Security Authentication Scheme for Low Earth Orbit Satellites Based on Spatial Channel Characteristics | IEEE Conference Publication | IEEE Xplore

Security Authentication Scheme for Low Earth Orbit Satellites Based on Spatial Channel Characteristics


Abstract:

Security authentication can effectively solve the problem of access to Low Earth Orbit (LEO) satellites. However, the existing solutions still harbor some problems in the...Show More

Abstract:

Security authentication can effectively solve the problem of access to Low Earth Orbit (LEO) satellites. However, the existing solutions still harbor some problems in the computational complexity of satellite authentication, flexible networking, resistance to brute force attacks and other aspects. So, a security authentication scheme for LEO satellites that integrates spatial channel characteristics is designed within the software defined network architecture. In this scheme, the spatial channel characteristics are introduced to the subsequent lightweight encryption algorithm to achieve effective defense against brute force attacks. According to security analysis and simulation results, the scheme can effectively reduce the computational overhead while protecting against replay attacks, brute force attacks, DOS attacks, and other known attacks.
Date of Conference: 09-12 December 2022
Date Added to IEEE Xplore: 20 March 2023
ISBN Information:
Conference Location: Chengdu, China
References is not available for this document.

I. Introduction

Low Earth Orbit (LEO) satellite communication has attracted widespread attention because it provides facilities to make communications as broad as possible. However, there is a significant time delay in communication because of the long distances between satellites. Moreover, the frequent changes in satellite topology make spatial network management extremely difficult. Traditional technologies are not well adapted to the difficulties of the spatial network [1]. So, several schemes have been introduced to LEO satellite communication to solve these problems, in which the Software Defined Network (SDN) spatial network has received broad concern. It enables flexible resources allocation of the network by separating the control plane of network devices from the data plane [2]. In order to provide secure network services, it is important to deploy a secure authentication scheme for SDN spatial networks.

Select All
1.
C E Fossa, R A Raines, G H Gunsch et al., "An overview of the IRIDIUM (R) low Earth orbit (LEO) satellite system[C]", Proceedings of the IEEE 1998 National Aerospace and Electronics Conference. NAECON 1998. Celebrating 50 Years (Cat. No. 98CH36185), pp. 152-159, 1998.
2.
Guanglei Li, Huachun Zhou, Bohao Feng, Guanwen Li and Qi Xu, "Horizontal-Based Orchestration for Multi-Domain SFC in SDN/NFV- Enabled Satellite/Terrestrial Networks[J]", China Communications, vol. 15, no. 05, pp. 77-91, 2018.
3.
Y Liu, A Zhang, S Li et al., "A lightweight authentication scheme based on self-updating strategy for space information network[J]", International Journal of Satellite Communications and Networking, vol. 35, no. 3, pp. 31-248, 2017.
4.
M Qi, J Chen and Y. Chen, "A security authentication with key agreement scheme using ECC for satellite communication systems[J]", International journal of satellite communications and networking, vol. 37, no. 3, pp. 234-244, 2019.
5.
ZHU Hui, Wu Heng, ZHAO Haiqiang, ZHAO Yuqing and LI Hui, "Effncient authentication scheme for double-layer satellite network[J]", Journal on Communication, vol. 40, no. 03, pp. 1-9, 2019.
6.
LI Zhao-bin, CU I Zhao, WEI Zhan-zhen, ZHAO Hong and GUO Chao, "Wireless Network Authentication Method Based on Physical Layer Channel Characteristics[J]", Computer Science, vol. 47, no. 12, pp. 267-272, 2020.
7.
Zhang Qixing and Fu Jingqi, "Physical layer security key generation method based on channel feature extraction[J]", Journal of Electronic Measurement and Instrumentation, vol. 33, no. 01, pp. 16-22, 2019.
8.
X Wang, P Hao and L. Hanzo, "Physical-layer authentication for wireless security enhancement: current challenges and future developments [J]", IEEE Communications Magazine, vol. 54, no. 6, pp. 152-158, 2016.
9.
N Xie, Z Li and H. Tan, "A survey of physical-layer authentication in wireless communications[J]", IEEE Communications Surveys & Tutorials, vol. 23, no. 1, pp. 282-310, 2020.
10.
G Oligeri, S Raponi, S Sciancalepore et al., "Past-ai: Physical-layer authentication of satellite transmitters via deep learning[J]", arXiv preprint, 2020.
11.
B Li, Z Fei, C Zhou et al., "Physical-layer security in space information networks: A survey[J]", IEEE Internet of Things Journal, vol. 7, no. 1, pp. 33-52, 2019.
12.
I Altaf, M A Saleem, K Mahmood et al., "A lightweight key agreement and authentication scheme for satellite-communication systems[J]", IEEE Access, vol. 8, pp. 46278-46287, 2020.
13.
Q Yang, K Xue, J Xu et al., "AnFRA: Anonymous and Fast Roaming Authentication for Space Information Network[J]", Information Forensics & Security IEEE Transactions on, vol. 14, no. 2, pp. 486-497, 2019.
14.
RUI Li and LIU Jun, "Study of Node Security authentication Mechanism Based on Clustering Spatial Information Network[J]", Computer Simulation, vol. 38, no. 05, pp. 37-41, 2021.
15.
Jan Vossaert et al., "Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices[J]", Security and Communication Networks, vol. 9, no. 2, pp. 106-117, 2016.

Contact IEEE to Subscribe

References

References is not available for this document.