Journal on Communications ›› 2022, Vol. 43 ›› Issue (4): 164-176.doi: 10.11959/j.issn.1000-436x.2022063

• Papers • Previous Articles     Next Articles

Secure and efficient batch authentication scheme based on dynamic revocation mechanism in space information network

Yinghui ZHANG1,2,3, Lingyun HU1,3, Yixin LI1,3, Jianting NING2,4, Dong ZHENG1,3,5   

  1. 1 School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
    2 Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou 350007, China
    3 National Engineering Laboratory for Wireless Security , Xi’an University of Posts and Telecommunications, Xi’an 710121, China
    4 State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    5 Westone Cryptologic Research Center, Beijing 100070, China
  • Revised:2022-01-19 Online:2022-04-25 Published:2022-04-01
  • Supported by:
    The National Natural Science Foundation of China(62072369);The National Natural Science Foundation of China(62072371);The National Natural Science Foundation of China(61972094);The Innovation Capability Support Program of Shaanxi Province(2020KJXX-052);The Shaanxi Special Support Program Youth Top-notch Talent Program;The Key Research and Development Program of Shaanxi Province(2021ZDLGY06-02);The Key Research and Development Program of Shaanxi Province(2020ZDLGY08-04)

Abstract:

A secure and efficient batch authentication scheme based on dynamic revocation mechanism was proposed for the problem of cross-domain authentication of a large number of mobile users in space information networks.Early key negotiation was achieved by predicting the satellite trajectory and updating the session key in real time.Algorithms were designed for a single as well as a large number of mobile terminals to perform signing and verification, which effectively reduce the computational burden of satellites.Cuckoo filters were adopted by the new scheme to achieve dynamic revocation and malicious access control of mobile terminals.Finally, under the Diffie-Hellman assumption, the proposed scheme was proved to be resistant to replay and man-in-the-middle attacks based on a random oracle model and automated validation of internet security protocols and applications.Security goals such as traceability and revocability were achieved by the scheme, thus improving the efficiency of transmission and computation by more than 80% and 20%, respectively, compared with the existing optimal scheme.

Key words: space information network, key agreement, dynamic revocation, batch authentication, AVISPA

CLC Number: 

No Suggested Reading articles found!