Anonymous and Fast Roaming Authentication Process in Space Information Networks
DOI:
https://doi.org/10.26438/ijcse/v7i2.498502Keywords:
Access validation, secrecy, meandering, and space data organizeAbstract
These days, Space info Network (SIN) has been broadly speaking used, in fact, on account of its favorable circumstances of conveyancing anywhere whenever. This part is prompting another pattern that customary remote purchasers can wander to SIN to induce a superior administration. Be that because it could, the highlights of uncovered connections and better flag dormancy in SIN build it arduous to structure a protected and fast wandering verification plot for this new pattern. Albeit some current investigates are focused around designing secure validation conventions for SIN or giving rambling confirmation conventions to customary remote systems, these plans cannot offer adequate stipulations to the wandering correspondence in SIN and find basic problems, for instance, protection spillage or deplorable verification delay. looking at these problems haven't been all around attended, we have a tendency to structure a mysterious and fast wandering confirmation conspire for SIN. In our arrange, we have a tendency to use the gathering mark to offer the secrecy to wandering purchasers, and expect that the satellites have restricted process limit and influence them to possess the characterised validation capability to keep up a strategic distance from the constant contribution of the house system management focus (HNCC) whereas confirming the rambling purchasers. the results of security and execution examination demonstrate that the projected arrange will offer the specified security highlights, whereas giving a touch validation delay.
References
[1] X. Wang, Y. L. Yin, and H. Yu, “Finding collisions in the full SHA-1,” in Advances in Cryptology CCRYPTO 2005, vol. 3621. Springer, 2005, pp. 17–36.
[2] N. Sklavos and O. Koufopavlou, “On the hardware implementations of the SHA-2 (256, 384, 512) hash functions,” in Proceedings of 2003
International Symposium on Circuits and Systems (ISCAS2003). IEEE, 2003.
[3] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
[4] M. Horemuˇz and J. V. Andersson, “Polynomial interpolation of GPS satellite coordinates,” GPS solutions, vol. 10, no. 1, pp. 67–72, 2006.
[5] D. Boneh and X. Boyen, “Short signatures without random oracles,” in International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 2004, pp. 56–73.
[6] W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644–654, 1976.
[7] J. K. Liu, C.-K. Chu, S. S. Chow, X. Huang, M. H. Au, and J. Zhou, “Time-bound anonymous authentication for roaming networks,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 1, pp. 178–189, 2015.
[8] D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Annual International Cryptology Conference. Springer, 2001, pp. 213–229.
[9] S. D. Galbraith, K. G. Paterson, and N. P. Smart, “Pairings for cryptographers,” Discrete Applied Mathematics, vol. 156, no. 16, pp. 3113–3121, 2008.
[10] “ANSI X9.62: Public key cryptography for the financial services industry: The elliptic curve digital signature algorithm (ECDSA),” 1999.
[11] D. He, J. Bu, S. Chan, C. Chen, and M. Yin, “Privacypreserving universal authentication protocol for wireless communications,” IEEE
Transactions on Wireless Communications, vol. 10, no. 2, pp. 431–436, 2011.
[12] G. Yang, Q. Huang, D. S. Wong, and X. Deng, “Universal authentication protocols for anonymous wireless communications,” IEEE Transactions on Wireless Communications, vol. 9, no. 1, 2010.
[13] G. Barghavi, Maddali M.V.M. Kumar, “A Privacy-Preserving User Authentication Scheme for Wireless Sensor Network Users”, International Journal of Advance Engineering and Research Development, Vol. – 05; Issue - 02; pp. 344-348, DOI: DOI:10.21090/IJAERD.39809, Feb. 2018.
[14] J. Lei, Z. Han, M. A . Vazquez-Castro, and A. Hjorungnes, “Secure satellite communication systems design with individual secrecy rate constraints,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 661–671, 2011.
[15] J. A. Larcom and H. Liu, “Modeling and characterization of GPS spoofing,” in Proceedings of 2013 IEEE International Conference on Technologies for Homeland Security (HST 2013). IEEE, 2013, pp. 729–734.
[16] Maddali M.V.M. Kumar, Dr. AparnaChaparala, "Dynamic Energy Efficient Distance Aware Protocol for the Cluster Head Selection in the Wireless Sensor Networks", Recent Trends in Electronics Information & Communication Technology (RTEICT) 2017 2nd IEEE International Conference on, pp. 147-150, 2017.
[17] H. Cruickshank, “A security system for satellite networks,” in Proceedings of Fifth International Conference on Satellite Systems for Mobile Communications and Navigation. IET, 1996, pp. 187–190.
[18] M.-S. Hwang, C.-C. Yang, and C.-Y. Shiu, “An authentication scheme for mobile satellite communication systems,” ACM SIGOPS Operating Systems Review, vol. 37, no. 4, pp. 42–47, 2003.
[19] C.-L. Chen, K.-W. Cheng, Y.-L. Chen, C. Chang, and C.- C. Lee, “An improvement on the self-verification authentication mechanism for a mobile satellite communication system,” Applied Mathematics & Information Sciences, vol. 8, no. 1L, pp. 97–106, 2014.
[20] W. Zhao, A. Zhang, J. Li, X. Wu, and Y. Liu, “Analysis and design of an authentication protocol for space information network,” in
Proceedings of 2016 Military Communications Conference (MILCOM 2016). IEEE, 2016, pp. 43–48.
[21] J.-L. Tsai and N.-W. Lo, “Provably secure anonymous authentication with batch verification for mobile roaming services,” Ad Hoc Networks, vol. 44, pp. 19–31, 2016.
[22] D. Wang, H. Cheng, D. He, and P. Wang, “On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices,” IEEE Systems Journal, vol. 12, no. 1, pp. 916–925, 2018.
[23] H. J. Jo, J. H. Paik, and D. H. Lee, “Efficient privacypreserving authentication in wireless mobile networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 7, pp. 1469–1481, 2014.
[24] I. Memon, M. R. Mohammed, R. Akhtar, H. Memon, M. H. Memon, and R. A. Shaikh, “Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC),” Wireless personal communications, vol. 79, no. 1, pp. 661–686, 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
