Performance Evaluation of End-to-End Security Protocols in WiBro using NS-2

NS-2를 이용한 WiBro상에서의 종단 간 보안 프로토콜의 성능평가 및 분석

  • 김정윤 (성균관대학교 정보통신공학부) ;
  • 송세화 (성균관대학교 정보통신공학부) ;
  • 김인환 (성균관대학교 정보통신공학부) ;
  • 황인용 (삼성탈레스 종합연구소) ;
  • 김석중 (삼성탈레스 종합연구소) ;
  • 최형기 (성균관대학교 정보통신공학부)
  • Published : 2009.06.15

Abstract

WiBro has advantages when both WLAN and 3G UMTS are adopted. Much research is being carried out in this area. However, the WiBro specification does not consider end-to-end security. Hence, another security protocol has to be adopted to support secure communication. Most previous research only focused on WiBro MAC performance improvement or security. In this paper, we adopt a security protocol such as IPsec, TLS, and DTLS, well known end-to-end security protocols, to make full use of WiBro in the IP network. Using NS-2 we simulated the adoption of end-to-end security protocol and evaluated performance and usability. Simulation shows DTLS had some performance advantages. All the protocols, TLS and IPsec are also suitable for use in WiBro.

WLAN 및 3G의 장점을 고루 갖춘 WiBro 기술이 국제 표준으로 채택됨에 따라, 수많은 관련 연구가 진행되었다. 그러나, WiBro 표준은 종단 간 통신에 대해서는 정의하고 있지 않으며, 따라서 종단간 보안을 제공하기 위해서는 별도의 보안 프로토콜의 적용이 필요하다. 대부분의 관련 연구들은 WiBro 표준 자체에 대한 성능 향상이나 보안 향상 등을 목적으로 진행되었지만, WiBro의 실제적인 응용에 대해서는 연구가 거의 진행되지 않았다. 우리는 WiBro를 IP 네트워크에서 활용하기 위한 방안으로, IPsec, TLS, DTLS와 같은 대표적인 종단 간 보안 프로토콜의 적용을 제안한다. 우리는 WiBro에 대한 종단 간 보안 프로토콜의 적용 가능성을 검토하고 그 성능을 검증하기 위해, NS-2를 이용하여 시뮬레이션을 수행하였다. 시뮬레이션 결과를 분석한 결과, DTLS가 TLS 및 IPsec보다 우수한 성능을 보였으며, 3가지 보안 프로토콜 모두 WiBro에 적용하기에 적합한 것으로 나타났다.

Keywords

References

  1. IEEE 802.11-2007, "IEEE standard for Information technology Telecommunications and information exchange between systems- Local and metropolitan area networks - Specific requirements Part 11 Wireless LAN Meidum Access Control (MAC) and Physical Layer (PHY) Specifications," June 2007
  2. 3GPP; Technical Specification Group Services and System Aspects, "UMTS Access Stratum Services and Functions, version 7.0.0, release 7," June 2007
  3. Telecommunications Technology Association (TTA),'TTA Standard for Wireless Broadband (WiBro) Portable Internet: Specifications for 2.3 GHz band Portable Internet - PHY and MAC layers," 2004
  4. S. Kent and R Atkinson, "Security Architecture for the Internet Protocol," RFC 2401, November 1998
  5. T. Dierks and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.2," RFC 5246, August 2008
  6. E. Hescorla and N. Modadugu, "Datagram transport layer security," RFC 4347, April 2006
  7. The Network Simulator - NS-2, available at http//www.isi.edu/nsnamlns/
  8. NIST, "IEEE 802.16 ns-2 code," available at http:// www.antd.nist.gov/seamlessandsecure/doc.html
  9. IEEE 802.16e/D5-2004, "Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems - Amendment for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands," November 2004
  10. S. Ya-Chin and L. Yi~Bing, "IPsec~Based VoIP Performance in WLAN Environments," IEEE Internet Computing, Vol.12, No.6, pp. 77-82, 2008 https://doi.org/10.1109/MIC.2008.128
  11. H. Junbeom, S. Hyeongseop, K. Pyung, Y. Hyunsoo, and S. Nah-Oak, "Security Consider- ations for Handover Schemes in Mobile Wi:VIAX Networks," WCNC 2008, pp. 2531-2536
  12. S. Hung-Min, L. Yue-Hsun, C. Shuai-Min, and S. Yi-Chung, "Secure and fast handover scheme based on pre-authentication method for 802.16/ WiMAX infrastructure networks," TEN CON 2007, pp. 1-4
  13. Sun-Hwa Lim and Sang-ho Lee, "Efficient IMS Authentication Architecture based on Initial Access Authentication in Willro-Evolution (WiBro-EVO) System," VTC 2007, pp. 904-908
  14. 3GPP, 3rd generation partnership project; Technical specification group services and systems aspects, "IP Multimedia subsystem stage 2, Tech. Spec. 3G TS 23.228 version 6.2.0 (2003-06)," 2003
  15. J Arkko and H. Haverinen, "Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)," RFC 4187, January 2006
  16. A. Alshamsi and T. Saito, "A technical comparison of IPSec and SSL," AINA 2005, pp. 395-398
  17. Alan O. Freier, Philip Karlton, and Paul C. Kocher, "The SSL Protocol Version 3.0," available at http:;/wp.netscape.com/eng/ssI3/ssl-toc.html
  18. N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, "A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols," IEEE Transactions on Mobile Computing, Vol.5, No.2, pp. 128-143, 2006 https://doi.org/10.1109/TMC.2006.16