DOI QR코드

DOI QR Code

WiMax2 PKMv2 암호화 계층의 검증 및 성능 평가 테스트베드의 구축

Implementation of Verification and Evaluation Testbed of WiMax2 PKMv2 Encryption Layer

  • 김장현 (가톨릭대학교 컴퓨터공학과) ;
  • 서효중 (가톨릭대학교 컴퓨터정보공학부)
  • 투고 : 2013.02.08
  • 심사 : 2013.04.12
  • 발행 : 2013.04.30

초록

모바일 인터넷 통신 표준인 WiMax2는 PKMv2 프로토콜을 이용한다. PKMv2는 키에 기반한 암호화를 사용하여 통신 기지국과 단말간의 데이터를 보호한다. 따라서 WiMax2 단말 또는 기지국을 개발하는 경우 PKMv2 프로토콜을 구현하여야만 하며, 상호 동작에 대한 적합성 테스트를 통과하여야 한다. 또한 저성능 프로세서를 이용하는 단말의 경우 암호화 모듈의 처리 성능이 WiMax2 통신의 데이터 처리 능력에 병목이 될 수 있으므로 해당 프로세서에서의 암호화 모듈 처리 성능의 적절성을 측정하여야 한다. 본 논문은 이러한 경우에 사용할 수 있는 WiMax2 PKMv2에 따르는 동작성 시험 및 성능 측정 테스트베드를 구현하였다.

PKMv2 security protocol was adopted by the WiMax2 mobile internet communication standard. A base station and a mobile station protect communication data using key based encryption according to the PKMv2 protocol. Consequently, each development of a base station and/or mobile station includes implement of the PKMv2 protocol, and the station must qualifies various interoperable tests. Furthermore, communication bandwidth of the station can be limited by the encryption module when the station implemented based on a low-performance processor. Thus, a correspondence measurement of the encryption module must be carried on the target processor. In this paper, we implement a testbed which affords throughput measurement as well as the interoperable tests by PKMv2.

키워드

참고문헌

  1. "IEEE Std. 802.16e-2005", Local and Metropolitan Area Networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems, IEEE, 2006.
  2. D. Astely, E. Dahlman, A. Furuskar, Y. Jading, M. Lindstrom, S. Parkvall, "LTE: the evolution of mobile broadband", IEEE Communications Magazine, Vol. 47. No. 4, pp. 44-51, 2009.
  3. Daan Pareit, Bart Lannoo, Ingrid Moerman, Piet Demeester, "The History of WiMAX: A Complete Survey of the Evolution in Certification and Standardization for IEEE 802.16 and WiMAX", IEEE Communications Surveys & Tutorials, Vol. 14, No. 4, pp. 1183-1211, 2012. https://doi.org/10.1109/SURV.2011.091511.00129
  4. Yu-Doo Kim, Il-Young Moon, "Design of Testbed for Performance Evaluation of Peer-to-Peer Protocols in Mobile Networks", Journal of Korean Institute of Information Technology, Vol. 8, Issue 10, pp. 159-166, Oct. 2010.
  5. David J, Jesse W., "Overview of IEEE 802.16 Security", IEEE Security and Privacy, Vol. 2, No. 3, pp. 40-48, 2004.
  6. J. Arkko, V. Lehtovirta, P. Eronen, Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA'), IETF Trust, 2009.
  7. Steve Burnett, Stephen Paine, The RSA Security's Official Guide to Cryptography, McGraw-Hill, 2001.
  8. Dae-Woo Choi, "Implementation of a Testbed for Wireless Sensor Network, Journal of the Korea Academia-Industrial cooperation Society", Vol.12, No.1, pp. 445-450, 2011. https://doi.org/10.5762/KAIS.2011.12.1.445
  9. Xiao-Lei Zhang, Ye Wang, Jang-Geun Ki, Kyu-Tae Lee, "Simulation model of a multihomed node with WiMAX and WLAN", The Journal of the Institute of Webcasting, Internet and Telecommunication, Vol. 10, Issue 3, pp. 111-119, 2010.
  10. Rosenblum, Mendel. "VMware's Virtual Platform TM", Proc. Hot Chips, pp.185-196, 1999.
  11. Ye Geoffrey Li, Orthogonal Frequency Division Multiplexing for Wireless Communications, Springer-Verlag Berlin, 2009.