Skip to main content

An Improved Secure Authentication Protocol for WiMAX with Formal Verification

  • Conference paper
Advances in Computing and Communications (ACC 2011)

Abstract

Privacy and Key management protocols (PKM) is used in WiMAX for providing authentication and key management. Basic PKM protocol provides one way authentication between SS and BS results many flaws. However, PKM protocol version 2 (PKMv2) solves the major security problems but new flaws have emerged. This paper analyzes the PKM protocol and its later versions using AVISPA which is a push button tool for the automated validation of security protocol. A secure authentication protocol has also been proposed and analyzed, results show that proposed protocol does not have any security flaws.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IEEE std 802.16 2004: Air interface for fixed broadband wireless access system, IEEE (2004)

    Google Scholar 

  2. IEEE 802.16 and WiMax: Broadband Wireless Access for everyone, Intel White Paper (2004)

    Google Scholar 

  3. IEEE std 802.16e2005: Air interface for fixed broadband wireless access system amendment: Physical and medium access control layers for combined fixed and mobile operation in licensed bands, IEEE (2006)

    Google Scholar 

  4. Johnston, D., Walker, J.: Overview of IEEE 802.16 Security. IEEE Security & Privacy (2004)

    Google Scholar 

  5. Xu, S., Matthews, M., Huang, C.-T.: Security Issues in Privacy and Key Management Protocols of IEEE 802.16. In: Proceedings of the 44th ACM Southeast Conference (ACMSE 2006) (March 2006)

    Google Scholar 

  6. Xu, S., Huang, C.T.: Attacks on PKM protocols of IEEE 802.16 and ts later versions. In: ISWCS 2006: Proceedings of the 3rd International Symposium on Wireless Communication Systems (September 2006)

    Google Scholar 

  7. Tian, H., Pang, L., Wang, Y.: Key management protocol of the IEEE 802.16e. Wuhan University Journal of Natural Sciences 12(1) (January 2007)

    Google Scholar 

  8. Sidharth, S., Sebastian, M.P.: A Revised Secure Authentication Protocol for IEEE 802.16 (e). In: International Conference on Advances in Computer Engineering (2010)

    Google Scholar 

  9. Yuksel, E.: Analysis of the PKMv2 protocol in IEEE 802.16e 2005 using static analysis. Informatics and Mathematical Modelling (2007)

    Google Scholar 

  10. Formal Systems (Europe) Ltd.: FDR2 user manual: Failure divergence efinement (May 2000)

    Google Scholar 

  11. Lowe, G.: Casper: A compiler for the analysis of security protocols. Journal of Computer Security 6, 53–84 (1998)

    Article  Google Scholar 

  12. Avispa a tool for Automated Validation of Internet Security Protocols, http://www.avispa-project.org

  13. Xu, S., Huang, C.-T., Matthews, M.M.: Modeling and Analysis of IEEE 802.16 PKM Protocols using CasperFDR. In: IEEE ISWCS (2008)

    Google Scholar 

  14. D6.2: Specification of the Problems in the High-Level Specification Language, http://www.avispa-project.org

  15. Rai, A.K., Kumar, V., Mishra, S.: An Improved Password Based EAP Method for WiMAX with Formal Verification. In: IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET), vol. 8, pp. 29–35. Published by Foundation of Computer Science, USA (2011)

    Google Scholar 

  16. Basin, D., Mödersheim, S., Viganò, L.: An On-the-Fly Model-Checker for Security Protocol Analysis. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 253–270. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. SPAN a Security Protocol Animator for AVISPA, http://www.irisa.fr/lande/genet/span

  18. Harel, D., Thiagarajan, P.S.: Message sequence charts. UML for Real: Design of Embedded Real-time Systems (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rai, A.K., Mishra, S., Tripathi, P.N. (2011). An Improved Secure Authentication Protocol for WiMAX with Formal Verification. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 191. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22714-1_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22714-1_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22713-4

  • Online ISBN: 978-3-642-22714-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics