Improving Security Levels of IEEE 802.16e Authentication By Diffie-Hellman Method

In this paper, we proposed an authentication method according to Diffie-Hellman. First, we introduce different methods for authentication in IEEE.802.16 then we proposed an authentication method according to Diffie-Hellman and in the last we compare different methods for authentication to improve security in IEEE802.16e. CPN is a useful for simulation and compare protocol together so we use CPN tools in this paper..

[1]  Ahmed Taha,et al.  Formal Verification of IEEE 802.16 Security Sublayer Using Scyther Tool , 2009 .

[2]  Ender Yuksel,et al.  Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis , 2007 .

[3]  Nan Li,et al.  Research on Diffie-Hellman key exchange protocol , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[4]  Pero Latkoski,et al.  IEEE 802.16 Security Issues: A Survey , 2008 .

[5]  Wuu Yang,et al.  A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity , 2009, 2009 IEEE International Conference on Communications.

[6]  Marko Hölbl,et al.  An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key Exchange , 2009, 2009 International Conference on Availability, Reliability and Security.

[7]  Lars Michael Kristensen,et al.  Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems , 2007, International Journal on Software Tools for Technology Transfer.

[8]  Lei Han,et al.  A Threat Analysis of The Extensible Authentication Protocol , 2006 .

[9]  Jie Huang,et al.  Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations , 2011, 2011 IEEE International Conference on Communications (ICC).

[10]  Liang Jin,et al.  The Design of Trusted Access Scheme Based on Identity for WiMAX Network , 2009, 2009 First International Workshop on Education Technology and Computer Science.

[11]  Xiaoyao Xie,et al.  Verification and research of a Wimax authentication protocol based on SSM , 2010, 2010 2nd International Conference on Education Technology and Computer.

[12]  Fang-Yie Leu,et al.  Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS , 2011, J. Univers. Comput. Sci..

[13]  M.P. Sebastian,et al.  A Revised Secure Authentication Protocol for IEEE 802.16 (e) , 2010, 2010 International Conference on Advances in Computer Engineering.