1 Introduction
2 Preliminaries
2.1 Mobile satellite communication systems
2.2 Required essential properties
3 The proposed authentication scheme
-
U, NCC: two communicating parties, a user and the network control center;
-
U ID , T ID , and LEO ID : the identity of a mobile user, the temporary identity of a mobile user, and the identity of a LEO satellite, respectively;
-
x: a long-term private key of NCC;
-
X → Y : M: a party X delivers a message M to another party Y ;
-
MAC k (·): a message authentication code (MAC) involving a key k;
-
⊕: a bit-wise exclusive-or operation;
3.1 Registration phase
3.2 Authentication phase
4 Discussion and security analysis
4.1 Discussion of the required essential properties
Cruickshank | Hwang et al. | Chang et al. | Chen et al. | Proposed | |
---|---|---|---|---|---|
Mutual authentication | Yes | Yes | Yes | Yes | Yes |
Confidentiality | Yes | NA | NA | Yes | Yes |
User's privacy | No | Yes | No
b
| Yes | Yes |
Low computation cost | No | No | No
c
| No | Yes |
Simple key management | No | No | Yes | Yes | Yes |
Minimum trust | No
a
| Yes | Yes | Yes | Yes |
Session independence | Yes | No | Yes | Yes | Yes |
4.2 Security analysis
4.3 Performance analysis
Cruickshank | Hwang et al. | Chang et al. | Chen et al. | Proposed | |
---|---|---|---|---|---|
Hash operations | - | - | *N-(j-1)+3/3 | 1/3 | 1/4 |
MAC operations | - | - | - | 1/1 | 2/2 |
Symmetric operations | 1/1 | 2/2 | - | 1/1 | - |
Asymmetric operations | 1/1 | - | - | (0/3) | - |
Equation solving operations | - | - | - |
k
| - |