Abstract
Space-air-ground integrated Internet of things can improve the scope of Internet of things applications significantly by offering truly global coverage all over the world. While space-air-ground integrated Internet of things is promising to be very useful in many aspects, its deployment and application should overcome severe security threats, for example, interceptions, identity forgery, data tampering, and so on. Authentication is an essential step to protect the Internet of things security, and mutual authentication (i.e. two-way authentication) is especially important to ensure the security of both communication parties simultaneously. However, the intrinsical properties of network dynamics and wide coverage make the authentication concern in space-air-ground integrated Internet of things extremely challenging than traditional Internet of things networks. In this article, we propose MASIT, an identity-based efficient and lightweight mutual authentication scheme for space-air-ground integrated Internet of things. MASIT exploits the natural broadcast property of space-air-ground integrated Internet of things to speed up authentication process, and leverage the distinguished feature of IPv6 to support concurrent numerous nodes. Theoretically, we prove that MASIT is existential unforgeable secure under adaptively chosen message and identity Attacks. We also implement MASIT and other existing typical identity-based encryption schemes and evaluate their performance in real platforms. Experimental results showed that, MASIT outperforms the existing identity-based encryption schemes significantly, that is, the signature verification time can be reduced by 50% to 60%, and the user signature size can be reduced by 13% to 50%.
Introduction
The Internet of things (IoT) are assumed to provide connectivity to all things around the world at any time. However, current mainstream IoT techniques, such as NB-IoT and LoRa, rely mainly on terrestrial infrastructure networks, whose coverage is severely limited by its fixed base station and restricted coverage area. Typically, a terrestrial base station is always located on dense crowd area, and its communication range varies from a few kilometers in urban areas to over 20 km in rural settings.1,2 Consequently, it is unable to provide connections in more areas on earth, such as oceans (occupies more than 70% of the world), forests, and polar regions. In comparison, emerging satellite networks (i.e. space networks) and aerial networks (aka, air networks), including moving drones (e.g. AT&T Cell on Wings), high altitude long endurance air vehicle (such as Airbus Zephyr), loons (e.g. Google Loon), 3 and satellites (such as Iridium, Orbcomm, Globalstar, Inmarsat), are able to cover hundreds or thousands of kilometers in diameter. As a result, by leveraging the natural broad coverage properties of satellite networks and aerial networks, space-air-ground integrated Internet of things (SIoT) have attracted intensive research interest from both industries and academies.4,5
Unfortunately, there are also serious security risks associated with SIoT. Due to the inherent openness of wireless channels, the SIoT communications are easily intercepted, eavesdropped, and tampered by unauthenticated malicious attackers.6,7 Moreover, the identities of terrestrial nodes (TNs) and network control center (NCC) are likely to be forged by malicious attackers, which might cause replay attacks and man-in-the-middle attacks. Therefore, measures must be taken to ensure the secure networking of SIoT.
As the first and most fundamental step to ensure the network security, authentication of SIoT is extremely critical. However, different from traditional terrestrial IoT, there are great challenges in SIoT authentication from many perspectives. First, since the moving speed of SIoT base station is fast and the network topology is dynamically changing, the time spent on authentication should be very short; second, the coverage area of SIoT is significantly wider, which means the authentication should serve numerous nodes concurrently; Third, the bandwidth of SIoT is limited and the link is associated with high transmission delay, which determines that authentication should be lightweight. Consequently, it requires a very efficient authentication scheme for SIoT.
However, existing authentication approaches are mainly designed for terrestrial IoT (TIoT), and not suitable for SIoT. Traditional approaches are based on public key infrastructure (PKI), which brings a long authentication time together with heavy overhead of certificate storage and management. Due to its advantages of good scalability and no certificate management, typical identity-based cryptography-based (IBC) schemes, such as Hess’s and 8 Cha and Cheon’s works, 9 have been improved and applied for static TIoT.10–14 However, they are unable to provide efficient authentication during dynamic and wide coverage circumstances.
To handle with this concern, in this article, we propose MASIT, an identity-based efficient and lightweight mutual authentication scheme for SIoT. In general, our contribution can be summarized as follows:
We formulate a multiuser high concurrent mutual authentication model in the SIoT scenario. Based on this model, we carefully analyze the SIoT authentication procedure and find two potential bottlenecks.
We design MASIT, a novel authentication scheme for SIoT. MASIT utilizes the SIoT natural broadcast property and takes the advantage of IPv6 address mechanism.
We proved that MASIT is existential unforgeable secure under adaptively chosen message and identity attacks (EUF-ACMIA) in theory.
We conduct experiments on real platform, and experimental results showed that MASIT is more efficient than existing approaches.
The remaining part of the article proceeds as follows. “Related work” section presents the related work. We propose MASIT authentication scheme in “The SIoT authentication problem” section, followed by the security proof in “The proposed MASIT scheme” section, and the performance analysis in “Security proof” section. Finally, “Performance analysis” section concludes the article.
Related work
Since SIoT authentication is a new concern, rare research has been introduced in this area. As the foundation of SIoT, satellite networks have been widely studied. The satellite network authentication methods can be divided into three categories: authentication based on PKI, authentication based on hash function and symmetric encryption, and authentication based on IBC.
Authentication based on PKI
PKI-based authentication in satellite networks has been investigated since early 2000s. Balasubramanian et al. 15 proposed a PKI-based authentication and key management scheme. There is no centralized certificate authority (CA) in the scheme, and the threshold mechanism is adopted. The CA service is dispersed to each node in the satellite network, which greatly ensures the security of the CA service. Hao et al. 16 proposed an authentication routing protocol for the specific architecture of two-layers satellite networks. In this protocol, MEO satellites in the upper layer authorize the certificates of LEO satellites in the lower layer, which enhances the security of the satellite network routing messages. Considering the certificate management problems in the PKI mechanism, Qian et al. 17 studied the certificate revocation method for the characteristics of satellite networks, which allows the satellite nodes to revoke the certificate of the malicious node according to local decisions when the satellite nodes are unable to connect with the CA. Fang et al. 18 proposed a distributed certificate revocation algorithm for satellite networks, in which the Satellite nodes supervise each other and decide whether to revoke their certificates according to the legal node’s accusation of illegal nodes.
Authentication based on hash function and symmetric encryption
PKI-based authentication has better scalability. However, the storage and management overhead of certificates is heavy. Therefore, the certificate-free or lightweight nonpublic key certificate authentication mechanism based on hash function and symmetric encryption (HFSE) has been widely studied. For the limited resources of satellite network resources, the authentication based on HFSE also has certain advantages in computational overhead. Roy-Chowdhury and Baras 19 presented a lightweight certificate source authentication protocol for wireless network and satellite network hybrid group communication. In the protocol, it uses a lightweight symmetric key certificate called TESLA certificate, in which the sender’s identity is bound to his keychain. Due to the message authentication codes based on the symmetric encryption, the protocol needs less requirements of node processing performance and node power than digital signatures. Yoon et al. 20 proposed an efficient and secure mobile satellite communication system anonymous authentication scheme, which uses a secure one-way hash function to avoid complex calculations of mobile users and NCCs. Therefore, it is suitable for lightweight equipment environments. Gope and Hwang 21 proposed a lightweight secure anonymous authentication scheme for global mobile networks. Considering the limited resources of mobile devices, the scheme use low-cost cryptographic operations (such as hash functions and XOR) to achieve authentication. In 2016, Liu et al. 22 proposed a lightweight authentication scheme for spatial information networks based on the temporary identity self-renewal strategy of the user, which also involves only hash functions, XOR, and string concatenation operations that are computationally efficient. In 2019, inspired by blockchain technology, Zhao et al. 23 proposed a hashchain-based identity authentication and privacy protection scheme in the space-air-ground integrated network, which can support effective data security for the intelligent transportation systems.
Authentication based on IBC
The above work has achieved lots of innovations and breakthroughs in satellite networks authentication. However, the abovementioned two categories still have some shortcomings in certificate management or scalability. Hess 8 and Cha and Cheon 9 come true the classical IBC-based authentication schemes, where the asymmetric cryptography is used for authentication without certificate and complex certificate management. Given the identity information and some public cryptography system parameters, any two nodes can authenticate the legitimate identity of each other easily. At present, some researchers try to apply IBC to authentication and key management in satellite networks.24–27 In order to resolve the problems of concentrating key management and overconsumption on certificate maintenance in satellite networks, Luo et al. 24 proposed an identity-based distributed key management scheme, designing the distributed private key generators (PKGs), private key updating, host-key shares updating, and session key agreement. In 2011, Wu et al. 25 presented an identity-based double-encryption scheme to ensure integrity of data when updating private key component, which can resist data modification attack and denial of service attack. To improve the efficiency of satellite network key management, Zhou et al. 26 assume NCC as PKG and use private key to encrypt timestamp and location information to guarantee the authentication freshness. Considering the frequent link switching in among LEO satellites, Li et al. 27 proposes a fast and efficient authentication protocol in LEO satellite network by combining identity-based encryption for key management and blockchain technology for rapid handover.
As shown in Table 1, all above types of authentication methods in satellite networks have their own advantages and disadvantages. Compared with other methods, IBC-based authentication has some advantages such as good scalability and no need for certificate management. However, the performance of present IBC-based methods is not enough to handle the concurrent massive user authentication concern in SIoT.
Comparison of different authentication schemes.
The SIoT authentication problem
The SIoT scenario
The basic SIoT model is shown in Figure 1. The space-air-ground network connects massive IoT users and the Internet through space-air-ground links. We would also like to list the notations in Table 2.

MASIT authentication model.
The notations.
TN: terrestrial nodes; NCC: network control center.
Nodes
In SIoT, the nodes mainly include TNs, NCC, PKG, and the flying nodes (FNs). FNs are able to provide network access and packets forwarding for TNs in SIoT. However, the computation capacity and storage capacity of FNs are generally limited. TNs are generally in small size with limited computation and storage resources. Considering the case with over
Links
Links in SIoT include the space-air-ground links between the FNs and the TNs and NCC, the interspace-air links (ISLs) between satellites and drones, and the space-air-ground links (SGLs) between FNs and terrestrial gateways. Since it is always a long distance between nodes, the propagation delays of SGLs and ISLs are relatively long, which has a negative impact on the authentication performance. The bandwidth of SGLs are usually constrained, but the download link has a natural broadcast property.
Addresses
To provide access during a network, addressing is a paramount concern. Since the scale of IoT is huge, it is commonly believed that only IPv6 addresses can satisfy the requirements of the massive IoT users. 28 IPv6 addresses can be classified into unicast addresses, multicast addresses and anycast addresses. Considering the network dynamic property of SIoT, we suggest an IPv6 aggregatable global unicast address (128 bits) to be used, which consists of a link prefix (the first 64 bits of IPv6 address) of a subnet and an Interface IDentifier (in short, IID, the last 64 bits of IPv6 address) of a user. To meet the requirements of autoconfiguration, plug-and-play, no requirement of DHCP server, stateless address autoconfiguration (SLAAC) is suitable for the address configuration of massive nodes in SIoT.
Analysis of SIoT authentication
The mutual authentication process depends on the propagation path. We illustrate the process by taking a TN to NCC authentication as an example. First, the authentication packet from the TN first reaches the overhead FN through the SGL uplink. Then, it is forwarded multiple hops to the FN covering the NCC through ISLs. After that, the packet is sent to the gateway connected to the NCC via the SGL downlink. In this process, several messages need to be transmitted over the path. Note that each part of the path maybe a bottleneck for the concurrent massive user authentication.
We then analyze possible bottlenecks. The whole transmission time cost of the authentication packet mainly includes the packet transmission delay, the propagation delays of SGLs, the propagation delays of the ISLs, the queuing delay and the delay of the packet forwarding in FNs, and so on. The packet transmission delay is determined by the authentication packet size and the link bandwidth. Considering a minimum IPv6 packet signed with the X.509 certificate as an example. The size of such an IPv6 packet, consisting of at least an IPv6 header (40 bytes), a signature (256 bytes) and a certificate (about 1500 bytes), is about 1800 bytes. If the link bandwidth prepared for the authentication is approximately 10 KB/s, the transmission delay is about
The above analysis only considers the time cost of one-time authentication, considering that massive users are concurrently authenticated, the major factors, which affects the authentication frequency are analyzed as follows.
