30
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      An efficient and provably secure key agreement scheme for satellite communication systems

      research-article
      * ,
      PLoS ONE
      Public Library of Science

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Satellite communication has played an important part in many different industries because of its advantages of wide coverage, strong disaster tolerance and high flexibility. The security of satellite communication systems has always been the concern of many scholars. Without authentication, user should not obtain his/her required services. Beyond that, the anonymity also needs to be protected during communications. In this study, we design an efficient and provably secure key agreement scheme for satellite communication systems. In each session, we replace user’s true identity by a temporary identity, which will be updated for each session, to guarantee the anonymity. Because the only use of lightweight algorithms, our proposed scheme has high performance. Furthermore, the security of the proposed scheme is proved in the real-or-random model and the performance analysis shows that the proposed scheme is more efficient than some other schemes for satellite communication systems.

          Related collections

          Most cited references26

          • Record: found
          • Abstract: not found
          • Article: not found

          A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Privacy Protection for E-Health Systems by Means of Dynamic Authentication and Three-Factor Key Agreement

                Bookmark

                Author and article information

                Contributors
                Role: ConceptualizationRole: Data curationRole: Formal analysisRole: Funding acquisitionRole: InvestigationRole: MethodologyRole: Project administrationRole: ResourcesRole: SupervisionRole: ValidationRole: VisualizationRole: Writing – original draftRole: Writing – review & editing
                Role: Data curationRole: ResourcesRole: SoftwareRole: Writing – review & editing
                Role: Editor
                Journal
                PLoS One
                PLoS One
                plos
                plosone
                PLoS ONE
                Public Library of Science (San Francisco, CA USA )
                1932-6203
                2021
                26 April 2021
                : 16
                : 4
                : e0250205
                Affiliations
                [001] School of Computer Science, Hubei University of Technology, Wuhan, China
                Xidian University, CHINA
                Author notes

                Competing Interests: The authors have declared that no competing interests exist.

                Author information
                https://orcid.org/0000-0002-4542-2173
                Article
                PONE-D-21-03793
                10.1371/journal.pone.0250205
                8075218
                33901206
                8d7c8c4a-80bc-4f9f-b544-44ce181a2678
                © 2021 Zhang, Zhai

                This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

                History
                : 3 February 2021
                : 1 April 2021
                Page count
                Figures: 5, Tables: 4, Pages: 15
                Funding
                Funded by: the National Natural Science Foundation of China
                Award ID: 61701173
                Award Recipient :
                Funded by: the Ph.D. research startup foundation of Hubei University of Technology
                Award ID: BSQD2015028
                Award Recipient :
                This work is supported by the National Natural Science Foundation of China under grant No.61701173 and the Ph.D. research startup foundation of Hubei University of Technology (BSQD2015028). No.
                Categories
                Research Article
                Engineering and Technology
                Telecommunications
                Computer and Information Sciences
                Cryptography
                Physical Sciences
                Mathematics
                Cryptography
                Social Sciences
                Linguistics
                Semantics
                Computer and Information Sciences
                Computer Security
                Physical Sciences
                Mathematics
                Algebra
                Algebraic Geometry
                Computer and Information Sciences
                Network Analysis
                Network Control
                Physical Sciences
                Mathematics
                Algebra
                Polynomials
                Physical Sciences
                Mathematics
                Applied Mathematics
                Algorithms
                Research and Analysis Methods
                Simulation and Modeling
                Algorithms
                Custom metadata
                All relevant data are within the paper and its Supporting information files.

                Uncategorized
                Uncategorized

                Comments

                Comment on this article