Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations

Mobile multi-hop relay (MMR) WiMAX networks have attracted lots of interest in the wireless communication industry recently because of its scalable coverage, improved data rates and relatively low cost. However, security of MMR WiMAX networks is the main challenge. In this paper, we first identify a possible attack on MMR WiMAX networks in which a rogue base station (BS) or relay station (RS) can get authenticated and gain control over the connections. We also show that the current standard does not address this problem well. We then propose a set of new authentication protocols for protecting MMR WiMAX networks from rogue BS and rogue RS attacks. Our protocols provide centralized authentication by using a trusted authentication server to support mutual authentication between RS and BS, between RS and RS, and between MS and RS. Our protocols can also provide distributed authentication with a license issued by the trusted server.

[1]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[2]  Robert W. Heath,et al.  The future of WiMAX: Multihop relaying with IEEE 802.16j , 2009, IEEE Communications Magazine.

[3]  Adnan Shahid Khan,et al.  Efficient Distributed Authentication Key Scheme for Multi-hop Relay In IEEE 802.16j Network , 2010 .

[4]  Michel Barbeau,et al.  Rogue-base station detection in WiMax/802.16 wireless access networks , 2006, Ann. des Télécommunications.

[5]  Y. Lee,et al.  Design of hybrid authentication scheme and key distribution for mobile multi-hop relay in IEEE 802.16j , 2009, EATIS.

[6]  Xiaoyao Xie,et al.  Analysis and research of security mechanism in IEEE 802.16j , 2010, 2010 International Conference on Anti-Counterfeiting, Security and Identification.

[7]  Fan Yang,et al.  An improved security scheme in WMAN based on IEEE standard 802.16 , 2005, Proceedings. 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005..

[8]  Taeshik Shon,et al.  An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions , 2007, NBiS.

[9]  Mohamed Elsalih Anonymous and Authenticated Routing in Multi-hop Cellular Networks , 2009 .

[10]  Li Tu,et al.  An Improved Mutual Authentication Scheme in Multi-Hop WiMax Network , 2008, 2008 International Conference on Computer and Electrical Engineering.

[11]  David Johnston,et al.  Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.

[12]  Chin-Tser Huang,et al.  Security issues in privacy and key management protocols of IEEE 802.16 , 2006, ACM-SE 44.

[13]  Kaleemullah Khan,et al.  Authentication in Multi-Hop Wireless Mesh Networks , 2008 .

[14]  Chin-Tser Huang,et al.  Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions , 2006, 2006 3rd International Symposium on Wireless Communication Systems.