An Authentication Scheme for Mobil Satellite Communication Systems Advisor: Prof. Jen-Chang Liu Graduate Student: Yi-Ching Chen( 陳怡靜 92321527) Date: 2004/05/26.

Slides:



Advertisements
Similar presentations
Secure Mobile IP Communication
Advertisements

SCSC 455 Computer Security
DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13
DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13 DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13 Digital Signatures Authentication.
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 :JongHyup LEE 出處.
An Improvement on Privacy and Authentication in GSM Young Jae Choi, Soon Ja Kim Computer Networks Lab. School of Electrical Engineering and Computer Science,
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
多媒體網路安全實驗室 Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Date : Reporter : Hong Ji Wei Authors.
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
A simple remote user authentication scheme 1. M. S. Hwang, C. C. Lee and Y. L. Tang, “A simple remote user authentication.
Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution of public keys –use of public-key.
電子商務與數位生活研討會 1 Further Security Enhancement for Optimal Strong-Password Authentication Protocol Tzung-Her Chen, Gwoboa Horng, Wei-Bin Lee,Kuang-Long Lin.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
1 A secure broadcasting cryptosystem and its application to grid computing Eun-Jun Yoon, Kee-Young Yoo Future Generation Computer Systems (2010),doi: /j.future
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
孫國偉 Efficient Password authenticated key agreement using smart cards Author : Wen-Shenq Juang* Date : in Computers & Security.
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
Key Management and Distribution. YSLInformation Security – Mutual Trust2 Major Issues Involved in Symmetric Key Distribution For symmetric encryption.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/05 報告人:向峻霈.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
1 Three-Party Authenticated Key Agreements and Its Applications- PCSs Roaming Protocol 李添福 (Tian-Fu Lee) 國立成功大學資訊工程博士 Cryptography/ Network security/ Wireless.
Efficient remote mutual authentication and key agreement Improvement of Chien et al. ’ s remote user authentication scheme using smart cards An efficient.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
MSRC: (M)icropayment (S)cheme with Ability to (R)eturn (C)hanges Source: Journal of Information Science and Engineering in review Presenter: Tsuei-Hung.
A Secure Identification and Key Agreement Protocol with User Anonymity (SIKA) Authors: Kumar Mangipudi and Rajendra Katti Source: Computers & Security,
1 Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards 使用在 smart cards 的強韌及高效率密碼驗證金鑰協定 IEEE Transactions on Industrial Electronics,
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks Hyeran Mun, Kyusuk Han, Yan Sun Lee, Chan Yeob Yeun, Hyo.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
ECE509 Cyber Security : Concept, Theory, and Practice Key Management Spring 2014.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
SPEAKER: HONG-JI WEI DATE: Secure Anonymous Authentication Scheme with Roaming for Mobile Networks.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
Secure Messenger Protocol using AES (Rijndael) Sang won, Lee
Robust and Efficient Password- Authenticated Key Agreement Using Smart Cards Authors: Wen-Shenq Juang, Sian-Teng Chen and Horng-Twu Liaw Src: IEEE Transaction.
Key Management Network Systems Security Mort Anvari.
RSA-based password authenticated key exchange protocol Presenter: Jung-wen Lo( 駱榮問 )
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
1 Protecting Your Privacy with a Mobile Agent Device in RFID Environment Authors: Sang-Soo Yeo, Soo-Cheol Kim, Sung Kwon Kim, Gilcheol Park, Seok Soo Kim,
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Fall 2006CS 395: Computer Security1 Key Management.
1 Chapter 3-3 Key Distribution. 2 Key Management public-key encryption helps address key distribution problems have two aspects of this: –distribution.
Key Management and Distribution Anand Seetharam CST 312.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Efficient password authenticated key agreement using smart cards
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications, ahead of.
A Novel Group Key Transfer Protocol
Chair Professor Chin-Chen Chang Feng Chia University
Efficient CRT-Based RSA Cryptosystems
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Privacy Protection for E-Health Systems by
Presentation transcript:

An Authentication Scheme for Mobil Satellite Communication Systems Advisor: Prof. Jen-Chang Liu Graduate Student: Yi-Ching Chen( 陳怡靜 ) Date: 2004/05/26 M. S. Hwang, C. C. Yang, and C. Y. Shiu, ACM SIGOPS Operating Systems Review, Vol. 37, No. 4, pp , October 2003

