{"id":"https://openalex.org/W3008651604","doi":"https://doi.org/10.1109/twc.2020.2975781","title":"A Lightweight and Secure Group Key Based Handover Authentication Protocol for the Software-Defined Space Information Network","display_name":"A Lightweight and Secure Group Key Based Handover Authentication Protocol for the Software-Defined Space Information Network","publication_year":2020,"publication_date":"2020-02-28","ids":{"openalex":"https://openalex.org/W3008651604","doi":"https://doi.org/10.1109/twc.2020.2975781","mag":"3008651604"},"language":"en","primary_location":{"id":"doi:10.1109/twc.2020.2975781","is_oa":false,"landing_page_url":"https://doi.org/10.1109/twc.2020.2975781","pdf_url":null,"source":{"id":"https://openalex.org/S63459445","display_name":"IEEE Transactions on Wireless Communications","issn_l":"1536-1276","issn":["1536-1276","1558-2248"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Wireless Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100688242","display_name":"Kaiping Xue","orcid":"https://orcid.org/0000-0003-2095-7523"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kaiping Xue","raw_affiliation_strings":["Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China"],"raw_orcid":"https://orcid.org/0000-0003-2095-7523","affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088723765","display_name":"Wei Meng","orcid":"https://orcid.org/0000-0003-0209-8753"},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Meng","raw_affiliation_strings":["Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077173223","display_name":"Huancheng Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I126520041","display_name":"University of Science and Technology of China","ror":"https://ror.org/04c4dkn09","country_code":"CN","type":"education","lineage":["https://openalex.org/I126520041","https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huancheng Zhou","raw_affiliation_strings":["Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China","institution_ids":["https://openalex.org/I126520041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101435519","display_name":"David S. L. Wei","orcid":"https://orcid.org/0000-0002-3839-5576"},"institutions":[{"id":"https://openalex.org/I164389053","display_name":"Fordham University","ror":"https://ror.org/03qnxaf80","country_code":"US","type":"education","lineage":["https://openalex.org/I164389053"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David S. L. Wei","raw_affiliation_strings":["Computer and Information Science Department, Fordham University, New York, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer and Information Science Department, Fordham University, New York, USA","institution_ids":["https://openalex.org/I164389053"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057916222","display_name":"Mohsen Guizani","orcid":"https://orcid.org/0000-0002-8972-8094"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Mohsen Guizani","raw_affiliation_strings":["Department of Computer Science and College of Engineering, Qatar University, Doha, Qatar"],"raw_orcid":"https://orcid.org/0000-0002-8972-8094","affiliations":[{"raw_affiliation_string":"Department of Computer Science and College of Engineering, Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100688242"],"corresponding_institution_ids":["https://openalex.org/I126520041"],"apc_list":null,"apc_paid":null,"fwci":7.9312,"has_fulltext":false,"cited_by_count":79,"citation_normalized_percentile":{"value":0.97633193,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"19","issue":"6","first_page":"3673","last_page":"3684"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8058449029922485},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6280017495155334},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5827695727348328},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.49522796273231506},{"id":"https://openalex.org/keywords/group-key","display_name":"Group key","score":0.47278735041618347},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.455707848072052},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.42612943053245544},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4119790494441986},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.37461575865745544},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2870430052280426},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.14034691452980042}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8058449029922485},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6280017495155334},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5827695727348328},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.49522796273231506},{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.47278735041618347},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.455707848072052},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.42612943053245544},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4119790494441986},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37461575865745544},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2870430052280426},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.14034691452980042},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/twc.2020.2975781","is_oa":false,"landing_page_url":"https://doi.org/10.1109/twc.2020.2975781","pdf_url":null,"source":{"id":"https://openalex.org/S63459445","display_name":"IEEE Transactions on Wireless Communications","issn_l":"1536-1276","issn":["1536-1276","1558-2248"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Wireless