University of Oulu

A. D. Jurcut, J. Chen, A. Kalla, M. Liyanage and J. Murphy, "A Novel Authentication Mechanism for Mobile Satellite Communication Systems," 2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW), Marrakech, Morocco, 2019, pp. 1-7, doi: 10.1109/WCNCW.2019.8902546

A novel authentication mechanism for mobile satellite communication systems

Saved in:
Author: Jurcut, Anca Delia1; Chen, Jinyong1; Kalla, Anshuman2;
Organizations: 1School of Computer Science, University College Dublin, Ireland
2Manipal University Jaipur, India
3Centre for Wireless Communications, University of Oulu, Finland
Format: article
Version: accepted version
Access: open
Online Access: PDF Full Text (PDF, 0.2 MB)
Persistent link:
Language: English
Published: Institute of Electrical and Electronics Engineers, 2019
Publish Date: 2020-05-06


The authentication protocols existing in the realm of mobile satellite communication networks, usually employ the one-time shared secret technique. Although the technique combats well against replay attacks, however, it is vulnerable to desynchronisation attacks. The later type of attacks, if framed and mounted against the crucial update mechanisms, which occur in mobile satellite communication systems, can lead to permanent Denial of Service (DoS) conditions. In this context, the authentication protocol initially proposed by Lee et al. [1] Has emerged as the defacto protocol and forms the basis for various other authentication protocols developed since then. In this paper our contribution is two-fold. The first part of the paper presents an analysis of the authentication protocol [1], which reveals that the protocol is fundamentally susceptible to two attacks: impersonation attack and desynchronisation attack. To overcome these susceptibilities, in the second part of the paper, a new authentication protocol is proposed which incorporates a resynchronization phase. The paper demonstrates that the proposed solution is robust to impersonation attacks as well as to permanent DoS conditions caused by desynchronisation attacks. Moreover, the proposed solution is expected to find its application to address the desynchronisation issue found in numerous other recently published enhanced authentication protocols.

see all

ISBN: 978-1-72810-922-0
ISBN Print: 978-1-7281-0923-7
Pages: 1 - 7
Article number: 8902546
DOI: 10.1109/WCNCW.2019.8902546
Host publication: 2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW), 15-18 April 2019, Marrakech, Morocco
Conference: IEEE Wireless Communications and Networking Conference Workshop
Type of Publication: A4 Article in conference proceedings
Field of Science: 213 Electronic, automation and communications engineering, electronics
Funding: This work has been performed under European Union RESPONSE 5G (Grant No: 789658) and the Academy of Finland 6Genesis Flagship (Grant 318927) projects. The authors would also like to acknowledge the contribution of the COST Action CA15127 (RECODIS) and CA16226 (SHELD-ON) projects.
Academy of Finland Grant Number: 318927
Detailed Information: 318927 (Academy of Finland Funding decision)
Copyright information: © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.