An efficient and secure anonymous authentication scheme for mobile satellite communication systems
<p>Abstract</p> <p>This paper proposes a new efficient and secure anonymous authentication scheme for mobile satellite communication systems. Compared with the related schemes, the proposed scheme achieves the following three main advantages: (1) It is just based on a secure one-wa...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2011-01-01
|
Series: | EURASIP Journal on Wireless Communications and Networking |
Subjects: | |
Online Access: | http://jwcn.eurasipjournals.com/content/2011/1/86 |
id |
doaj-67f88b485a27407abd1f4c73a1e04993 |
---|---|
record_format |
Article |
spelling |
doaj-67f88b485a27407abd1f4c73a1e049932020-11-24T20:48:01ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14721687-14992011-01-012011186An efficient and secure anonymous authentication scheme for mobile satellite communication systemsYoo Kee-YoungChoi Myung-JinHong Jeong-WooYoon Sang-YoonPark Dong-InYoon Eun-Jun<p>Abstract</p> <p>This paper proposes a new efficient and secure anonymous authentication scheme for mobile satellite communication systems. Compared with the related schemes, the proposed scheme achieves the following three main advantages: (1) It is just based on a secure one-way hash function for avoiding complex computations for both mobile users and network control center (NCC), (2) it does not require sensitive verification table which may cause NCC to become an attractive target for numerous attacks (e.g., insertion attacks and stolen-verifier attacks), and (3) it provides higher security level (e.g., secure mutual authentication and key establishment, confidential communication, user's privacy, simple key management, and session key independence). As a result, the proposed scheme is very suitable for lightweight-device environments because of very low computation overload on the part of both mobile user and NCC.</p> http://jwcn.eurasipjournals.com/content/2011/1/86mobile satellite communication systemuser authenticationkey establishmentpublic-key managementanonymity |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yoo Kee-Young Choi Myung-Jin Hong Jeong-Woo Yoon Sang-Yoon Park Dong-In Yoon Eun-Jun |
spellingShingle |
Yoo Kee-Young Choi Myung-Jin Hong Jeong-Woo Yoon Sang-Yoon Park Dong-In Yoon Eun-Jun An efficient and secure anonymous authentication scheme for mobile satellite communication systems EURASIP Journal on Wireless Communications and Networking mobile satellite communication system user authentication key establishment public-key management anonymity |
author_facet |
Yoo Kee-Young Choi Myung-Jin Hong Jeong-Woo Yoon Sang-Yoon Park Dong-In Yoon Eun-Jun |
author_sort |
Yoo Kee-Young |
title |
An efficient and secure anonymous authentication scheme for mobile satellite communication systems |
title_short |
An efficient and secure anonymous authentication scheme for mobile satellite communication systems |
title_full |
An efficient and secure anonymous authentication scheme for mobile satellite communication systems |
title_fullStr |
An efficient and secure anonymous authentication scheme for mobile satellite communication systems |
title_full_unstemmed |
An efficient and secure anonymous authentication scheme for mobile satellite communication systems |
title_sort |
efficient and secure anonymous authentication scheme for mobile satellite communication systems |
publisher |
SpringerOpen |
series |
EURASIP Journal on Wireless Communications and Networking |
issn |
1687-1472 1687-1499 |
publishDate |
2011-01-01 |
description |
<p>Abstract</p> <p>This paper proposes a new efficient and secure anonymous authentication scheme for mobile satellite communication systems. Compared with the related schemes, the proposed scheme achieves the following three main advantages: (1) It is just based on a secure one-way hash function for avoiding complex computations for both mobile users and network control center (NCC), (2) it does not require sensitive verification table which may cause NCC to become an attractive target for numerous attacks (e.g., insertion attacks and stolen-verifier attacks), and (3) it provides higher security level (e.g., secure mutual authentication and key establishment, confidential communication, user's privacy, simple key management, and session key independence). As a result, the proposed scheme is very suitable for lightweight-device environments because of very low computation overload on the part of both mobile user and NCC.</p> |
topic |
mobile satellite communication system user authentication key establishment public-key management anonymity |
url |
http://jwcn.eurasipjournals.com/content/2011/1/86 |
work_keys_str_mv |
AT yookeeyoung anefficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems AT choimyungjin anefficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems AT hongjeongwoo anefficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems AT yoonsangyoon anefficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems AT parkdongin anefficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems AT yooneunjun anefficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems AT yookeeyoung efficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems AT choimyungjin efficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems AT hongjeongwoo efficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems AT yoonsangyoon efficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems AT parkdongin efficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems AT yooneunjun efficientandsecureanonymousauthenticationschemeformobilesatellitecommunicationsystems |
_version_ |
1716809232117923841 |