Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks
DOI:
https://doi.org/10.11113/jt.v73.3258Keywords:
MMR WiMAX network, security issues, IEEE 802.16, denial of service, hop-by-hop authenticationAbstract
Mobile Multihop Relay (MMR) network is one of the emerging technologies, especially LTE-Advanced, WiMAX and the Smart grid communications. Ensuring security is one of the most imperative and challenging issues in MMR networks. Privacy Key Management (PKM) protocol is proposed to ensure the security measures in MMR networks. However, the protocol still faces several security threats, specifically Denial of Service (DoS), replay attacks, Man in the Middle (MitM) attacks and the interleaving attacks, which is termed as Medium Access Control (MAC) layer attacks. This paper proposed a modified version PKM protocol for both unilateral and mutual authentication, which is termed as Self-organized Efficient Authentication and Key Management Scheme (SEAKS) authentication protocol. This protocol ensures secure end-to-end data transmission using distributed hop-by-hop authentication and localized key management schemes with a very simple and efficient way.
References
IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Broadband Wireless Access Systems Amendment 1: Multihop Relay Specification. 2009. IEEE Std 802.16j (Amendment to IEEE Std 802.16-2009). 1–290,
A.S.Khan. 2010. Efficient Distributed Authentication Key Scheme for Multi-hop Relay In IEEE 802.16j Networks. International Journal of Engineering Science and Technology (IJEST). 2: 2192–2199.
C. Kolias, G. Kambourakis, and S. Gritzalis. 2012. Attacks and Countermeasures on 802.16: Analysis and Assessment. Communications Surveys & Tutorials, IEEE. 15: 487–514
Ahmed Mohamed El-Amin, Salah El-agooz, A. E.-D. R. Shehata, and E. A.-E. Amer. 2013. Design, Verification and Implementation of Enhanced PKM WiMAX Authentication Protocol. International Journal of Computer Science and Telecommunications. 4: 41–46
A. Altaf, R. Sirhindi, and A. Ahmed. 2008. A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography. Second International Conference on Systems and Technologies in Emerging Security Information. SECURWARE '08. 238–242.
H. Chin-Tser and J.M. Chang. 2008. Responding to Security Issues in WiMAX Networks. IT Professional. 10: 15–21
X. Dai and X. Xie. 2010. Analysis and research of security mechanism in IEEE 802.16j, in Proceedings International Conference on Anti-Counterfeiting, Security and Identification, ASID. 33–36.
S. Hussain, M.N. Khan, and M. Ibrahim. 2012. A security architecture for WiMAX networks. International Journal of Computer Applications 50(9): 35–39
H. Jie and H. Chin-Tser. 2011. Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations. in Communications (ICC). IEEE International Conference. 1–5.
A.S. Khan, N. Fisal, N.N. M.I. Ma'arof, F.E.I. Khalifa, and M. Abbas. 2011. Security issues and modified version of PKM protocol in non-transparent multihop relay in IEEE 802.16j networks. International Review on Computers and Software. 6: 104–109
D. Satish Kumar and N. Nagarajan. 2012. Relay technologies and technical issues in IEEE 802.16j Mobile Multi-hop Relay (MMR) networks. Journal of Network and Computer Applications. 36: 91–102
F. Yang and Y. Qian. 2012. Two Different Schemes of Authentication in IEEE 802.16j Multi-Hop Relay Network. 8th International Conference on Networking and Mobile Computing in Wireless Communications (WiCOM). 1–4.
S. Xu. 2008. Security Protocol in WirelessMAN. University of South Carolina
X. Sen, H. Chin-Tser, and M.M. Matthews. 2008. Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR in Wireless Communication Systems. ISWCS '08. IEEE International Symposium. 653–657.
N. Thuy Ngoc and M. Maode. 2012. An pre-authentication protocol with symmetric keys for secure handover in mobile WiMAX networks in Communications (ICC). 2012 IEEE International Conference. 863–867.
J. Chee and T. Ming. 2011. Improving Security in the IEEE 802.16 Standards in Information Technology: New Generations (ITNG), 2011 Eighth International Conference. 408–412.
S. Hussain, M.N. Khan, and M. Ibrahim. 2012. A Security Architecture for Wimax Networks. International Journal of Computer Applications. 50: 35–39
Khan, A.S., Fisal, N., Bakar, Z.A., Salawu, N., Maqbool, W., Ullah, R., Safdar, H. 2014. Secure authentication and key management protocols for mobile multihop WiMAX networks. Indian Journal of Science and Technology. 7(3): 282–295.
Khan, A.S., Fisal, N., Ma'arof, N.N.M.I., Khalifa, F.E.I., Abbas, M. 2011. Security issues and modified version of PKM protocol in non-transparent multihop relay in IEEE 802.16j networks. International Review on Computers and Software. 6 (1): 104–109.
Khan, A.S., Fisal, N., Yusof, S.K.S., Ariffin, S.H.S., Esa, M., Maarof, N.N., Abbas, M. 2010. An improved authentication key management scheme for Multihop relay in IEEE 802.16m networks. 2010 IEEE Asia-Pacific Conference on Applied Electromagnetics, APACE.
D.C. Wyld, J. Zizka, D. Nagamalai, N. Kahya, N. Ghoualmi, and P. Lafourcade. 2012. Key Management Protocol in WIMAX Revisited. Advances in Computer Science, Engineering & Applications. 167: 853–862. Springer Berlin Heidelberg.
A.S. Khan. 2014. Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network. International Journal of Communication Networks and Information Security (IJCNIS). 6(3)
S.-Y. Wang, C.-L. Chou, and C.-C. Lin. 2009. The GUI User Manual for the NCTUns 6.0, Network Simulator and Emulator. Network and System Laboratory. Taiwan
Downloads
Published
Issue
Section
License
Copyright of articles that appear in Jurnal Teknologi belongs exclusively to Penerbit Universiti Teknologi Malaysia (Penerbit UTM Press). This copyright covers the rights to reproduce the article, including reprints, electronic reproductions, or any other reproductions of similar nature.