[1] |
CRUICKSHANK H S , . A security system for satellite networks[C]// Proceedings of Fifth International Conference on Satellite Systems for Mobile Communications and Navigation. Piscataway:IEEE Press, 1996: 187-190.
|
[2] |
HWANG M S , YANG C C , SHIU C Y . An authentication scheme for mobile satellite communication systems[J]. ACM SIGOPS Operating Systems Review, 2003,37(4): 42-47.
|
[3] |
YANG G M , HUANG Q , WONG D S ,et al. Universal authentication protocols for anonymous wireless communications[J]. IEEE Transactions on Wireless Communications, 2010,9(1): 168-174.
|
[4] |
HE D J , CHEN C , CHAN S ,et al. Secure and efficient handover authentication based on bilinear pairing functions[J]. IEEE Transactions on Wireless Communications, 2012,11(1): 48-53.
|
[5] |
YAN J , LU Y , LIU Y L ,et al. Research on Beidou-based inter-domain identity authentication for mobile object[C]// Proceedings of 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA). Piscataway:IEEE Press, 2014: 923-926.
|
[6] |
JIANG S R , ZHU X Y , WANG L M . An efficient anonymous batch authentication scheme based on HMAC for VANETs[J]. IEEE Transactions on Intelligent Transportation Systems, 2016,17(8): 2193-2204.
|
[7] |
BAO Q R , HOU M B , CHOO K K R . A one-pass identitybased authentication and key agreement protocol for wireless roaming[C]// Proceedings of 2016 Sixth International Conference on Information Science and Technology (ICIST). Piscataway:IEEE Press, 2016: 443-447.
|
[8] |
3rd Generation Partnership Project. Technical specification group services and system aspects,General Packet Radio Service(GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (EUTRAN) access (Rel 15):3GPP TS 23.401 v15.3.0[S]. 2018.
|
[9] |
CAO J , MA M D , LI H ,et al. A survey on security aspects for LTE and LTE-A networks[J]. IEEE Communications Surveys &Tutorials, 2014,16(1): 283-302.
|
[10] |
KIM Y , REN W , JO J Y ,et al. SFRIC:a secure fast roaming scheme in wireless LAN using ID-based cryptography[C]// Proceedings of 2007 IEEE International Conference on Communications. Piscataway:IEEE Press, 2007: 1570-1575.
|
[11] |
CHOI J , JUNG S . A handover authentication using credentials based on chameleon hashing[J]. IEEE Communications Letters, 2010,14(1): 54-56.
|
[12] |
QIU Y , MA M D , WANG X L . A proxy signature-based handover authentication scheme for LTE wireless networks[J]. Journal of Network and Computer Applications, 2017,83: 63-71.
|
[13] |
3rd Generation Partnership Project. Technical Specification Group Services and System Aspects; Security architecture and procedures for 5G system (Rel 15):3GPP TS 33.501 v15.3.1[S]. 2018.
|
[14] |
CREMERS C , MAUW S . Operational semantics[M]. Semantics and Verification of Security Protocols. Berlin,Heidelberg: Springer Berlin Heidelberg, 2012.
|
[15] |
侯峻峰 . 安全协议形式化验证方法和安全协议设计研究[D]. 北京:清华大学, 2004.
|
|
HOU J F . Research on formal verification and design of security protocols[D]. Beijing:Tsinghua University, 2004.
|
[16] |
韩旭, 陆思奇, 程庆丰 . 形式化工具Scyther优化与实例分析[J]. 信息安全研究, 2016,2(3): 272-279.
|
|
HAN X , LU S Q , CHENG Q F . The improvement and instance analysis of the formal verification tool scyther[J]. Journal of Information Security Research, 2016,2(3): 272-279.
|
[17] |
ALTAF I , ARSLAN A M , MAHMOOD K ,et al. A novel authentication and key-agreement scheme for satellite communication network[J]. Transactions on Emerging Telecommunications Technologies, 2021,32(7): e3894.
|
[18] |
CHANG C C , CHENG T F , WU H L . An authentication and key agreement protocol for satellite communications[J]. International Journal of Communication Systems, 2014,27(10): 1994-2006.
|
[19] |
ZHANG Y Y , CHEN J H , HUANG B J . An improved authentication scheme for mobile satellite communication systems[J]. International Journal of Satellite Communications and Networking, 2015,33(2): 135-146.
|
[20] |
QI M P , CHEN J H , CHEN Y T . A secure authentication with key agreement scheme using ECC for satellite communication systems[J]. International Journal of Satellite Communications and Networking, 2019,37(3): 234-244.
|
[21] |
MA R H , CAO J , FENG D G ,et al. LAA:lattice-based access authentication scheme for IoT in space information networks[J]. IEEE Internet of Things Journal, 2020,7(4): 2791-2805.
|