Let the authentication packet size be
Bottleneck 1: The receiving frequency of authentication requests,
Bottleneck 2: The processing frequency of authentication requests,
Therefore, in order to improve the efficiency of one-time mutual authentication under the condition of the limited bandwidth and fixed propagation delay, it is necessary to reduce the authentication packet size and authentication interactions between TNs and the NCC. Accordingly, to improve the efficiency of concurrent massive user authentication, the authentication packet size and the authentication requests processing time must be reduced as possible.
The proposed MASIT scheme
In this section, we first review the preliminaries for IBE, and then introduce the identity-based signature designs of NCC and TN. Thereafter, the detailed mutual authentication process is presented. Finally, we show the design of MASIT protocol, combining with mutual authentication and user address configuration.
Preliminaries
Bilinear pairing
Let
Bilinearity:
Nondegeneracy:
Computability:
Computational problems
The computational challenges IBC relying are as follows:
Bilinear Diffie-Hellman problem:
Computational Diffie-Hellman problem:
Bilinear Diffie-Hellman decision problem:
Collusion attack algorithm with
The signature design
In MASIT, the mutual authentication between TNs and the NCC is performed by the identity-based signatures. Considering the different authentication conditions and requirements of the NCC and the TN, the NCC signature is designed with the broadcast mechanism and the TN signature size is designed to be as small as possible.
NCC signature
We adopt the Sakai and Kasahara 30 scheme to generate the public key, and then design an identity-based NCC signature scheme. The detailed NCC signature scheme as follows:
Setup: After inputting the security parameter
Extract: After inputting the NCC’s IID
Sign: The NCC randomly selects
Verify: After receiving the signature
In this process, NCC signature
TN signature
When massive TNs request authentications to the NCC, both the receiving frequency and the processing frequency of authentication requests determine the performance of the high concurrent authentication. Therefore, it is important to reduce the size and the verification overhead of the TN signature. In MASIT, the TN signature scheme is modified from the BLMQ scheme 31 and the detailed process work as follows:
Setup: After inputting the security parameter
Extract: After inputting the TN’s IID
Sign: The TN calculates
Verify: The NCC calculates
The correctness of the TN signature is derived as follows
As a result, MASIT replaces the large size element in
The authentication procedure
As shown in Figure 2, the mutual authentication of MASIT includes five procedures as follows.

The working flow of the authentication procedure in MASIT.
Initialization
When MASIT deploys in SIoT, the system parameters of IBS are initialized. First, PKG selects system parameters
Registration
Each node, including TNs and the NCC, must register for its corresponding private key at PKG before applying the authentication system. Take the TN as an example. Before deploying the TN in SIoT, it interacts with PKG through a secure channel such as offline. At first, the TN provides a unique 64-bit IID
NCC signature broadcast
When the TN access SIoT, not only the TN identity needs to be verified by the NCC, but also the TN must authenticate the NCC’s identity. Moreover, compared with terrestrial networks, SIoT has the advantages of large broadcast range and abundant broadcast resources. Thus, at the beginning of the MASIT mutual authentication process, the NCC broadcasts the authentication message (including timestamp, random number, authentication request, etc.) and the NCC signature of it to massive TNs through FNs. After receiving the message, TNs verify the NCC signature to authenticate the NCC. The details are given as follows:
The NCC periodically prepares the random parameter
TN authentication solicitation
Before the TN solicits the authentication, it first authenticates the NCC’s identity. After receiving the NCC’s authentication request message
NCC verification
After receiving the TN’s authentication solicitation message
To conclude, MASIT realizes the mutual authentication by the NCC signature and the TN signature, which effectively reduce the overhead of the limited unicast bandwidth and the computation overhead of the NCC to facilitate the high concurrent authentication.
MASIT protocol design
To achieve concurrent massive user mutual authentication in SIoT, the MASIT protocol is designed to realize the mutual authentication between the TN and the NCC within the IPv6 address configuration process for the TN simultaneously.
