Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic <italic>k</italic>-Time Anonymous Authentication

Published: 04 June 2024 Publication History

Abstract

Space Information Network (SIN) enables universal Internet connectivity for any object, even in remote and extreme environments where deploying a cellular network is difficult. Access authentication is crucial for ensuring user access control in SIN and preventing unauthorized entities from gaining access to network services. However, due to the complex communication environment in SIN, including exposed links and higher signal delay, designing a secure and efficient authentication scheme presents a significant challenge. In this paper, we propose a secure communication protocol for SIN with periodic k-time anonymous authentication (named PkT-SIN) that allows satellite users to anonymously authenticate to ground stations at most k times in each single time period. An efficient handover mechanism is designed to ensure seamless communication for satellite users to communicate with different satellites and ground stations, taking into account the dynamic topology of SIN. As a core component of PkT-SIN, we propose a novel primitive, periodic k-time keyed-verification anonymous credential (PkT-KVAC), that enables users to derive k tokens from a credential for anonymous and unlinkable authentication. On the other hand, a verifier can always recognize a reused token from a dishonest user. PkT-KVAC is of independent contribution to anonymous authentication in pay-per-use business scenarios. Formal security proofs confirm that PkT-SIN and PkT-KVAC have desired security features. The supremacy of their computing features is demonstrated through comprehensive comparison and rigorous performance analysis.

