Title :
A new tunnelled EAP based authentication method for WiMAX networks
Author :
Alezabi, Kamal Ali ; Hashim, Fazirulhisyam ; Hashim, Shaiful Jahari ; Ali, Borhanuddin M.
Author_Institution :
Dept. of Comp. & Comm. Syst. Eng., Univ. Putra Malaysia, Serdang, Malaysia
Abstract :
Despite well-defined and commercially viable security standards for WiMAX networks, vulnerability in current system design and other inherent characteristics expose the network to various types of security attacks. These attacks are commonly related to network access security, authentication of users, validation of data transmission, and confidentiality issues. In order to provide better protection to WiMAX users, several improvements in the security mechanism have been provided. One notable solution is by using a more secure protocol, namely the Privacy Key Management (PKM), which later being revised into PKMv2 (PKM version 2). In this protocol, authentication (as well as mutual authentication) plays an important role since it must be completed in order to establish a secure connection between the network entities. PKMv2 uses either RSA-based or EAP-based authentication modes. While there are variations of authentication modes exist in the literature, some of them prone to man-in-the-middle (MITM) attack and significant overheads. This paper proposes a new method called EAP-TTLS-ISRP which embeds the transmission of security messages in a secure tunnel. This authentication method is proposed for a single EAP based authentication to achieve both user and device authentications between Mobile Station (MS) and Authentication Server (AS) by using strong and fast authentication methods. The proposed method outperforms other methods in the number of messages exchanged and thus it has less overhead cost, it also satisfies the EAP requirement for secure and efficient data exchange, as well as robust to MITM attacks. Automated Validation of Internet Security Protocols and Applications (AVISPA) verification tools are used to verify the security performance of the proposed EAP-TTLS-ISRP method.
Keywords :
WiMax; computer network security; cryptographic protocols; private key cryptography; WiMAX networks; automated validation of Internet security protocols and applications verification tools; data exchange; data transmission; man in the middle attack; mutual authentication; network access security; privacy key management; secure connection; secure protocol; secure tunnel; security attacks; security messages; security standards; tunnelled EAP based authentication method; user authentication; Authentication; Performance evaluation; Protocols; Servers; Standards; WiMAX; Authentication; PKMv2; SRP; TTLS; WiMAX;
Conference_Titel :
Communications (MICC), 2013 IEEE Malaysia International Conference on
Conference_Location :
Kuala Lumpur
DOI :
10.1109/MICC.2013.6805864