CFP last date
20 January 2025
Reseach Article

Secure and Efficient Multicast Rekeying Approach For Non-Transparent Relay-Based IEEE 802.16 Networks

by Adnan Shahid Khan, Norsheila Fisal, Sharifah Kamilah, Rozeha A. Rashid, M. Abbas
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 16 - Number 4
Year of Publication: 2011
Authors: Adnan Shahid Khan, Norsheila Fisal, Sharifah Kamilah, Rozeha A. Rashid, M. Abbas
10.5120/2004-2701

Adnan Shahid Khan, Norsheila Fisal, Sharifah Kamilah, Rozeha A. Rashid, M. Abbas . Secure and Efficient Multicast Rekeying Approach For Non-Transparent Relay-Based IEEE 802.16 Networks. International Journal of Computer Applications. 16, 4 ( February 2011), 1-7. DOI=10.5120/2004-2701

@article{ 10.5120/2004-2701,
author = { Adnan Shahid Khan, Norsheila Fisal, Sharifah Kamilah, Rozeha A. Rashid, M. Abbas },
title = { Secure and Efficient Multicast Rekeying Approach For Non-Transparent Relay-Based IEEE 802.16 Networks },
journal = { International Journal of Computer Applications },
issue_date = { February 2011 },
volume = { 16 },
number = { 4 },
month = { February },
year = { 2011 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume16/number4/2004-2701/ },
doi = { 10.5120/2004-2701 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:03:56.907830+05:30
%A Adnan Shahid Khan
%A Norsheila Fisal
%A Sharifah Kamilah
%A Rozeha A. Rashid
%A M. Abbas
%T Secure and Efficient Multicast Rekeying Approach For Non-Transparent Relay-Based IEEE 802.16 Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 16
%N 4
%P 1-7
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Many emerging applications that depend on secure group communications demand the privacy of participants and access control at the multicast server. The multicast and broadcast services in IEEE 802.16 are efficient and power saving mechanisms, which no doubt also provide subscribers with strong and powerful security protection from the theft of service by encrypting broadcast connections between subscriber station (SS), relay station (RS), non-transparent relay station (NRS) and Multihop relay base station (MR-BS). However, the existing multicast and broadcast rekeying algorithm (MBRA) not only facing forward secrecy, backward secrecy and scalability problems for IEEE 802.16e but also for multi-hop relay based networks both in centralized as well as distributed zone. Although many researches try to give solutions for the above problems, all of them focus mainly on IEEE 802.16e networks and none of paper is published on distributed relay-based Wimax networks. This paper illustrates the main security problem of MBRA in general which is scalability, backward and forward secrecy and proposes a new Secure and efficient distributed Relay-based Rekeying Algorithm (SEDRRA) scheme for non-transparent Multihop IEEE 802.16 networks. The proposed scheme uses non-transparent decode and forward relays. Both analysis and performance evaluation show that our scheme can significantly reduce the complexity and solve all of the above problems in an efficient way.

