Threat analysis for space information network based on network security attributes: a review

X Wu, Y Du, T Fan, J Guo, J Ren, R Wu… - Complex & Intelligent …, 2023 - Springer
Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to
the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much …

Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey

S Szymoniak - ACM Computing Surveys, 2024 - dl.acm.org
We use sensor technologies in many areas of everyday life. We use sensors to check and
study various phenomena and to improve our lives. Hence, the sensors are used in …

ECC-based three-factor authentication and key agreement scheme for wireless sensor networks

W Huang - Scientific Reports, 2024 - nature.com
In wireless sensor networks (WSNs), protocols with authentication and key agreement
functions can enhance the security of the interaction between users and sensor nodes …

A novel and quantum-resistant handover authentication protocol in IoT environment

S Zhang, X Du, X Liu - Wireless Networks, 2023 - Springer
Handover authentication and key agreement protocol is extremely essential to ensure the
security of the Internet of Things (IoT), and it enables mobile devices to access roaming …

The Analysis of Financial Network Transaction Risk Control based on Blockchain and Edge Computing Technology

Z Li, X Liang, Q Wen, E Wan - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This article explores security vulnerabilities within financial network transactions, specifically
addressing the challenges associated with utilizing blockchain technology (BCT) on mobile …

Access authentication via blockchain in space information network

M Arshad, L Jianwei, M Khalid, W Khalid, Y Cao… - Plos one, 2024 - journals.plos.org
Space Information Network (SIN) has significant benefits of providing communication
anywhere at any time. This feature offers an innovative way for conventional wireless …

AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks

J Guo, L Chang, Y Song, S Yao, Z Zheng, Y Hao… - Computer Standards & …, 2025 - Elsevier
At present, the rapid development of satellite capabilities has prompted the proposal of
satellite–terrestrial integrated networks (STIN), which solves the problem of limited signal …

CD-BASA: An Efficient Cross-Domain Batch Authentication Scheme Based on Blockchain With Accumulator for VANETs

Q Zhong, X Zhao, Y Xia, X Liu - IEEE Transactions on Intelligent …, 2024 - ieeexplore.ieee.org
Authentication plays an important role in verifying the integrity of messages and the identity
of message senders in vehicular ad-hoc networks (VANET) applications. A significant …

SRAKN: Secure roaming authentication and key negotiation protocol for space information network

J Guo, Y Du, Z Sun, R Wu, X Wu, L Zhang… - Computer …, 2023 - Elsevier
Abstract Nowadays, the Space Information Network (SIN) with global signal coverage, large
capacity, bandwidth-on-demand flexibility, and multiple services has attracted more and …

A Survey on Authentication in Satellite Internet

J Wang, Y Zhang, S Zhao, J He, Y Shen… - Journal of Networking …, 2022 - iecscience.org
Satellite Internet is a promising technology that provides global connectivity and has
attracted widespread attention from both industry and academia. However, the open nature …