Verification of authentication protocols for mobile satellite communication systems

Abstract In recent times, many protocols have been proposed to provide security for mobile satellite communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Many security protocols for the mobile satellite communication system have been presented. This paper analyzes three of the most famous authentication protocols for mobile satellite communication system from the security viewpoint of data desynchronization attack. Based on strand spaces testing model, data desynchronization attacks on these protocols were tested and analyzed. Furthermore, improvements to overcome the security vulnerabilities of two protocols are mentioned.

[1]  Min-Shiang Hwang,et al.  An authentication scheme for mobile satellite communication systems , 2003, OPSR.

[2]  Chin-Chen Chang,et al.  An efficient authentication protocol for mobile satellite communication systems , 2005, OPSR.

[3]  Eun-Jun Yoon,et al.  An efficient and secure anonymous authentication scheme for mobile satellite communication systems , 2011, EURASIP J. Wirel. Commun. Netw..

[4]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[5]  Cheng-Chi Lee,et al.  A simple and efficient authentication scheme for mobile satellite communication systems , 2012, Int. J. Satell. Commun. Netw..

[6]  Reiner Dojen,et al.  Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications , 2011, Comput. Electr. Eng..

[7]  Wei-Bin Lee,et al.  A self-verification authentication mechanism for mobile satellite communication systems , 2009, Comput. Electr. Eng..

[8]  Joshua D. Guttman State and Progress in Strand Spaces: Proving Fair Exchange , 2010, Journal of Automated Reasoning.

[9]  Reiner Dojen,et al.  A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications , 2011, Int. J. Inf. Secur. Priv..

[10]  James R. Wertz,et al.  Space Mission Analysis and Design , 1992 .

[11]  Haitham Cruickshank,et al.  A security system for satellite networks , 1996 .

[12]  Joshua D. Guttman,et al.  Authentication tests and the structure of bundles , 2002, Theor. Comput. Sci..