• DocumentCode
    1995886
  • Title

    A new tunnelled EAP based authentication method for WiMAX networks

  • Author

    Alezabi, Kamal Ali ; Hashim, Fazirulhisyam ; Hashim, Shaiful Jahari ; Ali, Borhanuddin M.

  • Author_Institution
    Dept. of Comp. & Comm. Syst. Eng., Univ. Putra Malaysia, Serdang, Malaysia
  • fYear
    2013
  • fDate
    26-28 Nov. 2013
  • Firstpage
    412
  • Lastpage
    417
  • Abstract
    Despite well-defined and commercially viable security standards for WiMAX networks, vulnerability in current system design and other inherent characteristics expose the network to various types of security attacks. These attacks are commonly related to network access security, authentication of users, validation of data transmission, and confidentiality issues. In order to provide better protection to WiMAX users, several improvements in the security mechanism have been provided. One notable solution is by using a more secure protocol, namely the Privacy Key Management (PKM), which later being revised into PKMv2 (PKM version 2). In this protocol, authentication (as well as mutual authentication) plays an important role since it must be completed in order to establish a secure connection between the network entities. PKMv2 uses either RSA-based or EAP-based authentication modes. While there are variations of authentication modes exist in the literature, some of them prone to man-in-the-middle (MITM) attack and significant overheads. This paper proposes a new method called EAP-TTLS-ISRP which embeds the transmission of security messages in a secure tunnel. This authentication method is proposed for a single EAP based authentication to achieve both user and device authentications between Mobile Station (MS) and Authentication Server (AS) by using strong and fast authentication methods. The proposed method outperforms other methods in the number of messages exchanged and thus it has less overhead cost, it also satisfies the EAP requirement for secure and efficient data exchange, as well as robust to MITM attacks. Automated Validation of Internet Security Protocols and Applications (AVISPA) verification tools are used to verify the security performance of the proposed EAP-TTLS-ISRP method.
  • Keywords
    WiMax; computer network security; cryptographic protocols; private key cryptography; WiMAX networks; automated validation of Internet security protocols and applications verification tools; data exchange; data transmission; man in the middle attack; mutual authentication; network access security; privacy key management; secure connection; secure protocol; secure tunnel; security attacks; security messages; security standards; tunnelled EAP based authentication method; user authentication; Authentication; Performance evaluation; Protocols; Servers; Standards; WiMAX; Authentication; PKMv2; SRP; TTLS; WiMAX;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications (MICC), 2013 IEEE Malaysia International Conference on
  • Conference_Location
    Kuala Lumpur
  • Type

    conf

  • DOI
    10.1109/MICC.2013.6805864
  • Filename
    6805864