Analysis of Attacks in Authentication Protocol of IEEE 802.16e

Security support in wireless systems is a vital necessity to protect users and network in some applications. Since wireless media are available to all, attackers can easily reach the network and network will be more vulnerable for users and service providers of the network. This article discusses on the analysis of PKM (Privacy Key Management) protocols and its second version (PKMv2) which has been proposed after publication of IEEE 802.16e. This protocol is vulnerable against some attacks. In this article, standard security sub layer (IEEE 802.16) is first studied and then, WiMAX authentication protocol is explained. Finally, possible attacks to PKM Protocol in IEEE 802.16 will be studied. Also, solutions presented against relevant attacks are explained. Analysis of security mechanisms in authentication protocol and comparing between them is the main objective of this paper. In fact, this paper can be used as guidelines for the future research activities and security of WiMAX.

[1]  Cai Yi,et al.  Re-Authentication Design for PKMv2 of IEEE 802.16e Standard , 2010, 2010 International Conference on Computational Intelligence and Software Engineering.

[2]  Chin-Tser Huang,et al.  Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions , 2006, 2006 3rd International Symposium on Wireless Communication Systems.

[3]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[4]  Mir Md. Saki Kowsar,et al.  Shared key vulnerability in IEEE 802.16e: Analysis & solution , 2010, 2010 13th International Conference on Computer and Information Technology (ICCIT).

[5]  Chris Mitchell,et al.  Security defects in CCITT recommendation X.509: the directory authentication framework , 1990, CCRV.

[6]  Rakesh Kumar Jha,et al.  A Journey on WiMAX and its Security Issues , 2010 .

[7]  Rajesh Srivastava,et al.  Prevention of Security Threats in IEEE 802.16 Standards , 2011 .

[8]  Michel Barbeau WiMax/802.16 threat analysis , 2005, Q2SWinet '05.

[9]  Martín Abadi,et al.  Prudent engineering practice for cryptographic protocols , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[10]  Fan Yang Comparative Analysis on TEK Exchange between PKMv1 and PKMV2 for WiMAX , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[11]  Yi Qu,et al.  Analysis on mobile WiMAX security , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).

[12]  David Johnston,et al.  Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.

[13]  Pero Latkoski,et al.  IEEE 802.16 Security Issues: A Survey , 2008 .