{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T05:05:36Z","timestamp":1772168736643,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T00:00:00Z","timestamp":1657152000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T00:00:00Z","timestamp":1657152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"State Government of Uttar Pradesh India under the \u201cResearch and Development\u201d","award":["47\/2021\/606\/sattar-4-2021-4(56)\/2020"],"award-info":[{"award-number":["47\/2021\/606\/sattar-4-2021-4(56)\/2020"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s11235-022-00923-0","type":"journal-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T21:03:20Z","timestamp":1657227800000},"page":"83-98","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["RAKS: robust authentication and key agreement scheme for satellite infrastructure"],"prefix":"10.1007","volume":"81","author":[{"given":"Akber Ali","family":"Khan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2939-1100","authenticated-orcid":false,"given":"Vinod","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Jangirala","family":"Srinivas","sequence":"additional","affiliation":[]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Mridul Kumar","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,7]]},"reference":[{"key":"#cr-split#-923_CR1.1","unstructured":"Fossa, C. E., Raines, R. A., Gunsch, G. H., & Temple, M. A. (1998). An overview of the iridium"},{"key":"#cr-split#-923_CR1.2","unstructured":"(r) low earth orbit (leo) satellite system. In Proceedings of the IEEE 1998 National Aerospace and Electronics Conference. NAECON 1998. Celebrating 50 Years (Cat. No. 98CH36185), IEEE, pp. 152-159."},{"key":"923_CR2","doi-asserted-by":"publisher","first-page":"128125","DOI":"10.1109\/ACCESS.2019.2934998","volume":"7","author":"SH Alsamhi","year":"2019","unstructured":"Alsamhi, S. H., Ma, O., Ansari, M. S., & Almalki, F. A. (2019). Survey on collaborative smart drones and internet of things for improving smartness of smart cities. Access, 7, 128125\u2013128152.","journal-title":"Access"},{"issue":"1","key":"923_CR3","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MCOM.2017.1700390","volume":"56","author":"C Lin","year":"2018","unstructured":"Lin, C., He, D., Kumar, N., Choo, K.-K.R., Vinel, A., & Huang, X. (2018). Security and privacy for the internet of drones: Challenges and solutions. IEEE Communications Magazine, 56(1), 64\u201369.","journal-title":"IEEE Communications Magazine"},{"key":"923_CR4","doi-asserted-by":"publisher","unstructured":"Cruickshank, H. A security system for satellite networks. IET. https:\/\/doi.org\/10.1049\/cp:19960437.","DOI":"10.1049\/cp:19960437"},{"issue":"1","key":"923_CR5","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.compeleceng.2008.05.003","volume":"35","author":"T-H Chen","year":"2009","unstructured":"Chen, T.-H., Lee, W.-B., & Chen, H.-B. (2009). A self-verification authentication mechanism for mobile satellite communication systems. Computers & Electrical Engineering, 35(1), 41\u201348.","journal-title":"Computers & Electrical Engineering"},{"issue":"1","key":"923_CR6","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1002\/sat.993","volume":"30","author":"C-C Lee","year":"2012","unstructured":"Lee, C.-C., Li, C.-T., & Chang, R.-X. (2012). A simple and efficient authentication scheme for mobile satellite communication systems. International Journal of Satellite Communications and Networking, 30(1), 29\u201338.","journal-title":"International Journal of Satellite Communications and Networking"},{"issue":"10","key":"923_CR7","doi-asserted-by":"publisher","first-page":"1994","DOI":"10.1002\/dac.2448","volume":"27","author":"C-C Chang","year":"2014","unstructured":"Chang, C.-C., Cheng, T.-F., & Wu, H.-L. (2014). An authentication and key agreement protocol for satellite communications. International Journal of Communication Systems, 27(10), 1994\u20132006.","journal-title":"International Journal of Communication Systems"},{"issue":"2","key":"923_CR8","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.compeleceng.2011.01.011","volume":"37","author":"I Lasc","year":"2011","unstructured":"Lasc, I., Dojen, R., & Coffey, T. (2011). Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications. Computers & Electrical Engineering, 37(2), 160\u2013168.","journal-title":"Computers & Electrical Engineering"},{"issue":"5","key":"923_CR9","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1002\/sat.1061","volume":"32","author":"J-L Tsai","year":"2014","unstructured":"Tsai, J.