Security and Energy Analysis on Revised Mutual Authentication Protocol in WiMAX Networks

  • Jayashree PadmanabhanEmail author
  • Gunavathie Mariappan
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 4)


With emerging wireless technologies, ensuring security is challenging due to limited energy availability in the wireless devices. As WiMAX-based wireless access has been one of the base technologies in IoT and next-generation technologies, access and authentication, which are the major concerns for consumers and buyers of these wireless technologies, need to be addressed. In this paper, energy-efficient generalized digital certificate (GDC)-based mutual authentication protocol is proposed. The efficiency of the proposed work in defending attacks such as man-in-the-middle attack and rogue base station problem is analyzed. The analysis on energy efficiency of the proposed work is found to be quite appealing, compared to existing mutual authentication procedures in WiMAX.


Mutual authentication Digital signature Energy efficiency WiMAX networks WiMAX security 


  1. 1.
    Lang Wei-min, Wu Run-sheng jian-qiu, “A simple key management scheme based on WiMAX”, in Proc of International Symposium on Computer Science and Computational Technology, December 2008, pp. 3–6.Google Scholar
  2. 2.
    Fan Yang, Huaibei Zhou, Lan Zhang & Jin Feng, “An improved security scheme in WMAN based on IEEE standard 802.16”, In proc. of Wireless Communications, Networking and Mobile Computing, September 2005, pp. 1191–1194.Google Scholar
  3. 3.
    EvrenEren. “WiMAX security architecture: analysis and assessment,” in Proc. Of 4th International Workshop on Intelligent data Acquisition and Advanced Computing Systems: Technology and Applications, September 2007, pp. 673–677.Google Scholar
  4. 4.
    IEEE standard 802.16-2004. Air Interface for Fixed Broadband wireless Access Systems. IEEE Press, 2004.Google Scholar
  5. 5.
    Mahmoud Nasreldin, Asian H, El-Hennawy M & El-Hennawy, “WiMAX Security”, In Proc of 22nd International conferences on advanced Information Networking and Applications, pp. 1335–1340, March 2008.Google Scholar
  6. 6.
    SreejeshSidharth & M.P. Sebastian, “A revised secure authentication protocol for ieee 802.16 (e)”, in Proc of International Conference on Advances in Computer Engineering, pp. 34–38, June 2010.Google Scholar
  7. 7.
    Fuden Tshering & Anjali Sardana, A proxy base station based authentication Proc of International Conference on Recent Trends in Information Technology, MIT, Anna University, Chennai, June 2011, pp. 578–582.Google Scholar
  8. 8.
    Hashmi R.M, Siddiqui A.M, Jabeen M, Shehzad K., Zubair A and Alimgeer K.S, “Improved secure network authentication protocol for ieee 802.16”, in Proc of International Conference on Information and Communication Technologies, August 2009, pp. 101–105.Google Scholar
  9. 9.
    X. Jin et al., “An improved mutual authentication scheme in multihop WiMAX network,” in Proc. of International Conference on Computer and Electrical Engineering, Dec. 2008, pp. 296–299.Google Scholar
  10. 10.
    Jie Huang, Chin-Tser Huang, “Secure Mutual Authentication Protocols for Mobile Multi-hop Relay WiMAX Networks against Rogue Base/Relay Stations” in Proc of International Conference on Communications, 2011.Google Scholar
  11. 11.
    AlaaedineChouchane, Slim Rekhis, and Noureddine, “Defending against rogue base station attacks using wavelet based finger printing”, Technical report, Networks and Security Research Lab, University of Carthage. Tunisia, 2009.Google Scholar
  12. 12.
    Vinod K.J., Vrijendra S., “Mobile WiMAX Network Security Threats and Solutions: A Survey,” in Proc. IEEE International Conference on Computer and Communication Technology, 2014, pp. 135–140.Google Scholar
  13. 13.
    Lang Wei-min, Zhong Jing-li, Li Jian-jun, Qi Xiang-yu “Research on authentication scheme of WiMAX”, in Proc of 4th International Conference on Wireless Communications, networking and Mobile Computing, 2008. WiCOM ‘08.Google Scholar
  14. 14.
    LeinHarn&JianRen, “Generalized digital certificate for user authentication and key establishment for secure communications”, IEEE Trans. Wireless Communications., 2011, 10(7), pp. 2372–2379.Google Scholar
  15. 15.
    Taher Elgamal, “A public key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Trans. Information theory., 1985, 31(4), pp. 469–472.Google Scholar
  16. 16.
    RafalChrabaszcz, PiotrPacyna, “Fast re-authentication of mobile devices with EAP Re-authentication Protocol (ERP),”. In Proc. IEEE XVth International Conference on Telecommunications Network Strategy and Planning Symposium (NETWORKS), 2012, pp. 1–6.Google Scholar
  17. 17.
    Lai Chengzhe, Li Hui, Zhang Yueyu, Cao Jin, “Simple and Low-Cost Re-Authentication Protocol for HeNB,” China Communication, 10(1):, 2013, pp. 105–115.Google Scholar
  18. 18.
    Chrabaszcz R., Pacyna P., “Fast re-authentication of mobile devices with EAP Re-authentication Protocol (ERP).” in Proc. IEEE XVth International Conference on Telecommunications Network Strategy and Planning, 2012, pp. 1–6.Google Scholar
  19. 19.
    Raja G, Baskaran S.B, Ghosal D, Padmanabhan J. Reduced Overhead Frequent User Authentication in EAP-Dependent Broadband Wireless Networks. Mobile Networks and Applications. 2016, pp. 1–16.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of Computer TechnologyMIT Campus of Anna UniversityChennaiIndia

Personalised recommendations