Security authentication protocol for WiMAX wireless network based on protocol composition logic

被引:0
|
作者
Feng T. [1 ,2 ,3 ]
Zhang Z.-B. [1 ]
Ma J.-F. [2 ]
机构
[1] School of Computer and Communication, Lanzhou University of Technology
[2] Key Laboratory of Computer Networks and Information Security of Ministry of Education, Xidian University
[3] Key Lab. of the Network Security and Cryptology, Fujian Normal University
关键词
Authentication protocol; Protocol composition logic (PCL); Protocol derivation system (PDS); WiMAX; Wireless network;
D O I
10.3724/SP.J.1146.2009.01191
中图分类号
学科分类号
摘要
IEEE 802.16e-2005 standard's PKMv2 protocol is an important secure guarantee for WiMAX (Worldwide Interoperability for Microwave Access) wireless network. In this paper, based on Protocol Composition Logic (PCL), the PKMv2 authentication protocol's security is analyzed, the interleaving attack is found, and a new authentication protocol is proposed by using the Protocol Derivation System (PDS) in WiMAX wireless network based on the vulnerability of system security, finally a formal correctness and security proof of it is presented with Protocol Composition Logic (PCL). This new protocol is more secure than the PKMv2 security authentication protocol, and more suitable for complicated wireless network application environment used in WiMAX.
引用
收藏
页码:2106 / 2111
页数:5
相关论文
共 18 条
  • [1] Yarali A., Rahman S., WiMAX broadband wireless access technology: Services, architecture and deployment models, Electrical and Computer Engineering, CCECE, pp. 77-82, (2008)
  • [2] Air interface for fixed broadband wireless access systems, Amendment 2: Physical and medium access control layers for combined fixed and mobile operation in licensed bands, (2006)
  • [3] Kim D., Cai H., Na M., Et al., Performance measurement over Mobile WiMAX/IEEE 802.16e network, IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, pp. 1-8, (2008)
  • [4] Agrawal Dharma P., Hrishikesh G., Dave C., Et al., Recent advances and evolution of WLAN and WMAN standards, IEEE Wireless Communications, pp. 54-55, (2008)
  • [5] Johnston D., Walker J., Mutual authentication for PKMv2, (2004)
  • [6] Liu F.-Q., Lu L., A WPKI-Based security mechanism for IEEE 802.16e, WiCOM International Conference, pp. 1-4, (2006)
  • [7] Sun H.-M., Lin Y.-H., Chen S.-M., Et al., Secure and fast handover scheme based on pre-authentication method for 802.16/WiMAX infrastructure networks, IEEE Region 10 Conference, pp. 1-4, (2007)
  • [8] Taeshik S., Wook C., An analysis of mobile WiMAX security: Vulnerabilities and solutions, Lecture Notes in Computer Science, 4658, pp. 88-97, (2007)
  • [9] Xu S., Huang C.-T., Attacks on PKM protocols of IEEE 802.16 and its later versions, Proceedings of 3rd International Symposium on Wireless Communication System (ISWCS), pp. 185-189, (2006)
  • [10] Datta A., Security analysis of network protocols: Compositional reasoning and complexity-theoretic Foundations, (2005)