References

[1]
H. Guo, J. Li, J. Liu, N. Tian, and N. Kato, “A survey on space-air-ground-sea integrated network security in 6G,” IEEE Commun. Surveys Tuts., vol. 24, no. 1, pp. 53–87, 1st Quart., 2021.
[2]
(2020). Satellite Communication Market Size, Share & Trends Analysis Report By Component (Equipment, Services), by Application (Broadcasting, Airtime), by Vertical, By Region, And Segment Forecasts, 2022–2030. [Online]. Available: https://www.grandviewresearch.com/ industry-analysis/satellite-communication-marke
[3]
Q. Yang, K. Xue, J. Xu, J. Wang, F. Li, and N. Yu, “AnFRA: Anonymous and fast roaming authentication for space information network,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 2, pp. 486–497, Feb. 2019.
[4]
K. Xue, W. Meng, S. Li, D. S. L. Wei, H. Zhou, and N. Yu, “A secure and efficient access and handover authentication protocol for Internet of Things in space information networks,” IEEE Internet Things J., vol. 6, no. 3, pp. 5485–5499, Jun. 2019.
[5]
X. Liu, A. Yang, C. Huang, Y. Li, T. Li, and M. Li, “Decentralized anonymous authentication with fair billing for space-ground integrated networks,” IEEE Trans. Veh. Technol., vol. 70, no. 8, pp. 7764–7777, Aug. 2021.
[6]
D. Liu, H. Wu, C. Huang, J. Ni, and X. Shen, “Blockchain-based credential management for anonymous authentication in SAGVN,” IEEE J. Sel. Areas Commun., vol. 40, no. 10, pp. 3104–3116, Oct. 2022.
[7]
D. Liu, H. Wu, J. Ni, and X. Shen, “Efficient and anonymous authentication with succinct multi-subscription credential in SAGVN,” IEEE Trans. Intell. Transp. Syst., vol. 23, no. 3, pp. 2863–2873, Mar. 2022.
[8]
M. Chase, S. Meiklejohn, and G. Zaverucha, “Algebraic MACs and keyed-verification anonymous credentials,” in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., Nov. 2014, pp. 1205–1216.
[9]
M. Chase, T. Perrin, and G. Zaverucha, “The signal private group system and anonymous credentials supporting efficient verifiable encryption,” in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., Oct. 2020, pp. 1445–1459.
[10]
D. Boneh, X. Boyen, and H. Shacham, “Short group signatures,” in Proc. CRYPTO. Berlin, Germany: Springer, 2004, pp. 41–55.
[11]
D. Pointcheval and O. Sanders, “Short randomizable signatures,” in Proc. CT-RSA. Berlin, Germany: Springer, 2016, pp. 111–126.
[12]
G. Fuchsbauer, C. Hanser, and D. Slamanig, “Structure-preserving signatures on equivalence classes and constant-size anonymous credentials,” J. Cryptol., vol. 32, no. 2, pp. 498–546, 2019.
[13]
S. Cakaj, “The parameters comparison of the `Starlink' LEO satellites constellation for different orbital shells,” Frontiers Commun. Netw., vol. 2, May 2021, Art. no.
[14]
(2022). KA-SAT Network Cyber Attack Overview. [Online]. Available: https://news.viasat.com/blog/corporate/ka-sat-network-cyber-attack-overview
[15]
H. Cruickshank, “A security system for satellite networks,” in Proc. 5th Int. Conf. Satell. Syst. Mobile Commun. Navigat., 1996, pp. 187–190.
[16]
M.-S. Hwang, C.-C. Yang, and C.-Y. Shiu, “An authentication scheme for mobile satellite communication systems,” ACM SIGOPS Oper. Syst. Rev., vol. 37, no. 4, pp. 42–47, Oct. 2003.
[17]
Y.-F. Chang and C.-C. Chang, “An efficient authentication protocol for mobile satellite communication systems,” ACM SIGOPS Oper. Syst. Rev., vol. 39, no. 1, pp. 70–84, Jan. 2005.
[18]
M. Qi, J. Chen, and Y. Chen, “A secure authentication with key agreement scheme using ECC for satellite communication systems,” Int. J. Satell. Commun. Netw., vol. 37, no. 3, pp. 234–244, May 2019.
[19]
I. Altaf, M. A. Saleem, K. Mahmood, S. Kumari, P. Chaudhary, and C.-M. Chen, “A lightweight key agreement and authentication scheme for satellite-communication systems,” IEEE Access, vol. 8, pp. 46278–46287, 2020.
[20]
C. T. Poomagal and G. A. Sathish Kumar, “ECC based lightweight secure message conveyance protocol for satellite communication in Internet of Vehicles (IoV),” Wireless Pers. Commun., vol. 113, no. 2, pp. 1359–1377, Jul. 2020.
[21]
D. Dharminder, P. K. Dadsena, P. Gupta, and S. Sankaran, “A post quantum secure construction of an authentication protocol for satellite communication,” Int. J. Satell. Commun. Netw., vol. 41, no. 1, pp. 14–28, Jan. 2023.
[22]
J. Lei, Z. Han, M. Á. Vazquez-Castro, and A. Hjorungnes, “Secure satellite communication systems design with individual secrecy rate constraints,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 661–671, Sep. 2011.
[23]
M. Lin, Z. Lin, W.-P. Zhu, and J.-B. Wang, “Joint beamforming for secure communication in cognitive satellite terrestrial networks,” IEEE J. Sel. Areas Commun., vol. 36, no. 5, pp. 1017–1029, May 2018.
[24]
Z. Lin, M. Lin, J. Ouyang, W.-P. Zhu, A. D. Panagopoulos, and M.-S. Alouini, “Robust secure beamforming for multibeam satellite communication systems,” IEEE Trans. Veh. Technol., vol. 68, no. 6, pp. 6202–6206, Jun. 2019.
[25]
G. Cui, Q. Zhu, L. Xu, and W. Wang, “Secure beamforming and jamming for multibeam satellite systems with correlated wiretap channels,” IEEE Trans. Veh. Technol., vol. 69, no. 10, pp. 12348–12353, Oct. 2020.
[26]
C. Guo, C. Gong, H. Xu, L. Zhang, and Z. Han, “A dynamic handover software-defined transmission control scheme in space-air-ground integrated networks,” IEEE Trans. Wireless Commun., vol. 21, no. 8, pp. 6110–6124, Aug. 2022.
[27]
Y. Fan, G. Wu, K.-C. Li, and A. Castiglione, “Robust end hopping for secure satellite communication in moving target defense,” IEEE Internet Things J., vol. 9, no. 18, pp. 16908–16916, Sep. 2022.
[28]
I. Teranishi, J. Furukawa, and K. Sako, “K-times anonymous authentication,” in Proc. CRYPTO. Berlin, Germany: Springer, 2004, pp. 308–322.
[29]
L. Nguyen and R. Safavi-Naini, “Dynamic k-times anonymous authentication,” in Proc. ACNS. Berlin, Germany: Springer, 2005, pp. 318–333.
[30]
U. Chaterjee, D. Mukhopadhyay, and R. S. Chakraborty, “3PAA: A private PUF protocol for anonymous authentication,” IEEE Trans. Inf. Forensics Security, vol. 16, pp. 756–769, 2021.
[31]
J. Huang, W. Susilo, F. Guo, G. Wu, Z. Zhao, and Q. Huang, “An anonymous authentication system for pay-as-you-go cloud computing,” IEEE Trans. Dependable Secure Comput., vol. 19, no. 2, pp. 1280–1291, Mar./Apr. 2020.
[32]
J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich, “How to win the clonewars: Efficient periodic n-times anonymous authentication,” in Proc. ACM Conf. Comput. Commun. Secur., Oct. 2006, pp. 201–210.
[33]
B. Lian, G. Chen, M. Ma, and J. Li, “Periodic K-times anonymous authentication with efficient revocation of Violator's credential,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 3, pp. 543–557, Mar. 2015.
[34]
M. Chase and A. Lysyanskaya, “On signatures of knowledge,” in Proc. CRYPTO. Berlin, Germany: Springer, 2006, pp. 78–96.
[35]
Miracl: Multiprecision Integer and Rational Arithmetic C/C++ Library. Accessed: Jun. 1, 2021. [Online]. Available: https://github.com/miracl/MIRACL
[36]
C. P. Schnorr, “Efficient signature generation by smart cards,” J. Cryptol., vol. 4, no. 3, pp. 161–174, Jan. 1991.
[37]
G. Couteau and M. Reichle, “Non-interactive keyed-verification anonymous credentials,” in Proc. PKC. Berlin, Germany: Springer, 2019, pp. 66–96.
[38]
M. Wazid, A. K. Das, and S. Shetty, “An authentication and key management framework for secure and intelligent transportation of Internet of Space Things,” IEEE Trans. Intell. Transp. Syst., vol. 25, no. 6, pp. 5242–5257, Jun. 2024.
[39]
Y. Wang, W. Zhang, X. Wang, M. K. Khan, and P. Fan, “Security enhanced authentication protocol for space-ground integrated railway networks,” IEEE Trans. Intell. Transp. Syst., vol. 25, no. 1, pp. 370–385, Jan. 2024.
[40]
R. Ma, J. Cao, D. Feng, and H. Li, “LAA: Lattice-based access authentication scheme for IoT in space information networks,” IEEE Internet Things J., vol. 7, no. 4, pp. 2791–2805, Apr. 2020.
[41]
J. Guo, Y. Du, X. Wu, and M. Li, “An anti-quantum authentication protocol for space information networks based on ring learning with errors,” J. Commun. Inf. Netw., vol. 6, no. 3, pp. 301–311, Sep. 2021.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security  Volume 19, Issue
2024
9612 pages

Publisher

IEEE Press

Publication History

Published: 04 June 2024

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Nov 2024

Other Metrics

Citations

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media