Skip to main content

Security and Energy Analysis on Revised Mutual Authentication Protocol in WiMAX Networks

  • Conference paper
  • First Online:
Networking Communication and Data Knowledge Engineering

Abstract

With emerging wireless technologies, ensuring security is challenging due to limited energy availability in the wireless devices. As WiMAX-based wireless access has been one of the base technologies in IoT and next-generation technologies, access and authentication, which are the major concerns for consumers and buyers of these wireless technologies, need to be addressed. In this paper, energy-efficient generalized digital certificate (GDC)-based mutual authentication protocol is proposed. The efficiency of the proposed work in defending attacks such as man-in-the-middle attack and rogue base station problem is analyzed. The analysis on energy efficiency of the proposed work is found to be quite appealing, compared to existing mutual authentication procedures in WiMAX.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lang Wei-min, Wu Run-sheng jian-qiu, “A simple key management scheme based on WiMAX”, in Proc of International Symposium on Computer Science and Computational Technology, December 2008, pp. 3–6.

    Google Scholar 

  2. Fan Yang, Huaibei Zhou, Lan Zhang & Jin Feng, “An improved security scheme in WMAN based on IEEE standard 802.16”, In proc. of Wireless Communications, Networking and Mobile Computing, September 2005, pp. 1191–1194.

    Google Scholar 

  3. EvrenEren. “WiMAX security architecture: analysis and assessment,” in Proc. Of 4th International Workshop on Intelligent data Acquisition and Advanced Computing Systems: Technology and Applications, September 2007, pp. 673–677.

    Google Scholar 

  4. IEEE standard 802.16-2004. Air Interface for Fixed Broadband wireless Access Systems. IEEE Press, 2004.

    Google Scholar 

  5. Mahmoud Nasreldin, Asian H, El-Hennawy M & El-Hennawy, “WiMAX Security”, In Proc of 22nd International conferences on advanced Information Networking and Applications, pp. 1335–1340, March 2008.

    Google Scholar 

  6. SreejeshSidharth & M.P. Sebastian, “A revised secure authentication protocol for ieee 802.16 (e)”, in Proc of International Conference on Advances in Computer Engineering, pp. 34–38, June 2010.

    Google Scholar 

  7. Fuden Tshering & Anjali Sardana, A proxy base station based authentication Proc of International Conference on Recent Trends in Information Technology, MIT, Anna University, Chennai, June 2011, pp. 578–582.

    Google Scholar 

  8. Hashmi R.M, Siddiqui A.M, Jabeen M, Shehzad K., Zubair A and Alimgeer K.S, “Improved secure network authentication protocol for ieee 802.16”, in Proc of International Conference on Information and Communication Technologies, August 2009, pp. 101–105.

    Google Scholar 

  9. X. Jin et al., “An improved mutual authentication scheme in multihop WiMAX network,” in Proc. of International Conference on Computer and Electrical Engineering, Dec. 2008, pp. 296–299.

    Google Scholar 

  10. Jie Huang, Chin-Tser Huang, “Secure Mutual Authentication Protocols for Mobile Multi-hop Relay WiMAX Networks against Rogue Base/Relay Stations” in Proc of International Conference on Communications, 2011.

    Google Scholar 

  11. AlaaedineChouchane, Slim Rekhis, and Noureddine, “Defending against rogue base station attacks using wavelet based finger printing”, Technical report, Networks and Security Research Lab, University of Carthage. Tunisia, 2009.

    Google Scholar 

  12. Vinod K.J., Vrijendra S., “Mobile WiMAX Network Security Threats and Solutions: A Survey,” in Proc. IEEE International Conference on Computer and Communication Technology, 2014, pp. 135–140.

    Google Scholar 

  13. Lang Wei-min, Zhong Jing-li, Li Jian-jun, Qi Xiang-yu “Research on authentication scheme of WiMAX”, in Proc of 4th International Conference on Wireless Communications, networking and Mobile Computing, 2008. WiCOM ‘08.

    Google Scholar 

  14. LeinHarn&JianRen, “Generalized digital certificate for user authentication and key establishment for secure communications”, IEEE Trans. Wireless Communications., 2011, 10(7), pp. 2372–2379.

    Google Scholar 

  15. Taher Elgamal, “A public key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Trans. Information theory., 1985, 31(4), pp. 469–472.

    Google Scholar 

  16. RafalChrabaszcz, PiotrPacyna, “Fast re-authentication of mobile devices with EAP Re-authentication Protocol (ERP),”. In Proc. IEEE XVth International Conference on Telecommunications Network Strategy and Planning Symposium (NETWORKS), 2012, pp. 1–6.

    Google Scholar 

  17. Lai Chengzhe, Li Hui, Zhang Yueyu, Cao Jin, “Simple and Low-Cost Re-Authentication Protocol for HeNB,” China Communication, 10(1):, 2013, pp. 105–115.

    Google Scholar 

  18. Chrabaszcz R., Pacyna P., “Fast re-authentication of mobile devices with EAP Re-authentication Protocol (ERP).” in Proc. IEEE XVth International Conference on Telecommunications Network Strategy and Planning, 2012, pp. 1–6.

    Google Scholar 

  19. Raja G, Baskaran S.B, Ghosal D, Padmanabhan J. Reduced Overhead Frequent User Authentication in EAP-Dependent Broadband Wireless Networks. Mobile Networks and Applications. 2016, pp. 1–16.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jayashree Padmanabhan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Padmanabhan, J., Mariappan, G. (2018). Security and Energy Analysis on Revised Mutual Authentication Protocol in WiMAX Networks. In: Perez, G., Mishra, K., Tiwari, S., Trivedi, M. (eds) Networking Communication and Data Knowledge Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 4. Springer, Singapore. https://doi.org/10.1007/978-981-10-4600-1_18

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4600-1_18

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4599-8

  • Online ISBN: 978-981-10-4600-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics