Abstract
With emerging wireless technologies, ensuring security is challenging due to limited energy availability in the wireless devices. As WiMAX-based wireless access has been one of the base technologies in IoT and next-generation technologies, access and authentication, which are the major concerns for consumers and buyers of these wireless technologies, need to be addressed. In this paper, energy-efficient generalized digital certificate (GDC)-based mutual authentication protocol is proposed. The efficiency of the proposed work in defending attacks such as man-in-the-middle attack and rogue base station problem is analyzed. The analysis on energy efficiency of the proposed work is found to be quite appealing, compared to existing mutual authentication procedures in WiMAX.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lang Wei-min, Wu Run-sheng jian-qiu, “A simple key management scheme based on WiMAX”, in Proc of International Symposium on Computer Science and Computational Technology, December 2008, pp. 3–6.
Fan Yang, Huaibei Zhou, Lan Zhang & Jin Feng, “An improved security scheme in WMAN based on IEEE standard 802.16”, In proc. of Wireless Communications, Networking and Mobile Computing, September 2005, pp. 1191–1194.
EvrenEren. “WiMAX security architecture: analysis and assessment,” in Proc. Of 4th International Workshop on Intelligent data Acquisition and Advanced Computing Systems: Technology and Applications, September 2007, pp. 673–677.
IEEE standard 802.16-2004. Air Interface for Fixed Broadband wireless Access Systems. IEEE Press, 2004.
Mahmoud Nasreldin, Asian H, El-Hennawy M & El-Hennawy, “WiMAX Security”, In Proc of 22nd International conferences on advanced Information Networking and Applications, pp. 1335–1340, March 2008.
SreejeshSidharth & M.P. Sebastian, “A revised secure authentication protocol for ieee 802.16 (e)”, in Proc of International Conference on Advances in Computer Engineering, pp. 34–38, June 2010.
Fuden Tshering & Anjali Sardana, A proxy base station based authentication Proc of International Conference on Recent Trends in Information Technology, MIT, Anna University, Chennai, June 2011, pp. 578–582.
Hashmi R.M, Siddiqui A.M, Jabeen M, Shehzad K., Zubair A and Alimgeer K.S, “Improved secure network authentication protocol for ieee 802.16”, in Proc of International Conference on Information and Communication Technologies, August 2009, pp. 101–105.
X. Jin et al., “An improved mutual authentication scheme in multihop WiMAX network,” in Proc. of International Conference on Computer and Electrical Engineering, Dec. 2008, pp. 296–299.
Jie Huang, Chin-Tser Huang, “Secure Mutual Authentication Protocols for Mobile Multi-hop Relay WiMAX Networks against Rogue Base/Relay Stations” in Proc of International Conference on Communications, 2011.
AlaaedineChouchane, Slim Rekhis, and Noureddine, “Defending against rogue base station attacks using wavelet based finger printing”, Technical report, Networks and Security Research Lab, University of Carthage. Tunisia, 2009.
Vinod K.J., Vrijendra S., “Mobile WiMAX Network Security Threats and Solutions: A Survey,” in Proc. IEEE International Conference on Computer and Communication Technology, 2014, pp. 135–140.
Lang Wei-min, Zhong Jing-li, Li Jian-jun, Qi Xiang-yu “Research on authentication scheme of WiMAX”, in Proc of 4th International Conference on Wireless Communications, networking and Mobile Computing, 2008. WiCOM ‘08.
LeinHarn&JianRen, “Generalized digital certificate for user authentication and key establishment for secure communications”, IEEE Trans. Wireless Communications., 2011, 10(7), pp. 2372–2379.
Taher Elgamal, “A public key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Trans. Information theory., 1985, 31(4), pp. 469–472.
RafalChrabaszcz, PiotrPacyna, “Fast re-authentication of mobile devices with EAP Re-authentication Protocol (ERP),”. In Proc. IEEE XVth International Conference on Telecommunications Network Strategy and Planning Symposium (NETWORKS), 2012, pp. 1–6.
Lai Chengzhe, Li Hui, Zhang Yueyu, Cao Jin, “Simple and Low-Cost Re-Authentication Protocol for HeNB,” China Communication, 10(1):, 2013, pp. 105–115.
Chrabaszcz R., Pacyna P., “Fast re-authentication of mobile devices with EAP Re-authentication Protocol (ERP).” in Proc. IEEE XVth International Conference on Telecommunications Network Strategy and Planning, 2012, pp. 1–6.
Raja G, Baskaran S.B, Ghosal D, Padmanabhan J. Reduced Overhead Frequent User Authentication in EAP-Dependent Broadband Wireless Networks. Mobile Networks and Applications. 2016, pp. 1–16.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Padmanabhan, J., Mariappan, G. (2018). Security and Energy Analysis on Revised Mutual Authentication Protocol in WiMAX Networks. In: Perez, G., Mishra, K., Tiwari, S., Trivedi, M. (eds) Networking Communication and Data Knowledge Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 4. Springer, Singapore. https://doi.org/10.1007/978-981-10-4600-1_18
Download citation
DOI: https://doi.org/10.1007/978-981-10-4600-1_18
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-4599-8
Online ISBN: 978-981-10-4600-1
eBook Packages: EngineeringEngineering (R0)