Open Access Open Access  Restricted Access Subscription or Fee Access

Lightweight Message Authentication Protocol for Mobile Multihop Relay Networks


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v9i10.4149

Abstract


This paper proposes a lightweight self-organized efficient authentication and key management scheme (SEAKS) to countermeasure the MAC layer attacks such as denial of service (DoS), replay attack, man-in-the-middle attack and the interleaving attacks in mobile multihop relay (MMR) networks. SEAKS has been developed based on privacy key management (PKM) protocol for both unilateral authentication defined as SEAKS-PKMv1 and mutual authentication as SEAKS-PKMv2. In SEAKS, the non-transparent relays (N-RS) perform authentication and establish the authorization key (AK) using our proposed public key cryptosystem based on hash authentication code scheme. The subsequent N-RS can be authenticated with less overhead thus enhancing the scalability of the system. The performance of SEAKS-PKMv1 and SEAKS-PKMv2 protocol has been evaluated using BAN LOGIC to verify the integrity of the participating N-RSs and SSs. Simulation study shows that SEAKS exhibits higher packet delivery ratio by 22%, lesser packet overhead by 12%, and less processing time by 14% as compared to the official draft scheme (OD-2009) for MMR WiMAX networks. SEAKS can be applied to any multihop networks with minimum authentication overhead.
Copyright © 2014 Praise Worthy Prize - All rights reserved.

Keywords


Mobile Multihop Relay Networks; Key Management; Light Weight Security Mechanism; Authentication Overhead; MAC Layer Attacks

Full Text:

PDF


References


"IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Broadband Wireless Access Systems Amendment 1: Multihop Relay Specification," IEEE Std 802.16j-2009 (Amendment to IEEE Std 802.16-2009), pp. 1-290, 2009.

A.S.Khan, "Efficient Distributed Authentication Key Scheme for Multi-hop Relay In IEEE 802.16j Networks," International Journal of Engineering Science and Technology (IJEST), vol. Vol. 2, pp. 2192-2199, 2010.

A. Altaf, R. Sirhindi, and A. Ahmed, "A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography," Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE '08., pp. 238-242.
http://dx.doi.org/10.1109/securware.2008.52

R. K. Jha, U. D. Dalal, and I. Z. Bholebawa, "Performance analysis of black hole attack on WiMAX-WLAN interface network," in Proceedings of the 2012 3rd International Conference on Computer and Communication Technology, ICCCT 2012, pp. 303-308.
http://dx.doi.org/10.1109/iccct.2012.68

D. Satish Kumar and N. Nagarajan, "Relay technologies and technical issues in IEEE 802.16j Mobile Multi-hop Relay (MMR) networks," Journal of Network and Computer Applications, vol. 36, pp. 91-102, 2012.
http://dx.doi.org/10.1016/j.jnca.2012.04.009

S. Taha, S. Cespedes, and S. Xuemin, "EM3 A: Efficient mutual multi-hop mobile authentication scheme for PMIP networks," in Communications (ICC), 2012 IEEE International Conference on, 2012, pp. 873-877.
http://dx.doi.org/10.1109/icc.2012.6363975

M. Zolotukhin, T. Hamalainen, and A. Garnaev, "A Relay Deployment Mechanism for One Scenario of Cost-Effective Coverage Extension in IEEE 802.16j Networks," in New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on, 2012, pp. 1-6.
http://dx.doi.org/10.1109/ntms.2012.6208709

R. Yusoff, M. D. Baba, R. Abd Rahman, M. Ibrahim, and N. Mat Isa, "Performance analysis of transparent and non-transparent relays in MMR WiMAX networks," in Industrial Electronics and Applications (ISIEA), 2011 IEEE Symposium on, 2011, pp. 237-240.
http://dx.doi.org/10.1109/isiea.2011.6108706

A. K. M. N. Sakib and M. M. S. Kowsar, "Shared key vulnerability in IEEE 802.16e: Analysis & solution," in Computer and Information Technology (ICCIT), 2010 13th International Conference on, 2010, pp. 600-605.
http://dx.doi.org/10.1109/iccitechn.2010.5723926

T. Iwata, M. Nishigaki, M. Shojaei, N. Movahhedinia, and B. Tork Ladani, "An Entropy Based Approach for DDoS Attack Detection in IEEE 802.16 Based Networks," in Advances in Information and Computer Security. vol. 7038: Springer Berlin Heidelberg, 2011, pp. 129-143.
http://dx.doi.org/10.1007/978-3-642-25141-2_9

A.S.Khan, Sharifah Kamilah, Sharifah Hafizah, Mazlina Esa, M. Abbas., "An Efficient Self-Organized Authentication and Key Management Scheme for Distributed Multihop Relay-Based IEEE 802.16 Networks," International Journal of Computer Science and Information Security (IJCSIS), Vol. 9, pp. 30-38, 2011.

