Your browser doesn't support javascript.
loading
On-Demand Anonymous Access and Roaming Authentication Protocols for 6G Satellite-Ground Integrated Networks.
Tao, Ya; Du, Haitao; Xu, Jie; Su, Li; Cui, Baojiang.
Afiliação
  • Tao Y; School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China.
  • Du H; China Mobile Research Institute, Beijing 100032, China.
  • Xu J; School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China.
  • Su L; China Mobile Research Institute, Beijing 100032, China.
  • Cui B; School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China.
Sensors (Basel) ; 23(11)2023 May 25.
Article em En | MEDLINE | ID: mdl-37299801
ABSTRACT
Satellite-ground integrated networks (SGIN) are in line with 6th generation wireless network technology (6G) requirements. However, security and privacy issues are challenging with heterogeneous networks. Specifically, although 5G authentication and key agreement (AKA) protects terminal anonymity, privacy preserving authentication protocols are still important in satellite networks. Meanwhile, 6G will have a large number of nodes with low energy consumption. The balance between security and performance needs to be investigated. Furthermore, 6G networks will likely belong to different operators. How to optimize the repeated authentication during roaming between different networks is also a key issue. To address these challenges, on-demand anonymous access and novel roaming authentication protocols are presented in this paper. Ordinary nodes implement unlinkable authentication by adopting a bilinear pairing-based short group signature algorithm. When low-energy nodes achieve fast authentication by utilizing the proposed lightweight batch authentication protocol, which can protect malicious nodes from DoS attacks. An efficient cross-domain roaming authentication protocol, which allows terminals to quickly connect to different operator networks, is designed to reduce the authentication delay. The security of our scheme is verified through formal and informal security analysis. Finally, the performance analysis results show that our scheme is feasible.
Assuntos
Palavras-chave

Texto completo: 1 Coleções: 01-internacional Base de dados: MEDLINE Assunto principal: Segurança Computacional / Privacidade Idioma: En Ano de publicação: 2023 Tipo de documento: Article

Texto completo: 1 Coleções: 01-internacional Base de dados: MEDLINE Assunto principal: Segurança Computacional / Privacidade Idioma: En Ano de publicação: 2023 Tipo de documento: Article