2021
DOI: 10.1002/sat.1435
|View full text |Cite
|
Sign up to set email alerts
|

CCAKESC: Chaotic map‐based construction of a new authenticated key exchange protocol for satellite communication

Abstract: Summary Recently, many authentication schemes were proposed by researchers in the satellite communication environment. Unfortunately, several types of security flaws occur in relative works (Qi et al., 2019; Xu, 2019; Liu et al., 2017; Altaf et al., 2020), such as off‐line guessing attacks, smart card stolen attacks and replay attacks. In this paper, we proposed a secure authentication technique based on chaotic maps to solve these drawbacks. To establish the security of the proposed scheme, we employ formal p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(15 citation statements)
references
References 26 publications
(96 reference statements)
0
15
0
Order By: Relevance
“…Recently, Uddeshaya et al 15 has proposed a chaotic map based authenticated key agreement protocol for vehicular communication. They have claimed that their protocol 15 is secure against existing attacks, and it is more efficient as compared to other relevant schemes for satellite communication. But, we have analyzed their scheme has some flaws in the design.…”
Section: Contributionmentioning
confidence: 99%
See 4 more Smart Citations
“…Recently, Uddeshaya et al 15 has proposed a chaotic map based authenticated key agreement protocol for vehicular communication. They have claimed that their protocol 15 is secure against existing attacks, and it is more efficient as compared to other relevant schemes for satellite communication. But, we have analyzed their scheme has some flaws in the design.…”
Section: Contributionmentioning
confidence: 99%
“…But, we have analyzed their scheme has some flaws in the design. Moreover, their scheme 15 is traceable and suffers from insider attack. The protocol 15 stores more number of values on the server side that creates server's overhead.…”
Section: Contributionmentioning
confidence: 99%
See 3 more Smart Citations