Formal Analysis of Key Management in mobile Wimax
Autor: | Noudjoud Kahya, Nacira Ghoualmi, pascal lafourcade, Roumaissa Khelf |
---|---|
Přispěvatelé: | Lafourcade, Pascal, CAP 20-25 - - CAP 20-252016 - ANR-16-IDEX-0001 - IDEX - VALID, Laboratoire d'Informatique, de Modélisation et d'Optimisation des Systèmes (LIMOS), Ecole Nationale Supérieure des Mines de St Etienne-Université Clermont Auvergne [2017-2020] (UCA [2017-2020])-Centre National de la Recherche Scientifique (CNRS), ANR-16-IDEX-0001,CAP 20-25,CAP 20-25 (I-Site)(2016), Ecole Nationale Supérieure des Mines de St Etienne (ENSM ST-ETIENNE)-Université Clermont Auvergne [2017-2020] (UCA [2017-2020])-Centre National de la Recherche Scientifique (CNRS), ANR-16-IDEX-0001,CAP 20-25,CAP 20-25(2016) |
Jazyk: | angličtina |
Rok vydání: | 2016 |
Předmět: | |
Zdroj: | The 2nd International Conference on Pattern Analysis and Intelligent Systems (IEEE) PAIS'16 The 2nd International Conference on Pattern Analysis and Intelligent Systems (IEEE) PAIS'16, 2016, Khenchela, Algeria HAL |
Popis: | International audience; The Mobile WiMAX IEEE 802.16e is a new technology supporting broadband wireless communication with fixed and mobile access. The standard offers high throughput broadband connections, supporting handover and roaming capabilities, and provides a security sub layer, which is responsible for secrecy, authentication and secure key exchange. In the area of security aspects, Mobile WiMAX exhibits vulnerabilities while adopting improved security architecture. Several versions of 802.16 networks were released. While the first versions have shown some security weaknesses that were later corrected by the recently released versions, the security mechanisms of 802.16 still remain vulnerable and the limited deployment of such technology is insufficient to satisfy the demands of security. This paper focuses on reducing the security vulnerabilities in the authorization protocol PKM and the generation of traffic encryption keys (TEKs). We propose the usage of 1. A formal analysis of the PKM protocol (authorization phase and exchange of TEKs phase) and 2.Device certificate for key exchange process to provide secure authentication and 3. Give a formal analysis of our new PKM protocol (authorization phase and exchange of TEKs phase). The formal analysis has been conducted using a specialized model checker Scyther, which provides formal proofs of the security protocol. The revised authentication protocol is expected to provide better secure platform for all process of PKM. |
Databáze: | OpenAIRE |
Externí odkaz: |