300 likes | 470 Views
Automated Secured Cost Effective Key Refreshing Technique to Enhance WiMAX Privacy Key Management. Agenda. Introduction Related works Objective Proposed work Algorithm Results obtained References. Introduction.
E N D
Automated Secured Cost Effective Key Refreshing Technique to Enhance WiMAX Privacy Key Management
Agenda • Introduction • Related works • Objective • Proposed work • Algorithm • Results obtained • References
Introduction • WiMAX (Worldwide Interoperability for Microwave Access) is an IP based 4G technology • IEEE 802.16e(Mobile WiMAX) provides seamless broadband access for mobile users • Security is provided by a separate security sublayer • Key Management plays a vital role in WiMAX Security • Synchronized & secure distribution of keying data from BS to MS – Privacy Key Management Protocol
WiMAX Security WiMAX security Confidentiality AES EAP Authentication PKM Key Management HMAC Integrity
Existing Key Generation MS BS AuthenticationInfMess Authorization phase AuthorizationReqMess AK generation AK AuthorizationRepMess KeyRequestMess Key Exchange TEK generation KeyResponseMess Data Encryption Encrypted Data Traffic
Inadequacies In Existing Work • Huge amount of bandwidth is utilized • Large Storage is required • Time consumption for key exchange is more • Impersonation and Man in the middle attack
Objective • Automated Key Refreshing Technique is proposed in EAP based PKMv2 key generation • To reduce the key exchange time & key storage • Effective utilization of bandwidth and resources • Also provide security by overcome Man in the Middle attacks and forgery attacks.
Previous Key and Iteration Based Key Refreshing Function(PKIBKRF) HMS
Algorithm : Key Refreshing In MS 1. Start timer and Initialize it to key lifetime 2.if Timer == 400 seconds //key update request Optional during call drop Send (CID,MS_MAC) to BS Wait for acceptance from BS //key generation 3.K_input=CID|oldTEK|MS_MAC|BSID|MSK 4.temp=HMS(K_input) 5.newTEK=truncate(temp,128) //For key verification in BS 6.calculate kv= rightmost 2 bytes[HMAC(newTEK)] 7.end
Algorithm : Key Refreshing & Verification In BS 1.Initialize keylifetime //Initialize Number of keyupdation for MS 2.i=0 //At initial Network Entry 3.i++ //Increment for keyupdation 4.if Legitimate user 4.1 DAK(CID,MS_MAC) //Different Users //case 1 4.2.if i<=3 4.2.1.send“00” // Accept 4.2.2.if Timer<=400seconds
Contd… //Key generation 4.2.3.Perform steps 3 to 5 in MS 4.2.4.TEKi=newTEK//store in BS database //Key verification 4.2.5.Calculate kv= rightmost 2 bytes[HMAC(TEKi)] 4.2.6.if kv in MS==kv in BS 4.2.6.1.Allow 4.2.7.else 4.2.7.1.send“01” // Reject 4.2.8.end 4.3.end
Contd… //case 2 4.4.if i>3 4.4.1.send”01” // Reject 4.5.end //case 3 4.6.if MSKLT-(MSKRT-MSSST)>tolerance(400 seconds) 4.6.1.send”01” // Reject 4.7.end 5.else 5.1.send“10” // illegitimate user 6.end
Computational Time • Existing Method T=TUAREQ+TUARES+TKREQ+TKGEN+TKRES • Proposed Method T=TUA+TMKGEN+TRES
Conclusion • By the Mutual Key Refreshing Algorithm the bandwidth usage, key storage is reduced by 21.8% and time consumption is minimized by 40%. • Future Enhancement-The Network Traffic should be analyzed using Network Simulator.
References 1. LoutfiNuaymi “WiMAX Technology For Broadband Wireless Access”, John Wiley & Sons Ltd,2007 2. Seok-Yee Tang, Peter Muller, HamidR.Sharif,”Wimax security and quality of service”, John Wiley & Sons Ltd,2010 3. JunbeomHur,HyeongseopShim,PyungKim.Hyunsooyoon,Nah- Oak song,”Security considerations for Handover Schemes in Mobile WiMAX”,Wireless communications & Networking Conference, WCNC,pp. 2531s-2536,2008 4. SenXu, Chin-Tser Huang, “Attacks on PKM protocols of IEEE 802.16 and its later versions”,3rd International Symposium on Wireless communication systems,ICWCS, pp. 185-189, 2006 5. MeltemSonmezTuran, Elaine Barker, William Burr. Lily chen, “Recommendation for password – based key derivation Part 1: Storage applications”, NIST special publication 800-132, 2010
Contd… 6. Sen Xu, Manton Matthews, Chin-Tser Huang, “Security Issues in Privacy and Key Management protocols of IEEE 802.16”, ACM SE,2006 7. Fan Yang, “Comparative Analysis on TEK Exchange between PKMv1 and PKMv2 for WiMAX”, 7th International Conference on wireless communications, Networking and Mobile computing(WiCOM), pp. 1-4, 2011 8. B.Sridevi and Dr.S.Rajaram ,“Compressed Key Exchange and Key Caching in PKMv2-EAP Mobile WiMAX Authentication” , European Journal of Scientific and Research, March 2012 9. B.Sridevi, Dr.S.Rajaram, “PKMV2-EAP authentication cost reduction of mobile WiMAX Network Entry Process by the proposed Key caching Mechanisms”, International Journal of Mobile Network Design and Innovation, vol 4, pp.s 65-75, 2012