An efficient and secure anonymous authentication scheme for mobile satellite communication systems

<p>Abstract</p> <p>This paper proposes a new efficient and secure anonymous authentication scheme for mobile satellite communication systems. Compared with the related schemes, the proposed scheme achieves the following three main advantages: (1) It is just based on a secure one-wa...

Full description

Bibliographic Details
Main Authors: Yoo Kee-Young, Choi Myung-Jin, Hong Jeong-Woo, Yoon Sang-Yoon, Park Dong-In, Yoon Eun-Jun
Format: Article
Language:English
Published: SpringerOpen 2011-01-01
Series:EURASIP Journal on Wireless Communications and Networking
Subjects:
Online Access:http://jwcn.eurasipjournals.com/content/2011/1/86
id doaj-67f88b485a27407abd1f4c73a1e04993
record_format Article
spelling doaj-67f88b485a27407abd1f4c73a1e049932020-11-24T20:48:01ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14721687-14992011-01-012011186An efficient and secure anonymous authentication scheme for mobile satellite communication systemsYoo Kee-YoungChoi Myung-JinHong Jeong-WooYoon Sang-YoonPark Dong-InYoon Eun-Jun<p>Abstract</p> <p>This paper proposes a new efficient and secure anonymous authentication scheme for mobile satellite communication systems. Compared with the related schemes, the proposed scheme achieves the following three main advantages: (1) It is just based on a secure one-way hash function for avoiding complex computations for both mobile users and network control center (NCC), (2) it does not require sensitive verification table which may cause NCC to become an attractive target for numerous attacks (e.g., insertion attacks and stolen-verifier attacks), and (3) it provides higher security level (e.g., secure mutual authentication and key establishment, confidential communication, user's privacy, simple key management, and session key independence). As a result, the proposed scheme is very suitable for lightweight-device environments because of very low computation overload on the part of both mobile user and NCC.</p> http://jwcn.eurasipjournals.com/content/2011/1/86mobile satellite communication systemuser authenticationkey establishmentpublic-key managementanonymity
collection DOAJ
language English
format Article
sources DOAJ
author Yoo Kee-Young
Choi Myung-Jin
Hong Jeong-Woo
Yoon Sang-Yoon
Park Dong-In
Yoon Eun-Jun
spellingShingle Yoo Kee-Young
Choi Myung-Jin
Hong Jeong-Woo
Yoon Sang-Yoon
Park Dong-In
Yoon Eun-Jun
An efficient and secure anonymous authentication scheme for mobile satellite communication systems
EURASIP Journal on Wireless Communications and Networking
mobile satellite communication system
user authentication
key establishment
public-key management
anonymity
author_facet Yoo Kee-Young
Choi Myung-Jin
Hong Jeong-Woo
Yoon Sang-Yoon
Park Dong-In
Yoon Eun-Jun
author_sort Yoo Kee-Young
title An efficient and secure anonymous authentication scheme for mobile satellite communication systems
title_short An efficient and secure anonymous authentication scheme for mobile satellite communication systems
title_full An efficient and secure anonymous authentication scheme for mobile satellite communication systems
title_fullStr An efficient and secure anonymous authentication scheme for mobile satellite communication systems
title_full_unstemmed An efficient and secure anonymous authentication scheme for mobile satellite communication systems
title_sort efficient and secure anonymous authentication scheme for mobile satellite communication systems
publisher SpringerOpen
series EURASIP Journal on Wireless Communications and Networking
issn 1687-1472
1687-1499
publishDate 2011-01-01
description <p>Abstract</p> <p>This paper proposes a new efficient and secure anonymous authentication scheme for mobile satellite communication systems. Compared with the related schemes, the proposed scheme achieves the following three main advantages: (1) It is just based on a secure one-way hash function for avoiding complex computations for both mobile users and network control center (NCC), (2) it does not require sensitive verification table which may cause NCC to become an attractive target for numerous attacks (e.g., insertion attacks and stolen-verifier attacks), and (3) it provides higher security level (e.g., secure mutual authentication and key establishment, confidential communication, user's privacy, simple key management, and session key independence). As a result, the proposed scheme is very suitable for lightweight-device environments because of very low computation overload on the part of both mobile user and NCC.</p>
topic mobile satellite communication system
user authentication
key establishment
public-key management
anonymity
url http://jwcn.eurasipjournals.com/content/2011/1/86
work_keys_str_mv AT yookeeyoung anefficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems
AT choimyungjin anefficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems
AT hongjeongwoo anefficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems
AT yoonsangyoon anefficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems
AT parkdongin anefficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems
AT yooneunjun anefficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems
AT yookeeyoung efficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems
AT choimyungjin efficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems
AT hongjeongwoo efficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems
AT yoonsangyoon efficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems
AT parkdongin efficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems
AT yooneunjun efficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems
_version_ 1716809232117923841