We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Proxy Base Station based Authentication Protocol for Broadband Wireless Network

by Fuden Tshering, Prachi Deshpande, S. C. Sharma, Anjali Sardana
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 18
Year of Publication: 2013
Authors: Fuden Tshering, Prachi Deshpande, S. C. Sharma, Anjali Sardana
10.5120/10564-5526

Fuden Tshering, Prachi Deshpande, S. C. Sharma, Anjali Sardana . Proxy Base Station based Authentication Protocol for Broadband Wireless Network. International Journal of Computer Applications. 63, 18 ( February 2013), 6-13. DOI=10.5120/10564-5526

@article{ 10.5120/10564-5526,
author = { Fuden Tshering, Prachi Deshpande, S. C. Sharma, Anjali Sardana },
title = { Proxy Base Station based Authentication Protocol for Broadband Wireless Network },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 18 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 6-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number18/10564-5526/ },
doi = { 10.5120/10564-5526 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:14:39.230144+05:30
%A Fuden Tshering
%A Prachi Deshpande
%A S. C. Sharma
%A Anjali Sardana
%T Proxy Base Station based Authentication Protocol for Broadband Wireless Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 18
%P 6-13
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The fourth generation technology of broadband wireless networks i. e. WiMAX (Worldwide Interoperability for Microwave Access) became popular due to its features like high speed internet access, large coverage area and interoperability for different type of devices. Non-Line of-sight propagation with lower frequency improvement makes WiMAX vulnerable to various security threats. Hence, authentication and authorization are used for protecting network from various attacks. Although there are standard authentication protocols in IEEE 802. 16, but still WiMAX is vulnerable to attacks such as replay attack, DoS (denial of service attack), interleaving attack etc. In this paper, an exhaustive analysis of existing solutions in standard PKMv2 (privacy key management version 2) protocol is presented. The Proxy Base Station based authentication protocol addresses the major attacks namely DoS attack, interleaving attack, replay attack and downgrade attack. With the introduction of PS (proxy base station), the task of validation is distributed between the PS and BS (base station), it resolves the DoS attack due to the resource exhausting validation procedure [23]. Our proposed authentication protocol is modeled and verified on CPN (Colored PetriNet) tool (version 3. 0. 2)[1, 2] with and without intruder and compared with PKMv2 standard protocol. The state space analysis report for standard verification parameters shows that our proposed protocol satisfies the desired properties of liveliness and fairness with negligible overheads and it is secure and efficient.

References
  1. AIS group, Eidhoven University of Technology, The Netherlands (2011)http://cpntools. org.
  2. Al-Azzoni, D. G. Down and R. Khedri, "Modeling and verification of cryptographic protocols using Colored PetriNet and design/CPN," Proceedings of MOMPES05:1-28(2005).
  3. WiMAX Forum, Fixed, Nomadic, Portable and Mobile Applications for 802. 16-2004 and 802. 16e WiMAX Networks (Nov. 2005).
  4. IEEE 802. 16-2005, IEEE standard for Local and Metropolitan Area Networks- Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems, IEEE Press (2005).
  5. Anjali Sardana and R. C. Joshi, "Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attack", Lecture Notes in Computer Science: 4812,259-262(2007).
  6. Anjali Sardana, K. Kumar and R. C. Joshi, "Detection and Honey pot Based Redirection to Counter DDoS Attacks in ISP Domain", Third International Symposium on Information Assurance and Security (IAS 2007), 191-196(2007).
  7. Anjali Sardana and R. C. Joshi, "Honeypot Based Routing to Mitigate DDoS Attacks on Servers at ISP Level", International Symposiums on Information Processing (ISIP2008),505-509(2008).
  8. Anjali Sardana and R. C. Joshi, "Autonomous Dynamic Honeypot Routing Mechanism For Mitigating DDoS Attacks in DMZ", 16th IEEE International Conference on Networks (ICON 2008),1-7(2008).
  9. Anjali Sardana and R. C. Joshi, "An Auto Responsive Honeypot Architecture For Dynamic Resource Allocation and QoS Adaptation in DDoS Attacked Networks", Journal of Computer Communications: 32(12)1384-1399(2009).
  10. Anjali Sardana and R. C. Joshi, "Dual-Level Defense For Networks Under DDoS Attacks", Proceedings of the ACM Symposium on Applied Computing (SAC 2010):733-734(2010).
  11. Anjali Sardana and R. C. Joshi, "Dual-Level Attack Detection, Characterization and Response for Networks under DDoS Attacks", International Journal of Mobile Computing and Multimedia Communications (IJMCMC):3(1), 1-20(2011).
  12. Anjali Sardana and R. C. Joshi, "Dual-Level Attack Detection and Characterization for Networks under DDoS", International Conference on Availability, Reliability, and Security (ARES 10):9-16(2010).
  13. Wenbo Mao, "Modern Cryptography: Theory and Practice", Pearson Education, Prentice Hall PTR (2004).
  14. A. Altaf, M. Y. Javed, A. Ahmed, "Security Enhancements for Privacy and Key Management Protocol in IEEE 802. 16e-2005", Proceedings of 9th International Conference on software Engineering, Artificial Intelligence. , Networking and Parallel/Distributed Computing:335-339(2008).
  15. S. Xu, M. Matthews, C. T. Huang, "Security Issues in Privacy and Key Management Protocols of IEEE 802. 16", Proceedings of 44th annual southeast regional conference, Melbourne, Florida: 113-118(2006).
  16. A. Altaf, R. Sirhindi and A. Ahmed, "A Novel Approach against DoS Attacks in WiMAX Authentication using Visual Cryptography", Proceedings of 2nd International Conference on Emerging Security Information, System and Technologies, Secureware, France: 238-242(2008).
  17. H. Dong and W. Yan, "Secure Authentication on WiMAX with Neural Cryptography", Proceedings of International Conference on Information Security and Assurance,366-369(2008).
  18. Y. Yang and R. Li, "Toward WiMAX Security", in Proceedings of Computational Intelligence and Software Engineering, Wuhan, China:1-5(2009)
  19. F. Liu and L. Lu, "A WPKI-based Security Mechanism for IEEE 802. 16e", Proceedings of Int. Conference on Wireless Communication, Networking and Mobile Computing: 14(2006).
  20. M. Habib et. al, "Performance of WiMAX Security Algorithm: The Comparative Study of RSA Encryption Algorithm with ECC Encryption Algorithm", Proceedings of International Conference on Computer Technology and Development (ICCTD09), Kota Kinabalu, Malaysia:108-112 (2009).
  21. T. Han et. al. ,"Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions," Proceedings of 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Atlanta:828 833(2008).
  22. F. Tshering and Anjali Sardana, "A Review of Privacy and Key Management Protocol in IEEE 802. 16e", Int. Journal of Computer Applications, Published by Foundation of Computer Science: 20(2)2531(April 2011).
  23. F. Tshering and Anjali Sardana, "A Proxy Base Station based Authentication Protocol for IEEE 802. 16e," Proceedings of IEEE ICRTIT 2011 Conference (June 2011).
  24. H. Dong and W. Yan, "Secure authentication on WiMAX with neural cryptography", Proceedings of international conference on information security and assurance, 366-369(2008).
Index Terms

Computer Science
Information Sciences

Keywords

WiMAX Authentication Proxy Base station protocol Privacy and key management