As shown in Figure 3, the MASIT protocol is implemented on the layer of the ICMPv6 protocol, where the size of MASIT data mainly depends on the signature size. Three types of network entities are involved in the MASIT protocol authentication process, including the NCC that provides authentication services, the TN to be authenticated, and the FN that provides communication resources (CRs) and address configuration services. There are three types of MASIT messages: the secure authentication advertisement (SAA) messages, the secure authentication solicitation (SAS) messages, and the secure authentication reply (SAR) messages. The message format of these messages is designed in the following section.

MASIT protocol packet construction.
SAA
As shown in Figure 4(a), the first 32 bits of the packet are the ICMPv6 header.

Messages format in MASIT protocol: (a) SAA message format, (b) SAS message format, (c) SAR message format.
SAS
The SAS message is used as the response to SAA. As shown in Figure 4(b), it is an SAS message if
Security Authentication Reply
The SAR message is used as the response to SAS. As shown in Figure 4(c), the SAR message is identified if
As shown in Figure 5, the detailed process of the MASIT protocol is as follows:
Every time after a period
The NCC sends SAA(0) to the connected FN
FNs forward SAA(0)
After receiving SAA(0), FNs change the contents of Option in SAA with some information, sets
Each FN broadcasts SAA(1) to TNs within its signal coverage
After receiving SAA(1), each TN verifies the NCC signature in SAA(1) according to Verify. If the authentication succeeds, the TN configures the IPv6 address by the SLAAC information in SAA(1), and prepares a SAS(0) message. TN calculates its signature
The TN sends SAS to the NCC via FNs by unicast
If the NCC receives SAS(1), it indicates that the TN failed to authenticate the NCC. If receiving SAS(0), the NCC verifies the TN signature in SAS(0). If the verification is successful, the NCC authenticates the TN successfully and the access request of the TN is accepted. Thereafter, the NCC allocates CR for the TN by the SAR message. SAR(0) is constructed by generating the NCC signature of the CR allocation message, where the signature parameter
The NCC sends SAR to the connected FN
FNs forward SAR
When the FN above the target TN receives SAR(0), it configures CR for the target TN according to SAR(0)
The FN sends SAR to the TN by unicast
If the TN receives the SAR(1), the authentication fails. If receiving SAR(0), the TN configures CR according to SAR(0). After that, the mutual authentication and address configuration have completed.

MASIT authentication protocol.
In the MASIT protocol, the mutual authentication and address configuration are completed by few interactions at one time, which significantly reduce the total delay of the secure access. Furthermore, by utilizing the sufficient broadcast resources, the MASIT protocol saves the limited unicast resources as possible.
Security proof
In MASIT, two identity-based signatures are designed for mutual authentication between the NCC and the TN. If there is an attacker with adaptively chosen message and identity attacks capabilities, the probability of the attacker successfully forging the existence of a signature is negligible for a secure identity-based signature scheme. In other words, the signature is existential unforgeable secure under adaptively chosen message and identity attacks (EUF-ACMIA). 9 Generally, the attack mitigation ability of an IBS-based authentication scheme depends on whether the designed signature is EUF-ACMIA. The brief EUF-ACMIA security proof of MASIT signature based on Forking Lemma and random oracle model 32 is given below.
NCC signature security proof
First, based on the random oracle model, it is assumed that there is an adaptively chosen message and identity attacker Eve, which can obtain the IBS public parameter
Theorem 1
Under the random oracle model, for the IBS scheme, if there is an adaptively chosen message and identity attacker Eve who can output a new valid quintuple
Since NCC signature scheme is a general IBS scheme, it satisfies the conditions in Theorem 1. Therefore, an NCC signature simulator can be constructed as follows.
Simulator 1
After randomly selecting
Therefore,
F
1 generates the bilinear mapping parameters
F
1 runs the attacker Eve1 by inputting the system parameter of the NCC signature scheme
Eve1 outputs two valid signatures
That is, F1 successfully outputs
If the NCC signature is existential forgeable under adaptively chosen message and identity attacks, an algorithm F1 with probabilistic polynomial time complexity could be proposed, which calculates
TN signature security proof
The private key generation method of the TN signature is same as the NCC signature, so it can be proved that the TN signature is also EUF-ACMIA.
