1 / 30

Automated Secured Cost Effective Key Refreshing Technique to Enhance WiMAX Privacy Key Management

Automated Secured Cost Effective Key Refreshing Technique to Enhance WiMAX Privacy Key Management. Agenda. Introduction Related works Objective Proposed work Algorithm Results obtained References. Introduction.

virgo
Download Presentation

Automated Secured Cost Effective Key Refreshing Technique to Enhance WiMAX Privacy Key Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Automated Secured Cost Effective Key Refreshing Technique to Enhance WiMAX Privacy Key Management

  2. Agenda • Introduction • Related works • Objective • Proposed work • Algorithm • Results obtained • References

  3. Introduction • WiMAX (Worldwide Interoperability for Microwave Access) is an IP based 4G technology • IEEE 802.16e(Mobile WiMAX) provides seamless broadband access for mobile users • Security is provided by a separate security sublayer • Key Management plays a vital role in WiMAX Security • Synchronized & secure distribution of keying data from BS to MS – Privacy Key Management Protocol

  4. WiMAX Security WiMAX security Confidentiality AES EAP Authentication PKM Key Management HMAC Integrity

  5. Related Works

  6. Contd…

  7. Existing Key Generation MS BS AuthenticationInfMess Authorization phase AuthorizationReqMess AK generation AK AuthorizationRepMess KeyRequestMess Key Exchange TEK generation KeyResponseMess Data Encryption Encrypted Data Traffic

  8. Key Exchange

  9. Inadequacies In Existing Work • Huge amount of bandwidth is utilized • Large Storage is required • Time consumption for key exchange is more • Impersonation and Man in the middle attack

  10. Objective • Automated Key Refreshing Technique is proposed in EAP based PKMv2 key generation • To reduce the key exchange time & key storage • Effective utilization of bandwidth and resources • Also provide security by overcome Man in the Middle attacks and forgery attacks.

  11. Proposed Work

  12. Previous Key and Iteration Based Key Refreshing Function(PKIBKRF) HMS

  13. Terminologies Used in Algorithm

  14. Algorithm : Key Refreshing In MS 1. Start timer and Initialize it to key lifetime 2.if Timer == 400 seconds //key update request Optional during call drop Send (CID,MS_MAC) to BS Wait for acceptance from BS //key generation 3.K_input=CID|oldTEK|MS_MAC|BSID|MSK 4.temp=HMS(K_input) 5.newTEK=truncate(temp,128) //For key verification in BS 6.calculate kv= rightmost 2 bytes[HMAC(newTEK)] 7.end

  15. Algorithm : Key Refreshing & Verification In BS 1.Initialize keylifetime //Initialize Number of keyupdation for MS 2.i=0 //At initial Network Entry 3.i++ //Increment for keyupdation 4.if Legitimate user 4.1 DAK(CID,MS_MAC) //Different Users //case 1 4.2.if i<=3 4.2.1.send“00” // Accept 4.2.2.if Timer<=400seconds

  16. Contd… //Key generation 4.2.3.Perform steps 3 to 5 in MS 4.2.4.TEKi=newTEK//store in BS database //Key verification 4.2.5.Calculate kv= rightmost 2 bytes[HMAC(TEKi)] 4.2.6.if kv in MS==kv in BS 4.2.6.1.Allow 4.2.7.else 4.2.7.1.send“01” // Reject 4.2.8.end 4.3.end

  17. Contd… //case 2 4.4.if i>3 4.4.1.send”01” // Reject 4.5.end //case 3 4.6.if MSKLT-(MSKRT-MSSST)>tolerance(400 seconds) 4.6.1.send”01” // Reject 4.7.end 5.else 5.1.send“10” // illegitimate user 6.end

  18. RESULTS OBTAINEDKeyLifetime Initialization

  19. Alarm Indication for Key Request

  20. Acknowledgement from BS

  21. New TEK Generation

  22. Updation of newTEK as oldTEK

  23. TEK Generation in BS

  24. Bandwidth Calculation

  25. Comparison In Bandwidth Consumption

  26. Computational Time • Existing Method T=TUAREQ+TUARES+TKREQ+TKGEN+TKRES • Proposed Method T=TUA+TMKGEN+TRES

  27. Conclusion • By the Mutual Key Refreshing Algorithm the bandwidth usage, key storage is reduced by 21.8% and time consumption is minimized by 40%. • Future Enhancement-The Network Traffic should be analyzed using Network Simulator.

  28. References 1. LoutfiNuaymi “WiMAX Technology For Broadband Wireless Access”, John Wiley & Sons Ltd,2007 2. Seok-Yee Tang, Peter Muller, HamidR.Sharif,”Wimax security and quality of service”, John Wiley & Sons Ltd,2010 3. JunbeomHur,HyeongseopShim,PyungKim.Hyunsooyoon,Nah- Oak song,”Security considerations for Handover Schemes in Mobile WiMAX”,Wireless communications & Networking Conference, WCNC,pp. 2531s-2536,2008 4. SenXu, Chin-Tser Huang, “Attacks on PKM protocols of IEEE 802.16 and its later versions”,3rd International Symposium on Wireless communication systems,ICWCS, pp. 185-189, 2006 5. MeltemSonmezTuran, Elaine Barker, William Burr. Lily chen, “Recommendation for password – based key derivation Part 1: Storage applications”, NIST special publication 800-132, 2010

  29. Contd… 6. Sen Xu, Manton Matthews, Chin-Tser Huang, “Security Issues in Privacy and Key Management protocols of IEEE 802.16”, ACM SE,2006 7. Fan Yang, “Comparative Analysis on TEK Exchange between PKMv1 and PKMv2 for WiMAX”, 7th International Conference on wireless communications, Networking and Mobile computing(WiCOM), pp. 1-4, 2011 8. B.Sridevi and Dr.S.Rajaram ,“Compressed Key Exchange and Key Caching in PKMv2-EAP Mobile WiMAX Authentication” , European Journal of Scientific and Research, March 2012 9. B.Sridevi, Dr.S.Rajaram, “PKMV2-EAP authentication cost reduction of mobile WiMAX Network Entry Process by the proposed Key caching Mechanisms”, International Journal of Mobile Network Design and Innovation, vol 4, pp.s 65-75, 2012

  30. THANK YOU

More Related