Security enhancements in WiMAX mesh networks

In WiMAX mesh networks, security is a vital requirement to prevent the threats from the malicious attacks. To join an active mesh network securely, a Candidate Node (CN) needs to perform a Network Entry Process (NEP) to complete authentication and registration. However, most studies have shown that NEP is vulnerable to different type of attacks. Recently, a solution of NEP with Reliable Counter (NEPRC) scheme has been proposed to claims that it can overcome selfish behaviors of Sponsor Nodes (SNs) and the topological attacks. In this paper, we discover that the scheme is unable to detect the topological threats. We analyze the vulnerabilities of the NEPRC scheme and propose an improved solution to detect and prevent the topological attacks including wormhole attacks and sinkhole attacks completely. Our analysis by Color Petri Net (CPN) shows that the proposed scheme could withstand the two topological attacks.

[1]  Yusun Chang,et al.  A Security Scheme for Centralized Scheduling in IEEE 802.16 Mesh Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[2]  Michel Barbeau WiMax/802.16 threat analysis , 2005, Q2SWinet '05.

[3]  M.-A. Jabri,et al.  Network entry process security in IEEE 802.16 mesh mode , 2008, 2008 1st IFIP Wireless Days.

[4]  A.E. Samhat,et al.  Security and AAA Architecture for WiFi-WiMAX Mesh Network , 2007, 2007 4th International Symposium on Wireless Communication Systems.

[5]  Fan Yang Security Analysis and Improvement for Mesh Mode in IEEE802.16 , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.

[6]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[7]  Chin-Tser Huang,et al.  Security issues in privacy and key management protocols of IEEE 802.16 , 2006, ACM-SE 44.

[8]  Lars Michael Kristensen,et al.  Coloured Petri Nets - Modelling and Validation of Concurrent Systems , 2009 .

[9]  Satbir Jain,et al.  Detection and prevention of wormhole attack in mobile adhoc networks , 2009 .

[10]  Yuguang Fang,et al.  Security of IEEE 802.16 in Mesh Mode , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.