28 January 2013 Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management
Author Affiliations +
Proceedings Volume 8760, International Conference on Communication and Electronics System Design; 876012 (2013) https://doi.org/10.1117/12.2012054
Event: International Conference on Communication and Electronics System Design, 2013, Jaipur, India
Abstract
In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and backed by MATLAB for processing and MYSQL for storing keys.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
B. Sridevi, B. Sridevi, S. Sivaranjani, S. Sivaranjani, S. Rajaram, S. Rajaram, } "Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management", Proc. SPIE 8760, International Conference on Communication and Electronics System Design, 876012 (28 January 2013); doi: 10.1117/12.2012054; https://doi.org/10.1117/12.2012054
PROCEEDINGS
10 PAGES


SHARE
RELATED CONTENT

Malicious node detection in ad hoc wireless networks
Proceedings of SPIE (July 23 2003)
Bot armies as threats to network security
Proceedings of SPIE (April 09 2007)
Using overlays to improve network security
Proceedings of SPIE (July 08 2002)
Design and study of security system based on WWW
Proceedings of SPIE (October 03 2001)

Back to Top