2An Authentication Scheme for Mobil Satellite Communication Systems Points in this paper Discussing the security aspects of a registration protocol in a mobile satellite communication system Proposing a new mobile user authentication and data encryption scheme for mobile satellite communication systems The scheme can remedy a replay attack

3An Authentication Scheme for Mobil Satellite Communication Systems Online Introduction of Satellite Communication Systems LEO (Mobile) Satellite Communication System A New Authentication Scheme for MSCS Security Analysis and Conclusion

Introduction of Satellite Communication Systems

5An Authentication Scheme for Mobil Satellite Communication Systems MSCS Mobile Satellite Communication System (MSCS) Mobile Communication System –L–Large broadcasting range –L–Large communication area Satellite Communication System –N–No geographic or environmental limitations –C–Communicate around the globe MSCS is the best communications system for out of the way terrain or tall mountain ranges.

6An Authentication Scheme for Mobil Satellite Communication Systems GEO & LEO of MSCS Geostationary Earth Orbit (GEO) –T–The traditional satellite communication system –T–The GEO distance is far from the earth, therefore, there is a signal communication delay problem. –G–GEO is not fit for use in a Personal Communication System (PCS) Low Earth Orbit (LEO) satellite communication systems –U–Using 26 LEO satellite to constitute exact global MSCS –L–LEO satellite orbits closer to the earth than the GEO satellite –L–LEO satellites are fit for use in PCS

7An Authentication Scheme for Mobil Satellite Communication Systems LEO of MSCS Three main advantages in LEO satellite systems –T–The signal communication attenuation is small –T–The signal communication delay time is short –T–The data communication channels are wide but narrower than GEO The disadvantages in LEO satellite systems –B–Being not provided powerful computation

8An Authentication Scheme for Mobil Satellite Communication Systems An past protocol in 1996 Cruickshank, in 1996, proposed an authentication protocol for satellite networks. –U–Using a public-key cryptosystem for mutual authentication between the mobile user and satellite network –U–Using a secret key to encrypt confidential data This protocol can satisfy two security requirements. Disadvantage: This protocol need to spend high computation for LEO satellite systems. Hwang, Yang, Shiu propose an efficient authentication protocol for LEO satellite systems. Two security requirements: 1. An eavesdropper can’t intercept massages during the communication. 2. The service isn’t obtained fraudulently in order to avoid usage charge.

LEO (Mobile) Satellite Communication System

10An Authentication Scheme for Mobil Satellite Communication Systems LEO (Mobile) Satellite Com. System The LEO satellite Communication system is comprised of –LEO satellites –A gateway –Mobile users –A Network Control Center (NCC) The LEO satellite orbit is near the earth –The communication signal delay time is short –The signal weakness is slight –The LEO communication range is smaller –The LEO orbit time is short The mobile users and satellites have a hand-over problem

11An Authentication Scheme for Mobil Satellite Communication Systems LEO (Mobile) Satellite Com. System NCC Gateway Mobile User LEO Satellite

A New Authentication Scheme for MSCS

13An Authentication Scheme for Mobil Satellite Communication Systems New Scheme Using a session key to encrypt confidential data Two phases in new scheme –Mobile user registration –Mobile user authentication Mobile user registration –Gateway allocates the new mobile user a permanent identity (U ID ), secret key (K md ), and a temporary identity (T ID ) –K md : a secret key shared by the mobile user and the NCC –LEO ID : identity ID of LEO Mobile user’s ID NCC stores these messages (U ID, T ID, K md ) and LEO ID for each mobile user Mobile user stores a message (U ID, T ID, K md ) in private NCCGateway

14An Authentication Scheme for Mobil Satellite Communication Systems New Scheme Mobile user authentication –AUTH Request –U ID 、 T ID 、 K md 、 K md (  ) S1 S2 S3 S4 S5 MSLEONCC AUTH Request T ID, K md (U ID, T ID ) T ID, K md (T ID, T ’ I D, K ’ md ) T ID, K md (U ID, T ID ), LEO ID T ID, K md (T ID, T ’ I D, K ’ md ), LEO ID

Security Analysis & Conclusion

16An Authentication Scheme for Mobil Satellite Communication Systems Security Analysis & Conclusion Security Analysis –The mobile user’ location is protected. –An attacker can’t use the old T ID to impersonate the mobile user. –This scheme avoid the replay attack. –LEO can’t decrypt and obtain the transmitted messages. Conclusion –Proposing a simple authentication scheme for MSCS –By using a symmetric cryptosystem –This scheme reduces the computation and enhances the security