Since the TN signature scheme is a general IBS scheme and satisfies the conditions in Theorem 1, a TN signature simulator can be constructed as follows.
Simulator 2
After randomly selecting
Therefore,
F2 generates the bilinear mapping parameters
F2 runs the attacker Eve2 by inputting the system parameter of the TN signature scheme
Eve2 outputs two valid signatures
That is, F2 successfully outputs
If the TN signature is existential forgeable under adaptively chosen message and identity attacks, an algorithm F2 with probabilistic polynomial time complexity could be proposed to solve the
Performance analysis
In MASIT,
The computational overhead and the transmission overhead of each scheme are shown in Table 3.
Performance analysis of authentication scheme.
To simulate the real performance of SIoT, the related operations are tested in the Ubuntu 14.04 LTS system with the 2G memory and 3.40 GHz single-core Intel CPU and the CentOS 8.0 system with the 1G memory and 1 GHz ARM-A8 CPU, which represent the NCC and the TN respectively. Based on the PBC library, the GMP library, and the Openssl library, the tested time overhead of each operation is as shown in Table 4.
Comparison of operation time overhead.
According to the simulation results, operations such as
Comparison of actual performance of different authentication schemes.
In Table 5, it can be observed that the IBS scheme has obvious advantages over the RSA scheme in terms of the signing time and transmission overhead. As shown in Figure 6(a), compared with the classic IBS scheme, the MASIT_TN signature scheme greatly improves the verification overhead of the NCC, which is beneficial to the high concurrent authentication in the NCC. About the transmission overhead, MASIT_NCC is better than the traditional IBS scheme, which effectively reduces the authentication transmission overhead. Besides, as shown in Table 5, the compute overhead of the TN is much heavier than that of the NCC, which is caused by the difference of their compute performance. Thus, reducing the compute overhead of the TN can significantly facilitate the whole authentication process. According to Figure 6(b), the TN compute overhead of the MASIT scheme is reduced effectively. In general, compared to the classic IBS solution, the TN signature verification time of MASIT is reduced by approximately 50% to 60%, and the NCC signature size is reduced by approximately 13% to 50%.

Comparison of performance test results: (a) Verifying overhead of the NCC, (b) Compute overhead of the TN, (c) Transmission overhead.
In terms of mutual authentication, compared with the traditional “request-response” authentication mode, MASIT periodically broadcasts the NCC signature in SAA by the sufficient broadcast bandwidth, and completes TN-authenticate-NCC in advance by considering the broadcast advantage of SIoT. Considering the case that the number of TNs covered by an FN per minute is

Comparison of interactions of different authentication schemes.
The MASIT protocol completes the mutual authentication and the SLAAC mechanism of IPv6 by few interactions between the NCC and the TN. In the traditional “request-response authentication + address configuration” mechanism, the TN and the NCC need to exchange three messages to authenticate each other and other three messages to configure TN’s address. In the MASIT protocol, the TN and the NCC only need to exchange three messages to achieve the mutual authentication and SLAAC. Thus, the number of interactions is reduced by 50% compared with the traditional mechanism.
Conclusion
In this article, we proposed MASIT, an identity-based lightweight mutual authentication method for SIoT based on IPv6 and broadcast preauthentication. In MASIT, to avoid the complex certificate management problem of PKI, the identity-based authentication is designed, which generates the public key from IID in the IPv6 address. Besides, MASIT completes the mutual authentication and IPv6 address configuration through less interactions. More importantly, considering the advantages of broadcast in SIoT, we carefully designed the NCC signature and TN signature respectively. Under the random oracle model, by reducing the attack against the MASIT signature to the
However, as further research discussions, there are more authentication concerns to be addressed in the emerging SIoT scenario. For instance, due to the natural mobility of FNs, TNs need to frequently switch links between different FNs and different beams within the same FN. To ensure continuous and stable network accesses, the link switching process also requires a fast authentication to avoid denial of service attacks. Besides, to protect entities’ privacy, the anonymous authentication should be further considered. Further research efforts should be taken to address this concerns.
Footnotes
Handling Editor: Gaurav Sharma
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: The work described in this paper is supported by the National Key R&D Program of China under Grants 2017YFB0802300 and the Soonchunhyang University Research Fund.
