Skip to main content

Key Management Protocol in WIMAX Revisited

  • Conference paper
Advances in Computer Science, Engineering & Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AINSC,volume 167))

Abstract

Without physical boundaries, a wireless network faces many more vulnerabilities than a wired network does. Compared to Wi-Fi, security has been included in the design of WiMAX systems at the very start. IEEE802.16 standard (WiMAX) provides a security sublayer in the MAC layer to address the privacy issues across the fixed BWA (Broadband Wireless Access). After the launch of this new standard, a number of security issues were reported in several articles. Ever since the beginning, work has been in progress for the neutralization of these identified threats.

In this paper, we first overview the IEEE802.16 standard, especially the security sublayer, and then authorization protocol PKM in WiMAX has been analyzed. We found that PKM (Privacy and Key Management) is vulnerable to replay, DoS, Man-in-the middle attacks and we propose a new methodology to prevent the authorization protocol from such attacks.

We also give a formal analysis of authentication protocol (PKMv2) and for the proposed protocol; we conclude that our proposition prevent the attacks like Denial of service (DOS), Man-in-the-middle and replay. The formal analysis has been conducted using a specialized model checker Scyther, which provides formal proofs of the security protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cremers, C.: Scyther-Semantics and verification of security protocols. PhD dissertation; Eindhoven University of technology (2006)

    Google Scholar 

  2. IEEE Std. 802.16-2001, IEEE Standard for Local and Metropolitan Area Networks Part16: Air Interface for Fixed Broadband Wireless Access Systems, IEEE 2002 (2002)

    Google Scholar 

  3. IEEE Std. 802.16-2004, IEEE Standard for Local and Metropolitan Area Networks Part16: Air Interface for Fixed Broadband Wireless Access Systems, IEEE 2004 (2004)

    Google Scholar 

  4. IEEE Std. 802.16e-2005, IEEE Standard for Local and Metropolitan Area Networks Part16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems, IEEE 2006 (2006)

    Google Scholar 

  5. Abbaci-kahya, N., Ghoualmi, N.: Security in Wimax. In: International Conference on Information Technology and e-Services, Tunisia (2011) ISBN 978-9938-9511-03

    Google Scholar 

  6. Xu, S., Huang, C.T.: Attacks on PKM protocols of IEEE 802.16 and its later versions. In: Proceedings of 3rd International Symposium on Wireless Communication Systems (ISWCS 2006), Valencia, Spain (2006)

    Google Scholar 

  7. Cremers, C.J.F.: The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414–418. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. Lang, W.-M., Wu, R.-S., Wang, J.-Q.: A Simple Key Management Scheme based on WiMAX. In: International Symposium on Computer Science and Computational Technology, IEEE 2008 (2008)

    Google Scholar 

  9. Johnston, D., Walker, J.: Overview of IEEE 802.16 security. IEEE Security and Privacy Magazine 2(3), 40–48 (2004)

    Article  Google Scholar 

  10. Altaf, A., Younus Javed, M., Ahmed, A.: Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005. College of Signals, NUST. In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, IEEE 2008 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this paper

Cite this paper

Kahya, N., Ghoualmi, N., Lafourcade, P. (2012). Key Management Protocol in WIMAX Revisited. In: Wyld, D., Zizka, J., Nagamalai, D. (eds) Advances in Computer Science, Engineering & Applications. Advances in Intelligent Systems and Computing, vol 167. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30111-7_82

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30111-7_82

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30110-0

  • Online ISBN: 978-3-642-30111-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics