Research Article
An Efficient ECC-Based Authentication Scheme against Clock Asynchronous for Spatial Information Network
Table 1
Notations used in this paper.
| Symbol | Description |
| | Low-earth-orbit satellite communications system | | Mobile user | | Network control center | | Low-Earth-orbit satellite | | Attacker | | Identity of | | Identity of | | Smart card issued to each specific | | Password of | | Random numbers generated by | | Random numbers generated by | | Private/public key of | | Share session key | | Timestamp | | Point multiplication | | Hash function: | | Bitwise XOR operation | | Concatenate operation |
|
|