AI-Oriented Two-Phase Multi-Factor Authentication in SAGINs: Prospects and Challenges

03/31/2023
by   Bin Yang, et al.
0

Space-air-ground integrated networks (SAGINs), which have emerged as an expansion of terrestrial networks, provide flexible access, ubiquitous coverage, high-capacity backhaul, and emergency/disaster recovery for mobile users (MUs). While the massive benefits brought by SAGIN may improve the quality of service, unauthorized access to SAGIN entities is potentially dangerous. At present, conventional crypto-based authentication is facing challenges, such as the inability to provide continuous and transparent protection for MUs. In this article, we propose an AI-oriented two-phase multi-factor authentication scheme (ATMAS) by introducing intelligence to authentication. The satellite and network control center collaborate on continuous authentication, while unique spatial-temporal features, including service features and geographic features, are utilized to enhance the system security. Our further security analysis and performance evaluations show that ATMAS has proper security characteristics which can meet various security requirements. Moreover, we shed light on lightweight and efficient authentication mechanism design through a proper combination of spatial-temporal factors.

READ FULL TEXT

page 1

page 4

page 5

page 7

page 9

research
04/01/2020

An Efficient Anonymous Authentication Scheme Using Registration List in VANETs

Nowadays, Vehicular Ad hoc Networks (VANETs) are popularly known as they...
research
02/10/2019

Authentication Scheme Based on Hashchain for Space-Air-Ground Integrated Network

With the development of artificial intelligence and self-driving, vehicu...
research
08/01/2022

PSAA: Provable Secure and Anti-Quantum Authentication Based on Randomized RLWE for Space Information Network

Currently, due to the high scalability and global coverage of space info...
research
05/29/2019

Putting Things in Context: Securing Industrial Authentication with Context Information

The development in the area of wireless communication, mobile and embedd...
research
07/28/2019

Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement?

Security provisioning has become the most important design consideration...
research
12/16/2021

Federated 3GPP Mobile Edge Computing Systems: A Transparent Proxy for Third Party Authentication with Application Mobility Support

Multi-Access or Mobile Edge Computing (MEC) is being deployed by 4G/5G o...
research
12/07/2020

Impact of Network and Host Characteristics on the Keystroke Pattern in Remote Desktop Sessions

Authentication based on keystroke dynamics is a convenient biometric app...

Please sign up or login with your details

Forgot password? Click here to reset