Skip to main content
Log in

Blind key distribution mechanism to secure wireless metropolitan area network

  • Special Issue REDSET 2016 of CSIT
  • Published:
CSI Transactions on ICT Aims and scope Submit manuscript

Abstract

IEEE 802.16, also known as WMAN is a promising broadband wireless technology that provides a great support for Next Generation Networks (NGN). Due to the continuous evolution of new technologies and increasing diverse set of mobile users, WMAN has huge security vulnerabilities. So, there is an intrinsic need to address WMAN security and reliability pitfalls. Therefore, we propose an enhanced version of Privacy Key Management Protocol Version 2 (e-PKMv2) based security scheme for secured data transmission between the Base Station (BS) and the Subscriber Station (SS) in WMAN. For this, we introduce a new technique called Blind Key Distribution (BKD) which increases the security of Authorization Key (AK) significantly in the key management protocol. We show how the proposed e-PKMv2 ensures secure key exchange in WMAN. Finally, the performance analysis of both the existing and proposed cryptosystem is provided.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Huang T, Chang M (2008) Responding to security issues in WMAN networks. IT Prof 10(5):15–21

    Article  Google Scholar 

  2. Gunasekaran R, Siddharth S, Krishnaraj P, Kalaiarasan M, Uthariaraj VR (2010) Efficient algorithms to solve broadcast scheduling problem in WMAN mesh networks. Elsevier Comput Commun J 33(11):1325–1333

    Article  Google Scholar 

  3. Lu K, Qian Y, Chen H (2007) Wireless broadband access: wMAN and beyond—a secure and service-oriented network control framework for WMAN networks. IEEE Commun Mag 45(5):124–130

    Article  Google Scholar 

  4. Li B, Qin Y, Low CP, Gwee CL (2007) A survey on mobile WMAN [Wireless Broadband Access]. IEEE Commun Mag 45(12):70–75

    Article  Google Scholar 

  5. Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    Article  MathSciNet  MATH  Google Scholar 

  6. Xiaoyong L, Hui Z (2010) Identity-based authenticated key exchange protocols. Int Conf Educ Inf Technol (ICEIT’10) 3:85–87

    Google Scholar 

  7. IEEE Std. 802.16e-2005 (2006) IEEE standard for local and metropolitan area Networks Part16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems

  8. Xiao-hui C, Jian-zhi D (2010) Design of SHA-1 algorithm based on FPGA. In: NSWCTC '10 Proceedings of the 2010 second international conference on Networks security, wireless communications and trusted computing, vol 1. IEEE Computer Society, Washington, DC, pp 532–534. doi:10.1109/NSWCTC.2010.131

  9. Lowe G, Roscoe B (1997) Using CSP to detect errors in the TMN protocol. IEEE Trans Softw Eng 23(10):659–670

    Article  Google Scholar 

  10. Aiash M, Mapp G, Lasebae A, Phan R, Loo J (2012) A formally verified AKA protocol for vertical handover in heterogeneous environments using Casper/FDR. EURASIP J Wirel Commun Netw 1–23. doi:10.1186/1687-1499-2012-57

  11. Kolias C, Kambourakis G, Gritzalis S (2012) Attacks and countermeasures on 802.16: analysis and assessment. In: Proceedings of IEEE communications surveys and tutorials, pp. 1–28

  12. Sreejesh S, Sebastian MP (2010) A revised secure authentication protocol for IEEE 802.16(e). IEEE Int Conf Adv Comput Eng 34–38. doi:10.1109/ACE.2010.51

  13. Li B, Qin Y, Low CP, Gwee CL (2007) A survey on mobile WiMAX. IEEE Commun Mag 45(12):70–75

  14. Xu S, Huang C (2006) Attacks on PKM protocols of IEEE 802.16 and its later versions. In: IEEE 3rd international symposium wireless communication systems (ISWCS ‘06), pp. 185–189

  15. Yang F (2011) Comparative analysis on TEK exchange between PKMv1 and PKMv2 for WMAN. IEEE Int Conf Wirel Commun Netw Mobile Comput 1–4. doi:10.1109/wicom.2011.6040271

  16. Wei-min L, Jing-li Z, Jian-Jun L, Xiang-Yu Q (2008) Research on the authentication scheme of WiMAX. IEEE Int Conf Wirel Commun Netw Mobile Comput (WiCOM ‘08), pp 1–4. doi:10.1109/WiCom.2008.742

  17. Xu S, Matthews M, Huang C (2006) Security issues in privacy and key management protocols of IEEE 802.16. In: ACM 44th annual southeast regional conference, pp. 113–118

  18. Hashmi RM, Siddiqui AM, Jabeen M, Alimgeer KS (2011) Towards secure wireless MAN: revisiting and evaluating authentication in WMAN. IEEE Int Conf Comput Netw Inf Technol (ICCNIT), pp. 165–173

  19. Kolias C, Kambourakis G, Gritzalis S (2013) Attacks and countermeasures on 802.16: analysis and assessment. IEEE Commun Surv Tutor 15(1):487–514

    Article  Google Scholar 

  20. Rengaraju P, Lung C, Srinivasan A (2014) QoS-aware distributed security architecture for 4G multihop wireless networks. IEEE Trans Veh Technol 63(6):2886–2899

    Article  Google Scholar 

  21. Khedr W, Abdalla MI, Elsheikh AA (2015) Enhanced inter-access service network handover authentication scheme for IEEE 802.16 m network. IET Inf Secur, pp. 334–343

  22. Lamas PF, Ribas LC, Myndez AM, Albar JMC (2016) Evolving military broadband wireless communication systems: WiMAX, LTE and WLAN. IEEE Int Conf Military Commun Inf Syst, pp 1–8. doi:10.1109/ICMCIS.2016.7496570

  23. Hamada RA, Ali HS, Abdalla MI (2016) An IMS-Based LTE-WiMAX-WLAN architecture with efficient mobility management. In: IEEE 18th Mediterranean Electrotechnical Conference, pp 1–6. doi:10.1109/MELCON.2016.7495434

  24. Raja G, Sheeba BMB, Goshal D, Jayashree P (2016) Reduced overhead frequent user authentication in EAP-dependent broadbnd wireless networks. J Mobile Netw Appl (Springer) 21(3):523–538

    Article  Google Scholar 

Download references

Acknowledgements

Sheeba Backia Mary Baskaran gratefully acknowledges support from UGC-Maulana Azad National Fellowship (No. MANF-2013-14-CHR-TAM-28452). Sheeba Backia Mary Baskaran and Gunasekaran Raja gratefully acknowledge support from NGNLabs, Department of Computer Technology, Anna University, Chennai, India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sheeba Backia Mary Baskaran.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Baskaran, S.B.M., Raja, G. Blind key distribution mechanism to secure wireless metropolitan area network. CSIT 4, 157–163 (2016). https://doi.org/10.1007/s40012-016-0110-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40012-016-0110-3

Keywords

Navigation