160 likes | 181 Views
This paper discusses the security aspects of a registration protocol in a mobile satellite communication system and proposes a new authentication and data encryption scheme to remedy replay attacks.
E N D
An Authentication Scheme for Mobil Satellite Communication Systems M. S. Hwang, C. C. Yang, and C. Y. Shiu, ACM SIGOPS Operating Systems Review, Vol. 37, No. 4, pp. 42-47, October 2003 Advisor: Prof. Jen-Chang Liu Graduate Student: Yi-Ching Chen(陳怡靜 92321527) Date: 2004/05/26
Points in this paper • Discussing the security aspects of a registration protocol in a mobile satellite communication system • Proposing a new mobile user authentication and data encryption scheme for mobile satellite communication systems • The scheme can remedy a replay attack An Authentication Scheme for Mobil Satellite Communication Systems
Online • Introduction of Satellite Communication Systems • LEO (Mobile) Satellite Communication System • A New Authentication Scheme for MSCS • Security Analysis and Conclusion An Authentication Scheme for Mobil Satellite Communication Systems
MSCS • Mobile Satellite Communication System (MSCS) • Mobile Communication System • Large broadcasting range • Large communication area • Satellite Communication System • No geographic or environmental limitations • Communicate around the globe • MSCS is the best communications system for out of the way terrain or tall mountain ranges. An Authentication Scheme for Mobil Satellite Communication Systems
GEO & LEO of MSCS • Geostationary Earth Orbit (GEO) • The traditional satellite communication system • The GEO distance is far from the earth, therefore, there is a signal communication delay problem. • GEO is not fit for use in a Personal Communication System (PCS) • Low Earth Orbit (LEO) satellite communication systems • Using 26 LEO satellite to constitute exact global MSCS • LEO satellite orbits closer to the earth than the GEO satellite • LEO satellites are fit for use in PCS An Authentication Scheme for Mobil Satellite Communication Systems
LEO of MSCS • Three main advantages in LEO satellite systems • The signal communication attenuation is small • The signal communication delay time is short • The data communication channels are wide but narrower than GEO • The disadvantages in LEO satellite systems • Being not provided powerful computation An Authentication Scheme for Mobil Satellite Communication Systems
An past protocol in 1996 Two security requirements: 1. An eavesdropper can’t intercept massages during the communication. 2. The service isn’t obtained fraudulently in order to avoid usage charge. • Cruickshank, in 1996, proposed an authentication protocol for satellite networks. • Using a public-key cryptosystem for mutual authentication between the mobile user and satellite network • Using a secret key to encrypt confidential data • This protocol can satisfy two security requirements. • Disadvantage: This protocol need to spend high computation for LEO satellite systems. • Hwang, Yang, Shiu propose an efficient authentication protocol for LEO satellite systems. An Authentication Scheme for Mobil Satellite Communication Systems
LEO (Mobile) Satellite Com. System • The LEO satellite Communication system is comprised of • LEO satellites • A gateway • Mobile users • A Network Control Center (NCC) • The LEO satellite orbit is near the earth • The communication signal delay time is short • The signal weakness is slight • The LEO communication range is smaller • The LEO orbit time is short • The mobile users and satellites have a hand-over problem An Authentication Scheme for Mobil Satellite Communication Systems
LEO (Mobile) Satellite Com. System LEO Satellite LEO Satellite Gateway Mobile User Gateway Mobile User NCC Gateway Gateway An Authentication Scheme for Mobil Satellite Communication Systems
New Scheme • Using a session key to encrypt confidential data • Two phases in new scheme • Mobile user registration • Mobile user authentication • Mobile user registration • Gateway allocates the new mobile user a permanent identity (UID), secret key (Kmd), and a temporary identity (TID) • Kmd : a secret key shared by the mobile user and the NCC • LEOID: identity ID of LEO Mobile user stores a message (UID, TID, Kmd) in private NCC stores these messages (UID, TID, Kmd) and LEOID for each mobile user Mobile user’s ID NCC Gateway An Authentication Scheme for Mobil Satellite Communication Systems
New Scheme • Mobile user authentication • AUTH Request • UID、TID、Kmd、Kmd() MS LEO NCC AUTH Request TID, Kmd(UID, TID) TID, Kmd(UID, TID), LEOID TID, Kmd(TID, T’ID, K’md), LEOID TID, Kmd(TID, T’ID, K’md) An Authentication Scheme for Mobil Satellite Communication Systems
Security Analysis & Conclusion • Security Analysis • The mobile user’ location is protected. • An attacker can’t use the old TID to impersonate the mobile user. • This scheme avoid the replay attack. • LEO can’t decrypt and obtain the transmitted messages. • Conclusion • Proposing a simple authentication scheme for MSCS • By using a symmetric cryptosystem • This scheme reduces the computation and enhances the security An Authentication Scheme for Mobil Satellite Communication Systems