scispace - formally typeset
Journal ArticleDOI

An improved mutual authentication protocol based on perfect forward secrecy for satellite communications

TLDR
An improved protocol based on perfect forward secrecy is presented that gets possession of faultless security properties and overcomes the flaws in the protocol of Qi et al perfectly and can be appropriated for the mobile communications.
Abstract
Summary As the mobile network progresses fast, mobile communications have a far‐reaching influence in our daily life. In order to guarantee the communication security, a myriad of experts introduce...

read more

Citations
More filters
Journal ArticleDOI

Efficient utilization of elliptic curve cryptography in design of a three-factor authentication protocol for satellite communications

TL;DR: This paper suggests a three-factor elliptic curve cryptography based protocol that can withstand the well-known attacks with a comparable performance and demonstrates that the presented scheme is safe and robust against various attacks.
Journal ArticleDOI

A Lightweight Key Agreement and Authentication Scheme for Satellite-Communication Systems

TL;DR: A robust key agreement authentication scheme for mobile satellite environment is proposed, which provides mutual-authentication, session-key agreement and correct notion of user anonymity, and the storage, communication and computation cost of the proposed protocol is less than many of existing protocols.
Journal ArticleDOI

A secure three-factor-based authentication with key agreement protocol for e-Health clouds

TL;DR: This work proposes a secure three-factor-based authentication with key agreement protocol that can resist replay attack, man-in-the-middle attack and provide the user anonymity, the user untraceability, the perfect forward secrecy, etc.
Journal ArticleDOI

A blockchain-based access control and intrusion detection framework for satellite communication systems

TL;DR: Wang et al. as mentioned in this paper designed a token-based access control mechanism for smart contracts with dynamic adjustment of the access control rules (ACRs), which guarantees that only authorized users can trigger and execute specific smart contracts.
Journal ArticleDOI

Satellite-based communications security: A survey of threats, solutions, and research challenges

TL;DR: In this paper , the authors classify the literature on security for SATCOM systems into two main branches, i.e., physical-layer security and cryptography schemes, and identify specific research domains for each of the identified branches, focusing on dedicated security issues, including, e.g., physical layer confidentiality, anti-jamming schemes, anti spoofing strategies, and quantum-based key distribution schemes.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things

TL;DR: A user authentication protocol scheme with privacy protection for IIoT is proposed and the security of the proposed scheme is proved under a random oracle model, and other security discussions show that the proposed protocol is robust to various attacks.
Journal ArticleDOI

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks

TL;DR: A lightweight anonymous mutual authentication and key agreement scheme for centralized two-hop WBANs is proposed, which allows sensor nodes attached to the patient’s body to authenticate with the local server/hub node and establish a session key in an anonymous and unlinkable manner.
Journal ArticleDOI

On the anonymity of two-factor authentication schemes for wireless sensor networks

TL;DR: A general principle is put forward: Public-key techniques are intrinsically indispensable to construct a two-factor authentication scheme that can support user anonymity, and can be applied to two-Factor schemes for universal environments besides WSNs, such as the Internet, global mobility networks and mobile clouds.
Journal ArticleDOI

Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy

TL;DR: This paper shows that the process of password verification in the login phase is invalid, and proposes a robust three-factor authentication scheme, which not only resists various known attacks, but also provides more desired security features.
Related Papers (5)