Privacy preserving mutual authentication in WiMAX

A wireless network is more vulnerable than a wired network due to the broadcast nature of wireless medium. The nodes in a WiMAX network require authentication over this shared wireless channels. The existing EAP authentication mechanism requires multiple message exchanges and is not privacy preserving. In this work, an infrastructure aided mechanism for mutual authentication of a node and base station that preserves the privacy of the node is proposed for WiMAX networks. Simulation results indicate that the performance of the proposed protocol satisfies the needs and constraints of WiMAX network. The time taken for authentication is in the order of milliseconds which constitutes only in one transaction between node and base station.

[1]  David Johnston,et al.  Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.

[2]  Chung-Horng Lung,et al.  Measuring and Analyzing WiMAX Security and QoS in Testbed Experiments , 2011, 2011 IEEE International Conference on Communications (ICC).

[3]  Michel Barbeau WiMax/802.16 threat analysis , 2005, Q2SWinet '05.

[4]  Heba Kamal Aslan,et al.  WiMax Security , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).

[5]  Jie Huang,et al.  Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations , 2011, 2011 IEEE International Conference on Communications (ICC).

[6]  Songwu Lu,et al.  Securing a Wireless World , 2006, Proceedings of the IEEE.

[7]  Mahmoud Al-Qutayri,et al.  Security and Privacy of Intelligent VANETs , 2010 .

[8]  Raheel M. Hashmi,et al.  Towards secure wirelessMAN: Revisiting and evaluating authentication in WiMAX , 2011, International Conference on Computer Networks and Information Technology.

[9]  Yi Yang,et al.  Toward Wimax Security , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.

[10]  Y. Lee,et al.  Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j , 2009, EATIS.

[11]  Masood Ahmad,et al.  A Review of Some Security Aspects of WiMAX and Converged Network , 2010, 2010 Second International Conference on Communication Software and Networks.

[12]  Sherali Zeadally,et al.  A Proposed Authentication Protocol for Mobile Users of WiMAX Networks , 2010, 2010 3rd International Conference on Human-Centric Computing.

[13]  Yi Qu,et al.  Analysis on mobile WiMAX security , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).

[14]  Srilekha Mudumbai,et al.  Certificate-based authorization policy in a PKI environment , 2003, TSEC.

[15]  Adnan Shahid Khan,et al.  Efficient Distributed Authentication Key Scheme for Multi-hop Relay In IEEE 802.16j Network , 2010 .

[16]  Brijesh Kumar Chaurasia,et al.  Infrastructure Aided Privacy Preserving-Authentication in VANETs , 2010, ISA.