DOI QR코드

DOI QR Code

WiMAX Security Mechanism for Minimizing Performance load of Base Station

베이스 스테이션의 성능부하를 최소화하기 위한 WiMAX 보안 메커니즘

  • 정윤수 (충북대학교 전자계산학과) ;
  • 김용태 (한남대학교 멀티미디어학부) ;
  • 박길철 (한남대학교 멀티미디어학부) ;
  • 이상호 (충북대학교 전기전자 컴퓨터공학부)
  • Published : 2008.10.30

Abstract

Nowadays, usage of mobile unit which has a characteristic of low cost and high efficiency is being generalized because of frequent use of internet-based variable service and application in IEEE 802.16 WiMAX. A study for handling a security problem of high speed internet service is rising while the use of a mobile is being generalized. This paper suggests a security mechanism which provides safety from certification load of SS and a security attack as well as a basic function which is provided from IEEE 802.16e standard to satisfy security demand of IEEE802.16 WiMAX. The proposed mechanism exchangeskey material information for TEK and data code by using 난수(?) and secret value created by SS and BS, also reduces capacity load of BS not to perform an additional certificate procedure of BS by using the early certification information and certificate of SS.

최근 IEEE 802.16 WiMAX에서는 인터넷 기반의 다양한 서비스와 애플리케이션의 빈번한 사용으로 인하여 저비용, 고효율의 특성을 가지는 이동 단말기의 사용이 일반화되고 있다. 이동 단말기의 사용이 일반화되면서 고속 인터넷 서비스의 보안 문제를 해결하기 위한 연구가 IEEE 802.16e 표준을 중심으로 연구되고 있다. 이 논문에서는 IEEE 802.16 WiMAX의 보안 요구사항을 충족하기 위해 IEEE 802.16e 표준에서 제공하는 기본 기능이외에 SS의 인증부하 및 보안공격(reply 공격과 man-in-the-middle 공격)에 안전한 보안 메커니즘을 제안한다. 제안된 메커니즘은 SS와 BS가 생성한 난수와 비밀값을 이용하여 TEK과 데이터 암호에 필요한 키 정보를 교환한다. 또한 SS의 초기 인증정보와 인증서를 이용하여 BS의 추가 인증 과정을 수행하지 않도록 하여 BS의 성능 부하를 줄인다.

Keywords

References

  1. X. Sen, M. Maqtthews, H. Chin-Tser, "Security Issues in Pricacy and Key Management protocols of IEEE 802.16", Department of Computer Science and Engineering - University of Sourth Carolina Columbia, SC 29208, USA:www.cse.sc.edu/~huanget/acmse06cr.pdf#search=%22acmse06cr.pdf%22
  2. S. Wattanachai, "Security Architecture of the IEEE 802.16 Standard for Mesh Networks", Department of computer and Systems Sciences Stockholm University/Royal Institute of Technology, 2006: www.dsv.su.se/research/seclab/pages/pdf-files/2006-x-360.pdf#search=%222006-x-360.pdf%22
  3. A. Arkou야-Vafea, "Security of IEEE 802.16. Master of Information and Communication Systems Security" Department of Computer and Systems - Science Royal Institute of Technology, 2006: www.dsv.su.se/research /seclab/pages/pdf-files/2006-x-332.pdf
  4. D. Johnston, J. Walker, "Overview of IEEE 802.16 Security", Published by IEEE Computer Society, 2004:mia.ece.uic.edu/~pages/WWW/Bubbles/segment/WiMax_Security.pdf#search=%22WiMax_Security.pdf%22
  5. M. Barbeau, "WiMAX/802.16 Threat Analysis", School of Computer Science Carleton University 1125 Colonel By Drive. Ottawa, Ontario, Canada, 2005 www.scs.carleton.ca/~barbeau/Publications/2005/iq2-barbeau.pdf#search=%22iq2-barbeau.pdf%22
  6. Frank Ohrtmann: Wimax Handbook. Building 802.16 Wireless Networks - McGraw-Hill Communicaitons, 2005
  7. WiMAX Forum(2006) : Mobile WiMAX: The Best Personal Broadband Experience
  8. J. Bellardo and S. savage, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions", Presented at 11th USENIX Security Symposium, 2003
  9. M. Barbeau, "WiMAX/802.16 threat analysis", in Proceedings of ACM Q2SWinet'05, Montreal, Quebec, Canada, Oct 13, 2005
  10. D. Gollmann, Computer Security(2nd ed.), West Sussex, Wiley, 2006
  11. M. Schumacher, E. B. Fernandez, D. Hybertson, F. Buschmann, and P. Sommerlad, "Security Patterns: Integrating Security and Systems Engineering", Wiley, Chichester, W. Sussex, England, 2006
  12. E. Yang, H. Zhou, L.Zhang, and J. Feng, "An improved security scheme in WMAN based on IEEE Standard 802.16", Wireless Communication, Networking and Mobile Computing, Vol. 2, pp. 1191-1194, Sep. 2005