scispace - formally typeset
Journal ArticleDOI

A Lightweight and Secure Group Key Based Handover Authentication Protocol for the Software-Defined Space Information Network

TLDR
An SIN-specific lightweight group key agreement protocol is proposed for SD-SIN to ensure both the security and applicability, and a group key-based secure handover authentication scheme is designed to reduce the overhead of hand over authentication.
Abstract
With rapid advances in satellite technology, space information network (SIN) has been proposed to meet the increasing demands of ubiquitous mobile communication due to its advantages in providing extensive access services. However, due to satellites’ resource constraint and SIN’s highly dynamic topology, it poses a challenge on management and resource utilization in the development of SIN. There have been some works integrating the software defined network (SDN) into SIN, defined as software defined space information network (SD-SIN), so as to simplify the management and improve resource utilization in SIN. However, these works ignore the security issue in SD-SIN. Meanwhile, the existing security mechanisms in SDN are still unable to cope with the uniqueness of satellite network, and some other critical security issues still haven’t yet been well addressed. In this paper, based on $(t,n)$ secret sharing, an SIN-specific lightweight group key agreement protocol is proposed for SD-SIN to ensure both the security and applicability. Moreover, considering the highly dynamic network topology, we also design a group key-based secure handover authentication scheme to reduce the overhead of handover authentication. Security analysis shows that the handover authentication protocol can resist to various known attacks. In addition, further performance evaluation shows its efficiency in terms of computation and communication overheads. Finally, the simulation results of computing overhead to the network entities demonstrate that our protocol is feasible in practical implementation.

read more

Citations
More filters
Journal ArticleDOI

A Survey on Space-Air-Ground-Sea Integrated Network Security in 6G

TL;DR: A detailed survey of recent progress and ongoing research works on SAGSIN security in the aspects of security threats, attack methodologies, and defense countermeasures is provided in this article .
Journal ArticleDOI

Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment

TL;DR: A blockchain-assisted handover authentication and key agreement scheme for ITS in a multi-server edge computing environment that is the first in the literature to provide efficient authentication, strict anonymity and computational load transfer simultaneously.
Journal ArticleDOI

Flexible and Distributed Mobility Management for Integrated Terrestrial-Satellite Networks: Challenges, Architectures, and Approaches

TL;DR: In this article, a game-based handover decision framework is proposed to achieve rapid and unified decisions for massive handovers in integrated terrestrial-satellite networks (lTSNs) to guarantee service continuity and management timeliness.
Journal ArticleDOI

A Distributed Authentication Scheme Based on Smart Contract for Roaming Service in Mobile Vehicular Networks

TL;DR: In this paper , a decentralized fraud-proof roaming authentication framework based on blockchain is proposed, which leverages smart contracts to implement a roaming authentication protocol, including user/AP registration, authentication, and revocation.
Journal ArticleDOI

A Distributed Authentication Scheme Based on Smart Contract for Roaming Service in Mobile Vehicular Networks

TL;DR: This work uses smart contracts to implement a roaming authentication protocol, including user/AP registration, authentication, and revocation, and designs an unforgeable and undeniable billing scheme based on hash chain technology.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Proceedings ArticleDOI

Hedera: dynamic flow scheduling for data center networks

TL;DR: Hedera is presented, a scalable, dynamic flow scheduling system that adaptively schedules a multi-stage switching fabric to efficiently utilize aggregate network resources and delivers bisection bandwidth that is 96% of optimal and up to 113% better than static load-balancing methods.
Journal ArticleDOI

A Survey on Security and Privacy Issues in Internet-of-Things

TL;DR: This survey will explore the most relevant limitations of IoT devices and their solutions, and present the classification of IoT attacks, and analyze the security issues in different layers.
Proceedings ArticleDOI

Scalable flow-based networking with DIFANE

TL;DR: DIFANE is proposed, a scalable and efficient solution that keeps all traffic in the data plane by selectively directing packets through intermediate switches that store the necessary rules.
Related Papers (5)