Font Size: a A A

The Research And Application Of Authentication Protocol For Satellite Communications

Posted on:2020-07-15Degree:MasterType:Thesis
Country:ChinaCandidate:S S XuFull Text:PDF
GTID:2428330599451732Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the rapid development of science and technology,mobile communications become more significant in our social life.The signals,however,may be reduced due to environmental and geographic limitations,which make the user experience decline.In recent years,people found that the low earth orbit satellites(LEOS)can be used to solve this problem effectively.What's more,the low earth orbit satellites have some advantages that are useful for the mobile communications,such as less influence of environment,short delay of signals.At the same time,in the process of satellite communication,people gradually found that they have certain security problems.For example,the transmitted information is vulnerable to attack and is then used by criminals.In addition,the user's personal privacy information is also vulnerable to disclosure.Therefore,based on cryptography and combining specific security measures,the researchers proposed authentication protocols to meet common security requirements and resist various types of attacks to ensure security during communication.In order to guarantee the satellite communications security,many researchers introduced softs of authentication protocols.Rencently,Zhang et al.and Qi et al.presented an authentication with key agreement protocol for satellite communications respectively,and they all proclaimed that their protocols could defend various attacks and support varied security requirements.Regretably,this paper proves that Zhang et al.'s protocol failed to resist insider attack,stolen-verifier attack and denial of service attack.And this paper also proves that Qi et al.'s protocol was unsuccessful in resisting smart card stolen or loss attack,supporting perfect forward secrecy and had a mathematical error.To solve these problems,this paper presents an improved protocol based on elliptic curve.It also analyzes the sucurity of improved protocol by formal security analysis and the widely accepted BAN logic.The analysis of the improved protocol suggests that it gets possession of faultless security properties and overcomes the flaws of Zhang et al's protocol and Qi et al.'s protocol perfectly.Thus,the improved protocol can be appropriated for the satellite communications.
Keywords/Search Tags:authentication protocol, key exchange, elliptic curve, satellite communications, BAN logic
PDF Full Text Request
Related items