Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.2.23

Specification-based Intrusion Detection System for the Initial Authentication Phase of WiBro  

Lee, Yun-Ho (Korea National Defense University)
Lee, Soo-Jin (Korea National Defense University)
Abstract
WiBro(Wireless Broadband), the service based on IEEE 802.16e(mobile WiMAX) standard, is a wireless broadband Internet technology being developed by the domestic telecommunication industry. In this paper, we analyze security vulnerabilities of WiBro focusing on initial authentication phase and propose a specification-based intrusion detection system that can detect those vulnerabilities. We first derive a specification from the normally operational process of the initial authentication based on PKMv2 EAP-AKA and formalize the derived specification as a state transition diagram. Proposed system executes the intrusion detection based on those specification and state transition diagram. In this paper, to verify the detection capability of proposed system, we construct a test bed network and execute scenario-based test.
Keywords
WiBro; Information security; Intrusion detection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Arkko and H. Haverinen, "Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement(EAP-AKA)," RFC 4187, Jan. 2006.
2 박윤옥, 최정필, 김준우, 방승재, 안지환, "4세대 이동통신 핵심기술 WiBro Evolution 시스템 개발," 전자통신동향분석, 24(3), pp. 44-53, 2009 년 6월.
3 배성수, 최동훈, 최규태, 와이브로 기술과 시스템, 세화, 2006년 8월.
4 이재일, 원유재, 지승구, 이태진, "와이브로 보안기술 해설서," 한국정보보호진흥원, 2006년 8월.
5 C.Y. Tseng, P. Balasubra-manyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt, "A Specification-Based Intrusion Detection System For AODV," 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), pp. 125-134, Oct. 2003.
6 R. Gill, J. Smith, and A. Clark, "Specification- Based Intrusion Detection in WLANs," Proceedings of the 22nd Annual Computer Security Application Conference, pp. 141-152, Dec. 2006.
7 M. Barbeau, "WiMax/802.16 Threat Analysis," Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, pp. 8-15, Oct. 2005.
8 B. Aboba, B. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz, "Extensible Authentication Protocol(EAP)," RFC 3748, June 2004.