Browse > Article
http://dx.doi.org/10.6109/JKIICE.2009.13.2.382

Security Scheme for Prevent malicious Nodes in WiMAX Environment  

Jeong, Yoon-Su (충북대학교 전자계산학과)
Kim, Yong-Tae (한남대학교 멀티미디어학부)
Park, Gil-Cheol (한남대학교 멀티미디어학부)
Lee, Sang-Ho (충북대학교 전기전자 컴퓨터공학부)
Abstract
As the use of mobile device is popularized, the needs of variable services of WiMAX technique and the importance of security is increasing. There is a problem that can be easily attacked from a malicious attack because the action is achieved connectionlessly between neighbor link establishing procedure and TEK exchange procedure in mobile WiMAX even though typical 1 hop network security technique is adapted to WiMAX for satisfying these security requirement. In this paper, security connected mechanism which safely connects neighbor link establishing procedure of WiMAX and TEK exchange procedure additional to the basic function provided by IEEE 802.16e standard to satisfy security requirement of mobile WiMAX is proposed. The proposed mechanism strengthens the function of security about SS and BS by application random number and private value which generated by SS and BS to public key of neighbor link establishing procedure and TEK exchange procedure. Also, we can prevent from inside attack like man-in-the-middle which can occur in the request of TEK through cryptographic connection of neighbor link establishing procedure and TEK exchange procedure.
Keywords
WiMAX; Key Management; Security Association;
Citations & Related Records
연도 인용수 순위
  • Reference
1 WiMAX Forum NWG, 'Stage-3: Detailed Protocol and Procedures', 2007
2 IEEE 802.16e-2005, 'Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems', 2006
3 S. Xu, M. M. Matthews, and C.-T. Huang, 'Security issues in privacy and key management protocols of IEEE 802.16,' in ACM Southeast Regional Conference, R. Menezes, Ed. ACM, pp. 113-118, 2006
4 M. Barbeau, 'Wimax/802.16 threat analysis,' in Q2SWinet '05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. New York, NY, USA: ACM Press, pp. 8-15, 2005
5 A. Ghosh, D. R. J. Wolter, G. Andrews, and R. Chen, 'Broadband Wireless Access with WiMax/802.16: Current Performance Benchmarks and Future Potential', IEEE Communications Magazines, vol. 43, issue 2, pp. 129∼136. Feb. 2005
6 S. Xu and C.-T. Huang, "Attacks on PKM protocols of IEEE 802.16 and its later versions", Proceedings of the 3rd International Symposium on Wirelesss Comunication Systems (ISWCS 2006), Sep. 2006
7 S. Xu, M. Mattews and C.-T. Huang, 'Security issues in privacy and key management protocols of IEEE 802.16', Proceedings of the 44th ACM Southeast Conference(ACMSE 2006), Mar. 2006
8 IETF RFC 4285, 'Authentication Protocol for Mobile IPv6', 2006
9 D. Johnston and J. Walker, 'Overview of IEEE 802.16 Security', IEEE Security & Privacy, 2004
10 D. Sweeney, 'WiMax Operator Manual: building 802.16 Wireless Networks', Apress, 2005
11 IEEE 802.16e-2005, 'Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems', 2006
12 WiMAX Forum NWG, 'Stage-3: Detailed Protocol and Procedures' 2007
13 D. Johnston and J. Walker, 'Overview of IEEE 802.16 security,' IEEE Security & Privacy, vol. 2, no. 3, pp. 40-88, May/June 2004   DOI   ScienceOn