Towards secure wirelessMAN: Revisiting and evaluating authentication in WiMAX

Wireless communication is highly susceptible to security outbreaks with shear advancement in signal processing technology followed by immense deployment of high-speed mobile communication networks. Pitfalls in current architecture of IEEE 802.16 or Worldwide Interoperability for Microwave Access (WiMAX) have been put forth in recent literature, based on analytical reasoning and design methodologies. With identification of these vulnerabilities, some solutions have also been proposed for their rectification; however, the experimental assessment of these solutions has not been carried out in appropriate manners to justify the satisfaction of constraints. In this paper, we present a generic methodology to simulate and analyze the authentication protocols in WiMAX based on obtained results. We focus on the 1st and 2nd version of Privacy & Key Management (PKM) Protocols, which are implemented in the WiMAX architecture at present and compare their performance characteristics with another proposed solution ISNAP; which claims to eradicate most of the existing threats with introducing minimum overheads. The performance evaluation of these protocols has been carried out by simulating the behavior of BS and SS nodes in real-time wireless network using Linux based hosts. This work intends to establish the formal basis to justify the claims put forth in the specification of ISNAP against PKM v1 & v2.

[1]  Chin-Tser Huang,et al.  Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions , 2006, 2006 3rd International Symposium on Wireless Communication Systems.

[2]  Nelson Luis Saldanha da Fonseca,et al.  WiMAX Module for the ns-2 Simulator , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[3]  Sheldon M. Ross,et al.  Introduction to Probability and Statistics for Engineers and Scientists , 1987 .

[4]  Gavin Lowe A Family of Attacks upon Authentication Protocols , 1997 .

[5]  Chin-Tser Huang,et al.  Security issues in privacy and key management protocols of IEEE 802.16 , 2006, ACM-SE 44.

[6]  Bjarne E. Helvik,et al.  A module-based wireless node for NS-2 , 2006 .

[7]  Jenhui Chen,et al.  The design and implementation of WiMAX module for ns-2 simulator , 2006 .

[8]  Michel Barbeau WiMax/802.16 threat analysis , 2005, Q2SWinet '05.

[9]  Heba Kamal Aslan,et al.  WiMax Security , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).

[10]  Hao Zhou,et al.  Synchronization Issues in OFDM Systems , 2006, APCCAS 2006 - 2006 IEEE Asia Pacific Conference on Circuits and Systems.

[11]  M. Younus Javed,et al.  Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005 , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.

[12]  Khurram Saleem Alimgeer,et al.  Computational Complexities and Breaches in Authentication Frameworks of Broadband Wireless Access , 2009, ArXiv.

[13]  Arooj M. Siddiqui,et al.  Improved Secure Network Authentication Protocol (ISNAP) for IEEE 802.16 , 2009, 2009 International Conference on Information and Communication Technologies.

[14]  Michel Barbeau,et al.  Rogue-base station detection in WiMax/802.16 wireless access networks , 2006, Ann. des Télécommunications.

[15]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[16]  M. Younus Javed,et al.  Performance Analysis of Secured Privacy and Key Management Protocol in IEEE 802-16e-2005 , 2009, J. Digit. Content Technol. its Appl..

[17]  Srilekha Mudumbai,et al.  Certificate-based authorization policy in a PKI environment , 2003, TSEC.

[18]  Li Gong,et al.  A security risk of depending on synchronized clocks , 1992, OPSR.