Communications","raw_type":"journal-article"},{"id":"pmh:oai:qspace.qu.edu.qa:10576/36980","is_oa":false,"landing_page_url":"http://hdl.handle.net/10576/36980","pdf_url":null,"source":{"id":"https://openalex.org/S4306400014","display_name":"Qatar University QSpace (Qatar University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60342839","host_organization_name":"Qatar University","host_organization_lineage":["https://openalex.org/I60342839"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.4000000059604645,"display_name":"Decent work and economic growth"}],"awards":[{"id":"https://openalex.org/G4776578996","display_name":null,"funder_award_id":"2016394","funder_id":"https://openalex.org/F4320322847","funder_display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences"},{"id":"https://openalex.org/G6333748432","display_name":null,"funder_award_id":"61671420","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6585894771","display_name":null,"funder_award_id":"2016YFB0800301","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322847","display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","ror":"https://ror.org/031141b54"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W656369140","https://openalex.org/W1587889742","https://openalex.org/W1657093105","https://openalex.org/W1698388015","https://openalex.org/W2001743409","https://openalex.org/W2014223748","https://openalex.org/W2039043123","https://openalex.org/W2040538509","https://openalex.org/W2059110084","https://openalex.org/W2082098028","https://openalex.org/W2082276212","https://openalex.org/W2119928092","https://openalex.org/W2122505524","https://openalex.org/W2137838113","https://openalex.org/W2141420453","https://openalex.org/W2144043124","https://openalex.org/W2148301647","https://openalex.org/W2148717592","https://openalex.org/W2157959580","https://openalex.org/W2162841600","https://openalex.org/W2175661655","https://openalex.org/W2275823581","https://openalex.org/W2294784467","https://openalex.org/W2460811025","https://openalex.org/W2566832386","https://openalex.org/W2604126779","https://openalex.org/W2604436698","https://openalex.org/W2606537796","https://openalex.org/W2741552236","https://openalex.org/W2802984054","https://openalex.org/W2846593596","https://openalex.org/W2905018958","https://openalex.org/W2909139152","https://openalex.org/W2920555465","https://openalex.org/W2920604741","https://openalex.org/W2960870100","https://openalex.org/W2964680982","https://openalex.org/W2968925205","https://openalex.org/W2969103220","https://openalex.org/W2999271997","https://openalex.org/W4231339499","https://openalex.org/W6735957916"],"related_works":["https://openalex.org/W2059311690","https://openalex.org/W2552532746","https://openalex.org/W2182350931","https://openalex.org/W2166849903","https://openalex.org/W2980673725","https://openalex.org/W2161453762","https://openalex.org/W3007400813","https://openalex.org/W2364546129","https://openalex.org/W1982397785","https://openalex.org/W3141933679"],"abstract_inverted_index":{"With":[0],"rapid":[1],"advances":[2],"in":[3,26,51,87,96,103,200,224],"satellite":[4,114],"technology,":[5],"space":[6,73],"information":[7,74],"network":[8,65,75,159,216],"(SIN)":[9],"has":[10],"been":[11,58,125],"proposed":[12,144],"to":[13,23,33,79,108,147,171,188,214],"meet":[14],"the":[15,52,62,81,93,99,111,150,156,173,182,208,215],"increasing":[16],"demands":[17],"of":[18,54,113,175,202,211],"ubiquitous":[19],"mobile":[20],"communication":[21,205],"due":[22,32],"its":[24,198],"advantages":[25],"providing":[27],"extensive":[28],"access":[29],"services.":[30],"However,":[31,89],"satellites'":[34],"resource":[35,49,85],"constraint":[36],"and":[37,48,83,116,152,204],"SIN's":[38],"highly":[39,157],"dynamic":[40,158],"topology,":[41,160],"it":[42],"poses":[43],"a":[44,164],"challenge":[45],"on":[46,132],"management":[47,82],"utilization":[50,86],"development":[53],"SIN.":[55,88],"There":[56],"have":[57],"some":[59,117],"works":[60,91],"integrating":[61],"software":[63,71],"defined":[64,69,72],"(SDN)":[66],"into":[67],"SIN,":[68],"as":[70,78],"(SD-SIN),":[76],"so":[77],"simplify":[80],"improve":[84],"these":[90],"ignore":[92],"security":[94,101,120,151],"issue":[95],"SD-SIN.":[97],"Meanwhile,":[98],"existing":[100],"mechanisms":[102],"SDN":[104],"are":[105],"still":[106,122],"unable":[107],"cope":[109],"with":[110],"uniqueness":[112],"network,":[115],"other":[118],"critical":[119],"issues":[121],"haven't":[123],"yet":[124],"well":[126],"addressed.":[127],"In":[128,192],"this":[129],"paper,":[130],"based":[131],"(t,n)":[133],"secret":[134],"sharing,":[135],"an":[136],"SIN-specific":[137],"lightweight":[138],"group":[139,165],"key":[140],"agreement":[141],"protocol":[142,185,221],"is":[143,222],"for":[145],"SD-SIN":[146],"ensure":[148],"both":[149],"applicability.":[153],"Moreover,":[154],"considering":[155],"we":[161],"also":[162],"design":[163],"key-based":[166],"secure":[167],"handover":[168,176,183],"authentication":[169,184],"scheme":[170],"reduce":[172],"overhead":[174,213],"authentication.":[177],"Security":[178],"analysis":[179],"shows":[180,197],"that":[181,219],"can":[186],"resist":[187],"various":[189],"known":[190],"attacks.":[191],"addition,":[193],"further":[194],"performance":[195],"evaluation":[196],"efficiency":[199],"terms":[201],"computation":[203],"overheads.":[206],"Finally,":[207],"simulation":[209],"results":[210],"computing":[212],"entities":[217],"demonstrate":[218],"our":[220],"feasible":[223],"practical":[225],"implementation.":[226]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":21},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
