduced by leading tech companies and the promising impact they can ...
for mobile satellite communication systems,” International Journal of
[104] M. Lichtman and J. ...
arXiv:2112.11324v2
fatcat:mdrumzffujdwzmzqwajk3hkxbm
BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys
2018
Security and Communication Networks
The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. ...
LEO constellation has received intensive research attention in the field of satellite communication. ...
Mechanisms for ensuring secure communication within satellite networks are key for achieving security within satellite network systems. ...
doi:10.1155/2018/7202806
fatcat:lj7ldywnr5a6pfcgsw2htjmeuq
A secure routing scheme for underwater acoustic networks
2017
International Journal of Distributed Sensor Networks
of route setup for authentication between source and destination node pair. ...
Simulation results show the secure routing scheme has moderate network performance under the premise of secure communication. ...
Funding The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the National Natural Science ...
doi:10.1177/1550147717713643
fatcat:ssjpc2pvuvbxhb3ri7aq5qxqvm
A Survey on Security in Vehicular Ad Hoc Networks
[chapter]
2013
Lecture Notes in Computer Science
Vehicular Ad-hoc Networks (VANETs) are the most prominent enabling network technology for Intelligent Transportation Systems. ...
We also provide taxonomy and critically review the notable security solutions -available for VANETs in literature. ...
This system uses proof of knowledge technique for authentication based defense scheme. This nonframeability scheme is basically designed for law enforcement authorities. ...
doi:10.1007/978-3-642-37974-1_5
fatcat:3cqgkwnp4ngwrjfdobsaq4jdfe
A Secure Authentication Infrastructure for IoT Enabled Smart Mobile Devices – An Initial Prototype
2016
Indian Journal of Science and Technology
IoT include technologies to acquire and process contextual information like sensors, Near Field Communicators, Global Positioning Systems etc. ...
The Iot brings many opportunities to the society but these technologies penetrate all the aspects related to the communicator and require solution to improve security and privacy. ...
In Real time authentication system for RFID applications, Swathi Kumari introduced a new security layer for authentication. ...
doi:10.17485/ijst/2016/v9i9/86791
fatcat:b4zqqny73fh6lceqwrq73bz24u
An Analytic Study of Security Solutions for VANET
2015
International Journal of Computer Applications
Therefore there is a need for optimizing the Security of vehicular Adhoc networks by Mitigating malicious attacks. ...
Vehicular ad-hoc networks (VANETs) are renowned form of mobile ad-hoc networks. ...
[10] (2015)
Enhancing
Security and
Privacy for
Identity-based
Batch Verification
Scheme in
VANET
The system
initialization,
anonymous identity
generation, message
signing, and message ...
doi:10.5120/ijca2015907563
fatcat:eal65oqxxregpgq5mf22lcjq7q
A Survey of Internet of Things (IoT) Authentication Schemes
2019
Sensors
Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system ...
The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. ...
After doing a security analysis for some of previous scheme for the authentication of devices in Low-earth-orbit satellite (LEOs) communication systems, the authors of [147] proposed an authentication ...
doi:10.3390/s19051141
fatcat:sc6et2p5vneyvietpdr4gr4ena
« Previous
Showing results 1 — 15 out of 1,040 results