Advanced Search
Volume 32 Issue 9
Oct.  2010
Turn off MathJax
Article Contents
Feng Tao, Zhang Zi-Bin, Ma Jian-Feng. Security Authentication Protocol for WiMAX Wireless Network Based on Protocol Composition Logic[J]. Journal of Electronics & Information Technology, 2010, 32(9): 2106-2111. doi: 10.3724/SP.J.1146.2009.01191
Citation: Feng Tao, Zhang Zi-Bin, Ma Jian-Feng. Security Authentication Protocol for WiMAX Wireless Network Based on Protocol Composition Logic[J]. Journal of Electronics & Information Technology, 2010, 32(9): 2106-2111. doi: 10.3724/SP.J.1146.2009.01191

Security Authentication Protocol for WiMAX Wireless Network Based on Protocol Composition Logic

doi: 10.3724/SP.J.1146.2009.01191
  • Received Date: 2009-09-08
  • Rev Recd Date: 2010-02-09
  • Publish Date: 2010-09-19
  • IEEE 802.16e-2005 standards PKMv2 protocol is an important secure guarantee for WiMAX (Worldwide Interoperability for Microwave Access) wireless network. In this paper, based on Protocol Composition Logic (PCL), the PKMv2 authentication protocols security is analyzed, the interleaving attack is found, and a new authentication protocol is proposed by using the Protocol Derivation System (PDS) in WiMAX wireless network based on the vulnerability of system security, finally a formal correctness and security proof of it is presented with Protocol Composition Logic (PCL). This new protocol is more secure than the PKMv2 security authentication protocol, and more suitable for complicated wireless network application environment used in WiMAX.
  • loading
  • [1] Yarali A and Rahman S. WiMAX broadband wireless access technology: Services, architecture and deployment models [C]. Electrical and Computer Engineering, 2008. CCECE 2008, Canada, 2008: 77-82. [2] [2] IEEE 802.16e-2005. Air interface for fixed broadband wireless access systems, Amendment 2: Physical and medium access control layers for combined fixed and mobile operation in licensed bands[S], NJ, USA, IEEE Press, 2006. Kim Dongmyoung, Cai Hua, and Na Minsoo, et al.. Performance measurement over Mobile WiMAX/IEEE 802.16e network[C], 2008 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, Newport Beach, CA, United states, 2008: 1-8. Agrawal Dharma P, Gossain Hrishikesh, and Cavalcanti Dave, et al.. Recent advances and evolution of WLAN and WMAN standards[C]. IEEE Wireless Communications, USA, 2008: 54-55. [3] Johnston D and Walker J. Mutual authentication for PKMv2, IEEE C802.16e-04_229rl. 2004. [4] Liu Fu-qiang and Lu Lei. A WPKI-Based security mechanism for IEEE 802.16e[C]. WiCOM International Conference, Wuhan, 2006: 1-4. [5] Sun Hung-min, Lin Yue-hsun, and Chen Shuai-min, et al.. Secure and fast handover scheme based on pre-authentication method for 802.16/WiMAX infrastructure networks[C]. 2007 IEEE Region 10 Conference, Taipei, 2007: 1-4. [6] Shon Taeshik and Choi Wook. An analysis of mobile WiMAX security: vulnerabilities and solutions [J].Lecture Notes in Computer Science.2007, 4658:88-97 [7] Xu Sen and Huang Chin-tser. Attacks on PKM protocols of IEEE 802.16 and its later versions[C]. Proceedings of 3rd International Symposium on Wireless Communication System (ISWCS 2006), Valencia, 2006: 185-189. [8] Datta A. Security analysis of network protocols: compositional reasoning and complexity-theoretic Foundations[D]. [Ph.D. dissertation], Computer Science Department, Stanford University, 2005. [9] Datta A, Derek A, and Mitchell J C, et al.. Protocol Composition Logic (PCL)[J].Electronic Notes in Theoretical Computer Science.2007, 172:311-358 [10] Cremers C. On the protocol composition logic PCL[C]. Proceedings of the 2008 ACM symposium on Information, computer and communications security, Tokyo, Japan, 2008: 66-76. Doug K, Ryan M, and Tony B, et al.. A correctness proof of a mesh security architecture[C]. Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium, 2008: 315-330. [11] Johnston D and Walker J. Overview of IEEE 80216 security[J].. IEEE Security Privacy.2004, 2:40-48 [12] He Chang-hua, Sundararajan M, and Datta A, et al.. A modular correctness proof of IEEE 802.11i and TLS[C], Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05), Alexandria, VA, USA, 2005: 2-15. [13] 铁满霞, 李建东, 王育民. WAPI密钥管理协议的PCL证明[J].电子与信息学报.2009, 31(2):444-447浏览 Tie Man-xia, Li Jian-dong, and Wang Yu-min. A correctness proof of WAPI key management protocol based on PCL[J].Journal of Electronics Information Technology.2009, 31(2):444-447 [14] Meadows C and Pavlovic D. Deriving, attacking and defending the GDOI protocol[C]. Proceedings of 9th European Symposium On Research in Computer Security, France, 2004: 53-72. [15] Lowe G. Some new attacks upon security protocols[C]. Computer Security Foundations Workshop, 1996, Proceedings, 9th IEEE, Kenmare, Ireland, 1996: 10-12.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3748) PDF downloads(762) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return