-L., Lo, N.-W., & Wu, T.-C. (2014). Secure anonymous authentication scheme without verification table for mobile satellite communication systems. International Journal of Satellite Communications and Networking, 32(5), 443\u2013452.","journal-title":"International Journal of Satellite Communications and Networking"},{"issue":"2","key":"923_CR10","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1002\/sat.1079","volume":"33","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., Chen, J., & Huang, B. (2015). An improved authentication scheme for mobile satellite communication systems. International Journal of Satellite Communications and Networking, 33(2), 135\u2013146. https:\/\/doi.org\/10.1002\/sat.1079","journal-title":"International Journal of Satellite Communications and Networking"},{"issue":"1","key":"923_CR11","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/sat.1088","volume":"34","author":"H-Y Lin","year":"2016","unstructured":"Lin, H.-Y. (2016). Efficient dynamic authentication for mobile satellite communication systems without verification table. International Journal of Satellite Communications and Networking, 34(1), 3\u201310.","journal-title":"International Journal of Satellite Communications and Networking"},{"issue":"1","key":"923_CR12","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1002\/sat.1309","volume":"38","author":"S Xu","year":"2020","unstructured":"Xu, S., Liu, X., Ma, M., & Chen, J. (2020). An improved mutual authentication protocol based on perfect forward secrecy for satellite communications. International Journal of Satellite Communications and Networking, 38(1), 62\u201373.","journal-title":"International Journal of Satellite Communications and Networking"},{"issue":"3","key":"923_CR13","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1002\/sat.1218","volume":"36","author":"M Qi","year":"2018","unstructured":"Qi, M., & Chen, J. (2018). An enhanced authentication with key agreement scheme for satellite communication systems. International Journal of Satellite Communications and Networking, 36(3), 296\u2013304.","journal-title":"International Journal of Satellite Communications and Networking"},{"issue":"3","key":"923_CR14","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1002\/sat.1279","volume":"37","author":"M Qi","year":"2019","unstructured":"Qi, M., Chen, J., & Chen, Y. (2019). A secure authentication with key agreement scheme using ecc for satellite communication systems. International Journal of Satellite Communications and Networking, 37(3), 234\u2013244.","journal-title":"International Journal of Satellite Communications and Networking"},{"issue":"3","key":"923_CR15","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1002\/sat.1179","volume":"35","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Zhang, A., Li, S., Tang, J., & Li, J. (2017). A lightweight authentication scheme based on self-updating strategy for space information network. International Journal of Satellite Communications and Networking, 35(3), 231\u2013248.","journal-title":"International Journal of Satellite Communications and Networking"},{"key":"923_CR16","doi-asserted-by":"crossref","first-page":"e3894","DOI":"10.1002\/ett.3894","volume":"32","author":"I Altaf","year":"2020","unstructured":"Altaf, I., Arslan Akram, M., Mahmood, K., Kumari, S., Xiong, H., & Khurram Khan, M. (2020). A novel authentication and key-agreement scheme for satellite communication network. Transactions on Emerging Telecommunications Technologies, 32, e3894.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"923_CR17","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.comcom.2019.08.018","volume":"147","author":"A Ostad-Sharif","year":"2019","unstructured":"Ostad-Sharif, A., Abbasinezhad-Mood, D., & Nikooghadam, M. (2019). Efficient utilization of elliptic curve cryptography in design of a three-factor authentication protocol for satellite communications. Computer Communications, 147, 85\u201397.","journal-title":"Computer Communications"},{"key":"923_CR18","doi-asserted-by":"crossref","unstructured":"Canetti, R., & Krawczyk, H. (2001). Analysis of key-exchange protocols and their use for building secure channels, In International conference on the theory and applications of cryptographic techniques, Springer, pp. 453\u2013474.","DOI":"10.1007\/3-540-44987-6_28"},{"issue":"2","key":"923_CR19","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1109\/TIFS.2018.2854740","volume":"14","author":"Q Yang","year":"2018","unstructured":"Yang, Q., Xue, K., Xu, J., Wang, J., Li, F., & Yu, N. (2018). Anfra: Anonymous and fast roaming authentication for space information network. IEEE Transactions on Information Forensics and Security, 14(2), 486\u2013497.