چكيده به لاتين
Authentication and integration plans are considered as the most important and basic security mechanisms for mobile satellite communication networks since they prevent attackers from accessing these systems. Generally, mobile communication networks consist of satellites, passages, mobile users, and network control center (NCC). Now, if the users want to communicate with each other, they must first be authenticated for each other by the remote server. Therefore, nowadays, so many works have been done in this field, and the developing and upgrading of the authentication protocols are increasingly being implemented.
In this study, cryptographic algorithms were used which have been developed to reduce the complexity of computations in recent years. In addition, a variety of symmetric and asymmetric algorithms along with abstract functions were applied for designing. All of these are due to the attacks to the protocols in the network such as replay attack, Access Dos attack, and Smurf attack and so on which will be discussed in details.
In this study, first, the authentication systems and security features which these systems should have were introduced, then, some important protocols in this field were analyzed. Finally, the proposed protocol was compared with the reference protocol. Further, a symmetric system was used as the basis for designing the protocol and this study tried to have a practical view. Thus, the advantages of this study are low energy consumption, low computational complexity and communication overhead, and the use of less pseudo-random numbers which are difficult for the user to produce.