Key management protocol in WIMAX revisited

9Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Without physical boundaries, a wireless network faces many more vulnerabilities than a wired network does. Compared to Wi-Fi, security has been included in the design of WiMAX systems at the very start. IEEE802.16 standard (WiMAX) provides a security sublayer in the MAC layer to address the privacy issues across the fixed BWA (Broadband Wireless Access). After the launch of this new standard, a number of security issues were reported in several articles. Ever since the beginning, work has been in progress for the neutralization of these identified threats. In this paper, we first overview the IEEE802.16 standard, especially the security sublayer, and then authorization protocol PKM in WiMAX has been analyzed. We found that PKM (Privacy and Key Management) is vulnerable to replay, DoS, Man-in-the middle attacks and we propose a new methodology to prevent the authorization protocol from such attacks. We also give a formal analysis of authentication protocol (PKMv2) and for the proposed protocol; we conclude that our proposition prevent the attacks like Denial of service (DOS), Man-in-the-middle and replay. The formal analysis has been conducted using a specialized model checker Scyther, which provides formal proofs of the security protocol. © 2012 Springer-Verlag GmbH.

Cite

CITATION STYLE

APA

Kahya, N., Ghoualmi, N., & Lafourcade, P. (2012). Key management protocol in WIMAX revisited. In Advances in Intelligent and Soft Computing (Vol. 167 AISC, pp. 853–862). https://doi.org/10.1007/978-3-642-30111-7_82

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free