2019
DOI: 10.1177/1550147719860390
|View full text |Cite
|
Sign up to set email alerts
|

Toward efficient authentication for space-air-ground integrated Internet of things

Abstract: Space-air-ground integrated Internet of things can improve the scope of Internet of things applications significantly by offering truly global coverage all over the world. While space-air-ground integrated Internet of things is promising to be very useful in many aspects, its deployment and application should overcome severe security threats, for example, interceptions, identity forgery, data tampering, and so on. Authentication is an essential step to protect the Internet of things security, and mutual authen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2

Relationship

3
6

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…They analyzed the security architecture of 6G and considered the new open authentication protocols (e.g., satellite, sea area) for non-3GPP networks, as one of the priorities for 6G network access security. Zhao et al [16] made use of the broadcasting function of satellites to propose an efficient and lightweight access authentication scheme, to prevent the burden of "message storms" on satellite authentication. Cui et al [17] proposed an authentication scheme for heterogeneous B5G networks (including satellite networks) and proposed a user detection scheme based on trust evaluation.…”
Section: Related Workmentioning
confidence: 99%
“…They analyzed the security architecture of 6G and considered the new open authentication protocols (e.g., satellite, sea area) for non-3GPP networks, as one of the priorities for 6G network access security. Zhao et al [16] made use of the broadcasting function of satellites to propose an efficient and lightweight access authentication scheme, to prevent the burden of "message storms" on satellite authentication. Cui et al [17] proposed an authentication scheme for heterogeneous B5G networks (including satellite networks) and proposed a user detection scheme based on trust evaluation.…”
Section: Related Workmentioning
confidence: 99%
“…First, since CSP just owns parts of query data, it cannot make the decision tree evaluation all by himself. In addition, in the two-cloud model, the SUs usually can stay offline during the evaluation process while the single server model usually cannot [5,6,[28][29][30][31].…”
Section: Service Usersmentioning
confidence: 99%
“…There are a lot of security and privacy issues in the IoT [5][6][7][8]. The data security and privacy issues during the evaluation of the decision tree are mainly considered in our work.…”
Section: Introductionmentioning
confidence: 99%
“…A LTHOUGH the Internet of Things (IoT) seems more than promising to embrace the industrial sectors, such as oil and gas industry, environmental monitoring and food and agriculture systems, it can be easily recognized that fundamental performance limitations related to availability, resilience and cost of terrestrial connectivity, where satellite network plays a complementary role in supporting the development of the IoT applications and in realizing the full potential of the interconnected devices [1,2]. For some IoT applications, the smart the LEO satellite constellation network and IoT applications, the communication between the ground and the satellites is vulnerable to non-authorized or malicious attacks due to its openness [7]. To achieve the secure communication in LEO satellite constellation assisted IoT ecosystem, several features inherited from the LEO satellite constellation network have to be taken into consideration, The dynamic topology requires the mechanism of the secure communication to be efficient so that the users in the covered area can be served during in passing by period; Frequent link switching happens between beam-to-beam and between satellite-to-satellite, the verification process should be lightweight that can be easily performed on the satellite, and possible verification optimization should be considered as well; The transmission delay for the uplink/downlink is shorter compared to the other satellite communication system like Geosynchronous Equatorial Orbit (GEO) system, however, it is still unavoidable consumption of time which limit the communication efficiency; Limited computing capability and storage space burdens the challenges in designing the secure communication algorithms where those heavy cryptography algorithms are no longer applicable.…”
Section: Introductionmentioning
confidence: 99%