JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Timestamp based Key Exchange Protocol for Satellite Access Network
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Timestamp based Key Exchange Protocol for Satellite Access Network
Song, In-A; Lee, Young-seok;
  PDF(new window)
 Abstract
The key exchange protocols are very important to provide the secure communication in broadband satellite access network. However key exchange protocol of ETSI(European Telecommunications Standards Institute) is vulnerable to man-in-the-middle-attack by using Diffie-Hellman algorithm. And the key exchange protocol using certification is not useful in satellite environment. We propose the key exchange protocol using Timestamp which have the resistant to man-in-the-middle-attack. Proposed protocol is able to prevent the man-in-the-middle-attack by calculated time value. Also showing experiment results, we prove that proposed protocol improve memory usage, communication amount and calculation amount than other protocols.
 Keywords
Key Exchange;Diffie-Hellman;Timestamp;Man-in-the-Middle Attack;Protocol;
 Language
Korean
 Cited by
 References
1.
ETSI, EN 301 790 V1.5.1(2009), Retrieved July., 25, 2015, from http://www.etsi.org

2.
H. R. Oh and H. Y. Youm, "Key exchange protocols for domestic broadband satellite access network," Korea Institute of Information Security and Cryptology(KIISC), vol. 14, no. 3, pp. 13-25, June. 2004.

3.
M. K. Park, E. S. Cho and T. K. Kwon, "Multi server password authenticated key exchange using attribute-based encryption," Journal of Korean Institute of Communication Sciences(KICS), vol. 40, no. 8, pp. 1597-1605, Aug. 2015. crossref(new window)

4.
B. H. Lee, S. B. Lee, J. Y. Moon and J. H. Lee, "Lightweight DTLS message authentication based on a hash tree," Journal of Korean Institute of Communication Sciences(KICS), vol. 40. no. 10, pp. 1969-1975, Oct. 2015. crossref(new window)

5.
J. C. Choi, J. I. Kang, D. H. Nyang and K. H. Lee, "Operation ${\mu}TESLA$ based on variable key-slot in multi-hop unattended wsn," Journal of Korean Institute of Communication Sciences(KICS), vol. 39, no. 3, pp. 223-233, March. 2014.

6.
Zhong Yantao and Ma Jianfeng, "A highly secure identity-based authenticated key-exchange protocol for satellite communication," Journal of communications and networks, vol. 12, no. 6, pp. 592-599, Dec. 2010. crossref(new window)