W. Stalling, "Crytography and Network Security," Principles and Practices, 3rd edition, Pearson Education, Prentice Hall PTR, 2003.

J. Chee and T. Ming, "Improving Security in the IEEE 802.16 Standards," Eighth International Conference on Information Technology: New Generations (ITNG), 2011, pp. 408-412.
http://dx.doi.org/10.1109/itng.2011.79

X. Dai and X. Xie, "Analysis and research of security mechanism in IEEE 802.16j," in Proceedings - 2010 International Conference on Anti-Counterfeiting, Security and Identification, 2010, pp. 33-36.
http://dx.doi.org/10.1109/icasid.2010.5551846

H. Jie and H. Chin-Tser, "Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations," IEEE International Conference in Communications (ICC), 2011, pp. 1-5.
http://dx.doi.org/10.1109/icc.2011.5963292

Khan, A.S., Fisal, N., Ma'arof, N.N.M.I., Khalifa, F.E.I., Abbas, M., Security issues and modified version of PKM protocol in non-transparent multihop relay in IEEE 802.16j networks, (2011) International Review on Computers and Software (IRECOS), 6 (1), pp. 104-109.

C. Kolias, G. Kambourakis, and S. Gritzalis, "Attacks and Countermeasures on 802.16: Analysis and Assessment," Communications Surveys & Tutorials, IEEE, vol. 15, pp. 487-514, 2012.
http://dx.doi.org/10.1109/surv.2012.021312.00138

T. N. Nguyen and M. Ma, "An pre-authentication protocol with symmetric keys for secure handover in mobile WiMAX networks," in IEEE International Conference on Communications, 2012, pp. 863-867.
http://dx.doi.org/10.1109/icc.2012.6363817

S. C. Satapathy, S. K. Udgata, B. N. Biswal, R. Jha, and S. Limkar, "Performance Analysis of Network Layer Security Attack in WiMAX System," in Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA). vol. 199: Springer Berlin Heidelberg, 2013, pp. 535-542.
http://dx.doi.org/10.1007/978-3-642-35314-7_60

S. Sidharth and M. P. Sebastian, "A Revised Secure Authentication Protocol for IEEE 802.16 (e), "International Conference on Advances in Computer Engineering (ACE), 2010, pp. 34-38.
http://dx.doi.org/10.1109/ace.2010.51

M. Shojaee, N. Movahhedinia, and B. T. Ladani, "Traffic analysis for WiMAX network under DDoS attack," Second Pacific-Asia Conference on Circuits,Communications and System (PACCS), 2010, pp. 279-283.
http://dx.doi.org/10.1109/paccs.2010.5626885

N. Thuy Ngoc and M. Maode, "An pre-authentication protocol with symmetric keys for secure handover in mobile WiMAX networks," IEEE International Conference in Communications (ICC), 2012, pp. 863-867.
http://dx.doi.org/10.1109/icc.2012.6363817

P. Rengaraju, L. Chung-Horng, and A. Srinivasan, "Design of distributed security architecture for multihop WiMAX networks," Eighth Annual International Conference in Privacy Security and Trust (PST), 2010, pp. 54-61.
http://dx.doi.org/10.1109/pst.2010.5593247

S. Hussain, M. N. Khan, and M. Ibrahim, "A Security Architecture for Wimax Networks " International Journal of Computer Applications vol. 50 pp. 35-39, 2012
http://dx.doi.org/10.5120/7802-0931

Y. Lee, G. Lee, H. Kim, and C. Jeong, "Performance analysis of authentication and key distribution scheme for mobile multi-hop relay in IEEE 802.16j," Personal and Ubiquitous Computing, vol. 16, pp. 697-706, 2012.
http://dx.doi.org/10.1007/s00779-011-0427-8

Hamzah, A.R.M., Fisal, N., Khan, A.S., Kamilah, S., Hafizah, S., Distributed multi-hop reservation protocol for wireless personal area Ultra-Wideband networks, (2013) International Review on Computers and Software (IRECOS), 8 (6), pp. 1294-1301.

B. Michael, A. Martin, and N. Roger, "A logic of authentication," ACM Trans. Comput. Syst., vol. 8, pp. 18-36, 1990.
http://dx.doi.org/10.1145/77648.77649

S. Sufatrio and R. H. C. Yap, "Extending BAN Logic for Reasoning with Modern PKI-Based Protocols," IFIP International Conference on Network and Parallel Computing, 2008., pp. 190-197.
http://dx.doi.org/10.1109/npc.2008.86


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize