QS-Auth: A Quantum-secure mutual authentication protocol based on PUF and Post-Quantum Signature for Heterogeneous Delay-Tolerant Networks

IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS
Mahima Mary Mathews, Panchami V.
{"title":"QS-Auth: A Quantum-secure mutual authentication protocol based on PUF and Post-Quantum Signature for Heterogeneous Delay-Tolerant Networks","authors":"Mahima Mary Mathews,&nbsp;Panchami V.","doi":"10.1016/j.jisa.2024.103787","DOIUrl":null,"url":null,"abstract":"<div><p>Delay tolerant networks supporting heterogeneous communication are a promising network architecture solution that can meet today’s communication requirements involving nodes in space, terrestrial and water networks. These networks with dynamic topology and dynamic set of participating nodes make enablement of secure authentication between nodes in this network architecture a critical requirement. In this paper, we propose a novel Quantum-Secure Authentication (QS-Auth) protocol that enables mutual-authentication in Heterogeneous Delay tolerant network environment, while achieving quantum-resistance using the combination of PUF and Post-Quantum signature. The proposed tree-based region structure enables scalability and distributes the responsibility for trust to individual region heads and eliminates high risk root nodes in other tree-based solutions. The proposed scheme can meet the high secure mutual-authentication requirement in critical networks like defence, disaster regions, satellite communications etc. We demonstrate the correctness of our proposed scheme by conducting thorough informal and formal security analysis. The performance analysis is done by the evaluation of efficiency, computation and communication cost. The results of our analysis proves that the proposed protocol meets the security criteria and is well suited for heterogeneous delay tolerant network environments.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"83 ","pages":"Article 103787"},"PeriodicalIF":3.8000,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212624000905","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Delay tolerant networks supporting heterogeneous communication are a promising network architecture solution that can meet today’s communication requirements involving nodes in space, terrestrial and water networks. These networks with dynamic topology and dynamic set of participating nodes make enablement of secure authentication between nodes in this network architecture a critical requirement. In this paper, we propose a novel Quantum-Secure Authentication (QS-Auth) protocol that enables mutual-authentication in Heterogeneous Delay tolerant network environment, while achieving quantum-resistance using the combination of PUF and Post-Quantum signature. The proposed tree-based region structure enables scalability and distributes the responsibility for trust to individual region heads and eliminates high risk root nodes in other tree-based solutions. The proposed scheme can meet the high secure mutual-authentication requirement in critical networks like defence, disaster regions, satellite communications etc. We demonstrate the correctness of our proposed scheme by conducting thorough informal and formal security analysis. The performance analysis is done by the evaluation of efficiency, computation and communication cost. The results of our analysis proves that the proposed protocol meets the security criteria and is well suited for heterogeneous delay tolerant network environments.

QS-Auth:基于 PUF 和后量子签名的量子安全相互验证协议,适用于异构容错网络
支持异构通信的容错网络是一种前景广阔的网络架构解决方案,可满足当今涉及太空、陆地和水网络节点的通信要求。这些网络具有动态拓扑结构和动态参与节点集,因此在这种网络架构中实现节点之间的安全认证是一项关键要求。在本文中,我们提出了一种新型量子安全认证(QS-Auth)协议,它能在异构容错网络环境中实现相互认证,同时利用 PUF 和后量子签名的组合实现量子抗性。所提出的树形区域结构具有可扩展性,并将信任责任分配给各个区域负责人,消除了其他树形解决方案中的高风险根节点。所提出的方案可以满足国防、灾区、卫星通信等关键网络对高安全性相互认证的要求。我们通过进行全面的非正式和正式安全分析,证明了所提方案的正确性。性能分析是通过评估效率、计算和通信成本来完成的。分析结果证明,我们提出的协议符合安全标准,非常适合异构延迟容限网络环境。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Information Security and Applications
Journal of Information Security and Applications Computer Science-Computer Networks and Communications
CiteScore
10.90
自引率
5.40%
发文量
206
审稿时长
56 days
期刊介绍: Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信