References
  1. IEEE Std 802.16-2009: Air Interface for Broadband Wireless Access Systems, 2009
  2. Steven W.Peters and Robert W.Heath, Jr, The Future of Wimax: Multihop Relaying with IEEE 802.16j, IEEE communication Magazine, January 2009.
  3. Sen Xu,Chin-Tser Huang and Manton M. Matthews, Secure Multicast in WiMAX", in Journal of Networks, Vol 3., No 2, February 2008.
  4. Chin-Tser Huang, Manton Matthews, Mathew Ginley, Xinliang Zheng, Chuming Chen and Morris Chang, \Efficient and Secure Multicast in WirelessMAN: A Cross- Layer Design", Journal of Communications Software and Systems, Vol. 3, No. 3, 2007, pp. 199-206.
  5. Adnan Shahid Khan et. al., Efficient Distributed Authentication Key Scheme for Multi-hop Relay In IEEE 802.16j Networks, International Journal of Engineering Science and Technology (IJEST), Vol. 2(6), 2010, 2192-2199.
  6. Adnan Shahid Khan, Prof.Dr.Norsheila Fisal, Abdelhamid, Security Sublayer : A Required Evolution of Wireless Security IEEE 802.16j, In proceedings of IEEE international Conference on Antenna Propagation and System (INAS 2009), Grand paragon Hotel, Johor Bahru, 3-5 December 2009.
  7. IEEE Std 802.16j-2009, Amendment to IEEE STD 802.16-2009
  8. Sen Xu, Chin-Tser Huang and M. Matthews, Secure Multicast in Various Scenarios of WirelessMAN", in the proccedings of IEEE SoutheastCon., March 2007
  9. Hung-Min Sun, Shih-Ying Chang, Shuai-Min Chen, Chien-Chien Chiu, \An Efficient Re keying Scheme for Multicast and Broadcast (M&B) in Mobile WiMAX", in the proccedings of Asia-Pacific Services Computing Conference, December 2008
  10. S. Setia, S. Koussih, S. Jajodia, and E. Harder, “Kronos: A Scalable Group Re-Keying Approach for Secure Multicast”, Proc. of IEEE Symposium on Security and Privacy, 2000S. Mittra, “Iolus: A Framework for Scalable Secure Multicasting”, in Proc. ACM SIGCOMM’97, 1997.
  11. C. K. Wong, M. G. Gouda and S. S. Lam, Secure Group Communication using Key Graphs." IEEE/ACM Transaction on Networking, Vol. 8, No. 1(Feb), 2000, Pages 16-30.
  12. Adnan Shahid Khan, N. Fisal , N.N.M.I. Ma`arof , F.E.I. Khalifa, M. Abbas. Security Zone and Key Derivation Management in Centralized Security Control in Wimax Multihop Relay System. In Proceedings 3rd International Graduate Conference Of Engineering Science, and Humanity, 2010, (IGCESH2010), UTM, Johor Bahru, Malaysia, 2-4 November 2010
  13. Sen Xu, Manton Matthews and Chin-Tser Huang, Security Issues in Privacy and Key Management Protocols of IEEE 802.16, In ACM SE'06, Florida USA, March 2006.
  14. Adnan Shahid Khan, Norsheila Fisal, Mazlina Esa, Sharifa Kamilah, Sharifa Hafizah, M. Abbas , An Improved Authentication Key Management Scheme for Multihop Relay in IEEE 802.16m Networks, In Proceedings of 2010 IEEE Conference on Applied Electromagnetics (APACE 2010), Port Dickson, Malaysia, 11-12 November 2010.
  15. T. Hardjono, B. Cain, and I. Monga. Intra-domain group key management for multicast security. IETF Internet Draft, November 1998.
  16. A. S. Khan, N. Fisal, S. K. S. Yusof, S. H. S. Ariffin, N. N. Maarof, M. Abbas , Security Issues of Relay-Based IEEE 802.16m Network, 4th International Conference on Post Graduate Education (ICPE- 4 2010), 26th-28th November 2010, Mid Velly Cititel Hotel, Kula Lumpur, Malaysia
  17. J. Y. Kuo. Analysis of 802.16e multicast/broadcast group privacy rekeying protocol. CS 259 Final Project Report, Stanford University, 2006.
  18. Miss Laiha Mat Kiah, Keith M. Martin, Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments, International Journal of Security and its Applications, Vol. 2, No. 1, January, 2008
  19. Adnan Shahid Khan, Norsheila Fisal, Abdelhamid, Security Sublayer : A Required Evolution of Wireless Security IEEE 802.16j, In proceedings of IEEE international Conference on Antenna Propagation and System (INAS 2009), Grand paragon Hotel, Johor Bahru, 3-5 December 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Multicast and Broadcast Rekeying Algorithm (MBRA) Secure and efficient distributed Relay-based Rekeying Algorithm (SEDRRA) Security Issues in Wimax