Security protocols in wirelessman

This dissertation overviews the IEEE 802.16 standard and analyzes the vulnerabilities in its security protocols. Various attacks are found in all versions of the Privacy and Key Management (PKM) protocols which are designed in the security sublayer of IEEE 802.16 MAC layer. Those typical attacks include the man-in-the-middle attack on PKMv1, the Simple Replay attack and the Multiplicity attack on PKMv1, Intel-Nonce version and PKMv2, and the Interleaving attack on PKMv2. We propose counter-attack solutions and present revised protocols that resist to those attacks. Some other security issues are also addressed, such as secure roaming protocols. Secure multicast is further studied and the weakness of the Multicast and Broadcast Rekeying Algorithm (MBRA) in IEEE 802.16e is addressed. We revised MBRA as a more efficient protocol for Intra-BS multicast. We also proposed Adaptive Inter-BS multicast protocol which takes advantage of several popular secure multicast protocols. Furthermore, we designed a family of secure multicast protocols for handover procedures in WiMAX. We also perform formal analysis and verification on those PKM protocols using several popular formal methods, including BAN logic, extended MB logic, and CasperFDR. Most of the attacks we found before have been rediscovered using those methods and the revised protocols are verified to be correct and safe from known attacks.

[1]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Architecture , 1997, RFC.

[2]  Rajashekar Kailar,et al.  Accountability in Electronic Commerce Protocols , 1996, IEEE Trans. Software Eng..

[3]  Sushil Jajodia,et al.  Kronos: a scalable group re-keying approach for secure multicast , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[4]  Tony Ballardie,et al.  Scalable Multicast Key Distribution , 1996, RFC.

[5]  Steve A. Schneider Security properties and CSP , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[6]  Catherine A. Meadows,et al.  The NRL Protocol Analyzer: An Overview , 1996, J. Log. Program..

[7]  Catherine A. Meadows,et al.  Applying Formal Methods to the Analysis of a Key Management Protocol , 1992, J. Comput. Secur..

[8]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[9]  Chin-Tser Huang,et al.  Secure Multicast in WiMAX , 2008, J. Networks.

[10]  Wenbo Mao,et al.  An augmentation of BAN-like logics , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.

[11]  John C. Mitchell,et al.  Analysis of Security Protocols for Wireless Networks , 2005 .

[12]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[13]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[14]  Gavin Lowe Casper: a compiler for the analysis of security protocols , 1998 .

[15]  S. Brackin,et al.  CAPSL interface for the NRL Protocol Analyzer , 1999, Proceedings 1999 IEEE Symposium on Application-Specific Systems and Software Engineering and Technology. ASSET'99 (Cat. No.PR00122).

[16]  Catherine A. Meadows,et al.  Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer , 2004, J. Comput. Secur..

[17]  Chin-Tser Huang,et al.  Security issues in privacy and key management protocols of IEEE 802.16 , 2006, ACM-SE 44.

[18]  Nathalie Weiler,et al.  The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..

[19]  Martín Abadi,et al.  A semantics for a logic of authentication (extended abstract) , 1991, PODC '91.

[20]  Chin-Tser Huang,et al.  Secure multicast in various scenarios of WirelessMAN , 2007, Proceedings 2007 IEEE SoutheastCon.

[21]  Catherine A. Meadows,et al.  Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches , 1996, ESORICS.

[22]  Giovanni Maria Sacco,et al.  Timestamps in key distribution protocols , 1981, CACM.

[23]  Dawn Xiaodong Song,et al.  Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis , 2001, J. Comput. Secur..

[24]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[25]  Dieter Gollmann On the Verification of Cryptographic Protocols - A Tale of Two Committees , 2000, Electron. Notes Theor. Comput. Sci..

[26]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[27]  Stephen H. Brackin,et al.  A HOL extension of GNY for automatically analyzing cryptographic protocols , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[28]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[29]  David Johnston,et al.  Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.

[30]  Jonathan K. Millen,et al.  Three systems for cryptographic protocol analysis , 1994, Journal of Cryptology.

[31]  Sandeep S. Kulkarni,et al.  Adaptive Rekeying for Secure Multicast , 2003 .

[32]  Catherine A. Meadows,et al.  Formal methods for cryptographic protocol analysis: emerging issues and trends , 2003, IEEE J. Sel. Areas Commun..

[33]  Ashok Samal,et al.  Scalable secure one-to-many group communication using dual encryption , 2000, Comput. Commun..

[34]  Michael Goldsmith,et al.  Modelling and analysis of security protocols , 2001 .

[35]  S. Wang,et al.  IEEE standard 802.16: a technical overview of the WirelessMAN/sup TM/ air interface for broadband wireless access , 2002, IEEE Communications Magazine.

[36]  Paul F. Syverson,et al.  On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[37]  Mihir Bellare,et al.  Entity Authentication and Key Distribution , 1993, CRYPTO.

[38]  Richard A. Kemmerer Using Formal Verification Techniques to Analyze Encryption Protocols , 1987, 1987 IEEE Symposium on Security and Privacy.

[39]  Gavin Lowe A Family of Attacks upon Authentication Protocols , 1997 .

[40]  C. A. R. Hoare,et al.  Communicating sequential processes , 1978, CACM.

[41]  John C. Mitchell,et al.  Automated analysis of cryptographic protocols using Mur/spl phi/ , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[42]  Ender Yuksel,et al.  Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis , 2007 .

[43]  Chong-kwon Kim,et al.  A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access , 2005, International Conference on Computational Science.

[44]  A. W. Roscoe Modelling and verifying key-exchange protocols using CSP and FDR , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.

[45]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[46]  Gavin Lowe,et al.  Analysing a Stream Authentication Protocol Using Model Checking , 2002, ESORICS.

[47]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[48]  Martín Abadi,et al.  Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..

[49]  Dieter Gollmann What do we mean by entity authentication? , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[50]  Jonathan K. Millen,et al.  The Interrogator: Protocol Secuity Analysis , 1987, IEEE Transactions on Software Engineering.

[51]  Paul C. van Oorschot,et al.  Extending cryptographic logics of belief to key agreement protocols , 1993, CCS '93.