School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China.
China Mobile Research Institute, Beijing 100032, China.
Sensors (Basel). 2023 May 25;23(11):5075. doi: 10.3390/s23115075.
Satellite-ground integrated networks (SGIN) are in line with 6th generation wireless network technology (6G) requirements. However, security and privacy issues are challenging with heterogeneous networks. Specifically, although 5G authentication and key agreement (AKA) protects terminal anonymity, privacy preserving authentication protocols are still important in satellite networks. Meanwhile, 6G will have a large number of nodes with low energy consumption. The balance between security and performance needs to be investigated. Furthermore, 6G networks will likely belong to different operators. How to optimize the repeated authentication during roaming between different networks is also a key issue. To address these challenges, on-demand anonymous access and novel roaming authentication protocols are presented in this paper. Ordinary nodes implement unlinkable authentication by adopting a bilinear pairing-based short group signature algorithm. When low-energy nodes achieve fast authentication by utilizing the proposed lightweight batch authentication protocol, which can protect malicious nodes from DoS attacks. An efficient cross-domain roaming authentication protocol, which allows terminals to quickly connect to different operator networks, is designed to reduce the authentication delay. The security of our scheme is verified through formal and informal security analysis. Finally, the performance analysis results show that our scheme is feasible.
卫星地面综合网络 (SGIN) 符合第六代无线网络技术 (6G) 的要求。然而,异构网络中的安全和隐私问题具有挑战性。具体来说,尽管 5G 认证和密钥协商 (AKA) 保护终端匿名性,但卫星网络中仍然需要隐私保护认证协议。同时,6G 将拥有大量具有低能耗的节点。需要研究安全性和性能之间的平衡。此外,6G 网络可能属于不同的运营商。如何优化不同网络之间漫游时的重复认证也是一个关键问题。为了解决这些挑战,本文提出了按需匿名访问和新型漫游认证协议。普通节点通过采用基于双线性配对的短群签名算法实现不可链接的认证。当低能节点利用所提出的轻量级批量认证协议实现快速认证时,可以保护恶意节点免受 DoS 攻击。设计了一种高效的跨域漫游认证协议,允许终端快速连接到不同运营商的网络,从而减少认证延迟。通过形式化和非形式化的安全分析验证了我们方案的安全性。最后,性能分析结果表明我们的方案是可行的。