RAKS: robust authentication and key agreement scheme for satellite infrastructure
Akber Ali Khan (),
Vinod Kumar (),
Jangirala Srinivas (),
Saru Kumari () and
Mridul Kumar Gupta ()
Additional contact information
Akber Ali Khan: B.S. Anangpuria Institute of Technology and Management
Vinod Kumar: University of Delhi
Jangirala Srinivas: O. P. Jindal Global University
Saru Kumari: Chaudhary Charan Singh University
Mridul Kumar Gupta: Chaudhary Charan Singh University
Telecommunication Systems: Modelling, Analysis, Design and Management, 2022, vol. 81, issue 1, No 7, 83-98
Abstract:
Abstract One of the network communication systems in our surroundings that has a significant influence on our day-to-day lives is the satellite network. Many authentications and key agreement procedures have been developed for satellite communication systems in order to ensure secure communication. None, however, offer the satellite communication system with the desired security characteristics. Using elliptic curve cryptography and a hash function, this article provides a safe and efficient architecture for satellite network systems. By employing key agreement, users can safely access services offered by the network control centre in the proposed protocol. The suggested framework is resistant to a wide range of security threats and includes a variety of security features and capabilities. Users can easily update their passwords using the proposed protocol. The random oracle model is used to show the suggested protocol security. We provide security verification of the proposed protocol by using AVISPA software tool against man in the middle attack and replay attack. Further, we demonstrates the informal security of the proposed protocol and shows that proposed protocol secure against various security attacks and maintain various cryptographic security properties. We further show that the proposed protocol has lower computation and transmission overhead than competing methods. As a consequence, the proposed satellite network protocol is both efficient and secure.
Keywords: Authentication; Elliptic curve cryptography; Satellite communications; Security and privacy; Random oracle model (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations: View citations in EconPapers (3)
Downloads: (external link)
http://link.springer.com/10.1007/s11235-022-00923-0 Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:81:y:2022:i:1:d:10.1007_s11235-022-00923-0
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235
DOI: 10.1007/s11235-022-00923-0
Access Statistics for this article
Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan
More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().