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"923_CR20","doi-asserted-by":"publisher","first-page":"46278","DOI":"10.1109\/ACCESS.2020.2978314","volume":"8","author":"I Altaf","year":"2020","unstructured":"Altaf, I., Saleem, M. A., Mahmood, K., Kumari, S., Chaudhary, P., & Chen, C.-M. (2020). A lightweight key agreement and authentication scheme for satellite-communication systems. IEEE Access, 8, 46278\u201346287.","journal-title":"IEEE Access"},{"key":"923_CR21","unstructured":"Stallings, W. (2006). Cryptography and network security, 4\/E. Pearson Education India."},{"key":"923_CR22","unstructured":"Hankerson, D., Menezes, A. J., & Vanstone, S. (2006). Guide to elliptic curve cryptography. Springer"},{"issue":"2","key":"923_CR23","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s10623-005-6344-y","volume":"38","author":"DR Stinson","year":"2006","unstructured":"Stinson, D. R. (2006). Some observations on the theory of cryptographic hash functions. Designs, Codes and Cryptography, 38(2), 259\u2013277.","journal-title":"Designs, Codes and Cryptography"},{"key":"923_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.04.013","author":"AA Khan","year":"2019","unstructured":"Khan, A. A., Kumar, V., & Ahmad, M. (2019). An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach. Journal of King Saud University-Computer and Information Sciences. https:\/\/doi.org\/10.1016\/j.jksuci.2019.04.013","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"issue":"9","key":"923_CR25","doi-asserted-by":"publisher","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2015). A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security, 10(9), 1953\u20131966.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"923_CR26","first-page":"1","volume":"27","author":"B Jun","year":"1999","unstructured":"Jun, B., & Kocher, P. (1999). The intel random number generator. Cryptography Research Inc. white paper, 27, 1\u20138.","journal-title":"Cryptography Research Inc. white paper"},{"key":"923_CR27","unstructured":"https:\/\/csrc.nist.gov\/projects\/random-bit-generation."},{"key":"923_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.019","author":"S Challa","year":"2020","unstructured":"Challa, S., Das, A. K., Gope, P., Kumar, N., Wu, F., & Vasilakos, A. V. (2020). Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems. Future Generation Computer Systems. https:\/\/doi.org\/10.1016\/j.future.2018.04.019","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"923_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-015-0400-9","volume":"10","author":"SA Chaudhry","year":"2017","unstructured":"Chaudhry, S. A., Naqvi, H., Sher, M., Farash, M. S., & Hassan, M. U. (2017). An improved and provably secure privacy preserving authentication protocol for sip. Peer-to-Peer Networking and Applications, 10(1), 1\u201315.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"923_CR30","unstructured":"Armando, A., Basin, D., Cuellar, J., Rusinowitch, M., & Vigan\u00f2, L. Avispa: Automated validation of internet security protocols and applications, ERCIM News 64 (January)."},{"issue":"5","key":"923_CR31","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541\u2013552.","journal-title":"IEEE Transactions on Computers"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-022-00923-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-022-00923-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-022-00923-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T09:29:52Z","timestamp":1700818192000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-022-00923-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,7]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["923"],"URL":"https:\/\/doi.org\/10.1007\/s11235-022-00923-0","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,7]]},"assertion":[{"value":"29 March 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}