Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2009.16-C.2.257

A Light-weight PKM Mutual Authentication Protocol for Improving Initial Authentication in WiMAX  

Jeong, Yoon-Su (충북대학교 전자계산학과)
Kim, Yong-Tae (한남대학교 멀티미디어학부)
Park, Gil-Cheol (한남대학교 멀티미디어학부)
Lee, Sang-Ho (충북대학교 전기전자컴퓨터공학부)
Abstract
Now a days, as increased the use of mobile units like a laptop computer and PDA, the demand for high speed internet service is increasing. On the other hand, PKMv2 which is provided from IEEE 802.16e cannot support fully on the security of high speed internet service. This paper proposes light-weight mutual authentication protocol which solved security problem of PKMv2 related to integrity of mobile node for transmission of safe high speed data of mobile node operating in mobile WiMAX environment. Proposed mutual authentication protocol increases the efficiency as the user in network can move in network safely without additional procedure of authentication between subscriber and base station after user's initial authentication. Also, the proposed mutual authentication protocol is safe from the security attack (the man-in-the-middle attack and reply attack) between subscriber and base station by generating a key adopt to PRF() function using random number and secret value in order to secure certification.
Keywords
WiMAX; Mutual Authentication; PKM; Security Attack;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 IEEE 802.16e-2005, 'Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems', 2006
2 D. Johnston and J. Walker, 'Overview of IEEE 802.16 Security', IEEE Security & Privacy, 2004   DOI   ScienceOn
3 S. Xu and C.-T. Huang, 'Attacks on PKM protocols of IEEE 802.16 and its later versions', Proceedings of the 3rd International Symposium on Wireless Comunication Systems (ISWCS 2006), Sep., 2006
4 IETF RFC 4285, 'Authentication Protocol for Mobile IPv6', 2006
5 S. Xu, M. Mattews and C.-T. Huang, 'Security issues in privacy and key management protocols of IEEE 802.16', Proceedings of the 44th ACM Southeast Conference (ACMSE 2006), Mar., 2006
6 WiMAX Forum NWG, 'Stage-3: Detailed Protocol and Procedures', 2007
7 T. Janevski, 'Traffic analysis and design of wireless IP networks', Artech House, pp.186-190, 2003
8 TTAS.KO-06.0065R1, '2.3GHz 휴대인터넷 표준 메체접근제어 계층', 2004년
9 김대익, 이상호, 김영진, 'WiBro/Mobile WiMAX 이동성 기술', 한국정보과학회, 제25권, 제4호, 2007년 4월, pp.5-14   과학기술학회마을
10 D. Sweeney, 'WiMax Operator Manual: building 802.16 Wireless Networks', Apress, 2005
11 A. Mishra, M. Shin, and W. Arbaugh, 'pro-active Key Distribution using neighbor Graphs', IEEE Wireless Communication, Vol.11, Feb., 2004   DOI   ScienceOn
12 KISA, '와이브로 인증, 키 관리 기술동향', 정보보호뉴스, 2006년 6월
13 M. Kassb, A. Belghith, J. M. Bonnin and S. Sassi, 'Fast Pre-Authentication Based on Proactive Key Distribution for 802.11 Infrastructure Networks', In Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling, pp.46-53, 2005
14 D. Johnston and J. Walker, 'Overview of IEEE 802.16 security,' IEEE Security & Privacy, Vol.2, No.3, pp.40-88, May/June, 2004   DOI   ScienceOn
15 S. Xu, M. M. Matthews, and C.-T. Huang, 'Security issues in privacy and key management protocols of IEEE 802.16,' in ACM Southeast Regional Conference, R. Menezes, Ed. ACM, pp.113-118, 2006
16 M. Barbeau, 'Wimax/802.16 threat analysis,' in Q2SWinet '05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. New York, NY, USA: ACM Press, pp.8-15, 2005
17 A. Ghosh, D. R. J. Wolter, G. Andrews, and R. Chen, 'Broadband Wireless Access with WiMax/802.16: Current Performance Benchmarks and Future Potential', IEEE Communications Magazines, Vol.43, Issue2, pp.129-136. Feb., 2005   DOI   ScienceOn