Abstract
IEEE 802.16, also known as WMAN is a promising broadband wireless technology that provides a great support for Next Generation Networks (NGN). Due to the continuous evolution of new technologies and increasing diverse set of mobile users, WMAN has huge security vulnerabilities. So, there is an intrinsic need to address WMAN security and reliability pitfalls. Therefore, we propose an enhanced version of Privacy Key Management Protocol Version 2 (e-PKMv2) based security scheme for secured data transmission between the Base Station (BS) and the Subscriber Station (SS) in WMAN. For this, we introduce a new technique called Blind Key Distribution (BKD) which increases the security of Authorization Key (AK) significantly in the key management protocol. We show how the proposed e-PKMv2 ensures secure key exchange in WMAN. Finally, the performance analysis of both the existing and proposed cryptosystem is provided.
Similar content being viewed by others
References
Huang T, Chang M (2008) Responding to security issues in WMAN networks. IT Prof 10(5):15–21
Gunasekaran R, Siddharth S, Krishnaraj P, Kalaiarasan M, Uthariaraj VR (2010) Efficient algorithms to solve broadcast scheduling problem in WMAN mesh networks. Elsevier Comput Commun J 33(11):1325–1333
Lu K, Qian Y, Chen H (2007) Wireless broadband access: wMAN and beyond—a secure and service-oriented network control framework for WMAN networks. IEEE Commun Mag 45(5):124–130
Li B, Qin Y, Low CP, Gwee CL (2007) A survey on mobile WMAN [Wireless Broadband Access]. IEEE Commun Mag 45(12):70–75
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654
Xiaoyong L, Hui Z (2010) Identity-based authenticated key exchange protocols. Int Conf Educ Inf Technol (ICEIT’10) 3:85–87
IEEE Std. 802.16e-2005 (2006) IEEE standard for local and metropolitan area Networks Part16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems
Xiao-hui C, Jian-zhi D (2010) Design of SHA-1 algorithm based on FPGA. In: NSWCTC '10 Proceedings of the 2010 second international conference on Networks security, wireless communications and trusted computing, vol 1. IEEE Computer Society, Washington, DC, pp 532–534. doi:10.1109/NSWCTC.2010.131
Lowe G, Roscoe B (1997) Using CSP to detect errors in the TMN protocol. IEEE Trans Softw Eng 23(10):659–670
Aiash M, Mapp G, Lasebae A, Phan R, Loo J (2012) A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR. EURASIP J Wirel Commun Netw 1–23. doi:10.1186/1687-1499-2012-57
Kolias C, Kambourakis G, Gritzalis S (2012) Attacks and countermeasures on 802.16: analysis and assessment. In: Proceedings of IEEE communications surveys and tutorials, pp. 1–28
Sreejesh S, Sebastian MP (2010) A revised secure authentication protocol for IEEE 802.16(e). IEEE Int Conf Adv Comput Eng 34–38. doi:10.1109/ACE.2010.51
Li B, Qin Y, Low CP, Gwee CL (2007) A survey on mobile WiMAX. IEEE Commun Mag 45(12):70–75
Xu S, Huang C (2006) Attacks on PKM protocols of IEEE 802.16 and its later versions. In: IEEE 3rd international symposium wireless communication systems (ISWCS ‘06), pp. 185–189
Yang F (2011) Comparative analysis on TEK exchange between PKMv1 and PKMv2 for WMAN. IEEE Int Conf Wirel Commun Netw Mobile Comput 1–4. doi:10.1109/wicom.2011.6040271
Wei-min L, Jing-li Z, Jian-Jun L, Xiang-Yu Q (2008) Research on the authentication scheme of WiMAX. IEEE Int Conf Wirel Commun Netw Mobile Comput (WiCOM ‘08), pp 1–4. doi:10.1109/WiCom.2008.742
Xu S, Matthews M, Huang C (2006) Security issues in privacy and key management protocols of IEEE 802.16. In: ACM 44th annual southeast regional conference, pp. 113–118
Hashmi RM, Siddiqui AM, Jabeen M, Alimgeer KS (2011) Towards secure wireless MAN: revisiting and evaluating authentication in WMAN. IEEE Int Conf Comput Netw Inf Technol (ICCNIT), pp. 165–173
Kolias C, Kambourakis G, Gritzalis S (2013) Attacks and countermeasures on 802.16: analysis and assessment. IEEE Commun Surv Tutor 15(1):487–514
Rengaraju P, Lung C, Srinivasan A (2014) QoS-aware distributed security architecture for 4G multihop wireless networks. IEEE Trans Veh Technol 63(6):2886–2899
Khedr W, Abdalla MI, Elsheikh AA (2015) Enhanced inter-access service network handover authentication scheme for IEEE 802.16 m network. IET Inf Secur, pp. 334–343
Lamas PF, Ribas LC, Myndez AM, Albar JMC (2016) Evolving military broadband wireless communication systems: WiMAX, LTE and WLAN. IEEE Int Conf Military Commun Inf Syst, pp 1–8. doi:10.1109/ICMCIS.2016.7496570
Hamada RA, Ali HS, Abdalla MI (2016) An IMS-Based LTE-WiMAX-WLAN architecture with efficient mobility management. In: IEEE 18th Mediterranean Electrotechnical Conference, pp 1–6. doi:10.1109/MELCON.2016.7495434
Raja G, Sheeba BMB, Goshal D, Jayashree P (2016) Reduced overhead frequent user authentication in EAP-dependent broadbnd wireless networks. J Mobile Netw Appl (Springer) 21(3):523–538
Acknowledgements
Sheeba Backia Mary Baskaran gratefully acknowledges support from UGC-Maulana Azad National Fellowship (No. MANF-2013-14-CHR-TAM-28452). Sheeba Backia Mary Baskaran and Gunasekaran Raja gratefully acknowledge support from NGNLabs, Department of Computer Technology, Anna University, Chennai, India.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Baskaran, S.B.M., Raja, G. Blind key distribution mechanism to secure wireless metropolitan area network. CSIT 4, 157–163 (2016). https://doi.org/10.1007/s40012-016-0110-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40012-016-0110-3