2020
DOI: 10.1109/jiot.2019.2962553
|View full text |Cite
|
Sign up to set email alerts
|

LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…The channel between the ground station and the satellite is prone to eavesdropping and other attack types, e.g., man-inthe-middle, impersonation, and replay attacks. When several Internet of Things (IoT) devices try to connect to the satellite, access authentication imposes a large signaling overhead [22]. Accordingly, access authentication mechanisms with low latency are essential.…”
Section: Quantum Security For Satellite Networkmentioning
confidence: 99%
“…The channel between the ground station and the satellite is prone to eavesdropping and other attack types, e.g., man-inthe-middle, impersonation, and replay attacks. When several Internet of Things (IoT) devices try to connect to the satellite, access authentication imposes a large signaling overhead [22]. Accordingly, access authentication mechanisms with low latency are essential.…”
Section: Quantum Security For Satellite Networkmentioning
confidence: 99%
“…This problem can make the user's anonymity lost. Furthermore, unlinkability requires that members in the network cannot distinguish the source of encryption messages [53]. If the system's unlinkability is lost, the attacker can continuously collect the information from the target user, then infer the content of the message according to the context relevance.…”
Section: Signal Captured By Eavesdroppersmentioning
confidence: 99%
“…However, the schemes in [36] and [37] fail to achieve some critical security properties, such as unlinkability and perfect forward/backward secrecy (PFS/PBS). Yi et al [38] and Ma et al [39] respectively proposed two AKA schemes using lattice-based cryptography to overcome the insufficiencies of existing access authentication methods in SATCOM system, such as high computational complexity, large authentication delay and no resistance to quantum attack. In 2020, Yao et al [40] proposed an identity-based mutual authentication scheme (IMAS) with the adoption of multicast authentication, which greatly reduced the authentication computation delay and signalling overhead.…”
Section: B Authentication and Key Agreement (Aka)mentioning
confidence: 99%
“…In 2020, Yao et al [40] proposed an identity-based mutual authentication scheme (IMAS) with the adoption of multicast authentication, which greatly reduced the authentication computation delay and signalling overhead. However, these identity-based AKA schemes [36], [37], [38], [39], [40] face the potential threats from Private Key Generator (PKG) and private key escrow problems. Therefore, based on this fact, Guan et al [41] proposed a blockchain-assisted secure and lightweight authentication (BSLA) scheme which introduces the blockchain to solve the key escrow problem caused by the centralized PKG in the registration phase of the traditional identity-based AKA mechanisms.…”
Section: B Authentication and Key Agreement (Aka)mentioning
confidence: 99%