Abstract
Privacy and Key management protocols (PKM) is used in WiMAX for providing authentication and key management. Basic PKM protocol provides one way authentication between SS and BS results many flaws. However, PKM protocol version 2 (PKMv2) solves the major security problems but new flaws have emerged. This paper analyzes the PKM protocol and its later versions using AVISPA which is a push button tool for the automated validation of security protocol. A secure authentication protocol has also been proposed and analyzed, results show that proposed protocol does not have any security flaws.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
IEEE std 802.16 2004: Air interface for fixed broadband wireless access system, IEEE (2004)
IEEE 802.16 and WiMax: Broadband Wireless Access for everyone, Intel White Paper (2004)
IEEE std 802.16e2005: Air interface for fixed broadband wireless access system amendment: Physical and medium access control layers for combined fixed and mobile operation in licensed bands, IEEE (2006)
Johnston, D., Walker, J.: Overview of IEEE 802.16 Security. IEEE Security & Privacy (2004)
Xu, S., Matthews, M., Huang, C.-T.: Security Issues in Privacy and Key Management Protocols of IEEE 802.16. In: Proceedings of the 44th ACM Southeast Conference (ACMSE 2006) (March 2006)
Xu, S., Huang, C.T.: Attacks on PKM protocols of IEEE 802.16 and ts later versions. In: ISWCS 2006: Proceedings of the 3rd International Symposium on Wireless Communication Systems (September 2006)
Tian, H., Pang, L., Wang, Y.: Key management protocol of the IEEE 802.16e. Wuhan University Journal of Natural Sciences 12(1) (January 2007)
Sidharth, S., Sebastian, M.P.: A Revised Secure Authentication Protocol for IEEE 802.16 (e). In: International Conference on Advances in Computer Engineering (2010)
Yuksel, E.: Analysis of the PKMv2 protocol in IEEE 802.16e 2005 using static analysis. Informatics and Mathematical Modelling (2007)
Formal Systems (Europe) Ltd.: FDR2 user manual: Failure divergence efinement (May 2000)
Lowe, G.: Casper: A compiler for the analysis of security protocols. Journal of Computer Security 6, 53–84 (1998)
Avispa a tool for Automated Validation of Internet Security Protocols, http://www.avispa-project.org
Xu, S., Huang, C.-T., Matthews, M.M.: Modeling and Analysis of IEEE 802.16 PKM Protocols using CasperFDR. In: IEEE ISWCS (2008)
D6.2: Specification of the Problems in the High-Level Specification Language, http://www.avispa-project.org
Rai, A.K., Kumar, V., Mishra, S.: An Improved Password Based EAP Method for WiMAX with Formal Verification. In: IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET), vol. 8, pp. 29–35. Published by Foundation of Computer Science, USA (2011)
Basin, D., Mödersheim, S., Viganò, L.: An On-the-Fly Model-Checker for Security Protocol Analysis. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 253–270. Springer, Heidelberg (2003)
SPAN a Security Protocol Animator for AVISPA, http://www.irisa.fr/lande/genet/span
Harel, D., Thiagarajan, P.S.: Message sequence charts. UML for Real: Design of Embedded Real-time Systems (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rai, A.K., Mishra, S., Tripathi, P.N. (2011). An Improved Secure Authentication Protocol for WiMAX with Formal Verification. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 191. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22714-1_42
Download citation
DOI: https://doi.org/10.1007/978-3-642-22714-1_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22713-4
Online ISBN: 978-3-642-22714-1
eBook Packages: Computer ScienceComputer Science (R0)