DOI QR코드

DOI QR Code

Security Scheme for Prevent malicious Nodes in WiMAX Environment

WiMAX 환경에서 악의적 노드 예방을 위한 보안 기법

  • 정윤수 (충북대학교 전자계산학과) ;
  • 김용태 (한남대학교 멀티미디어학부) ;
  • 박길철 (한남대학교 멀티미디어학부) ;
  • 이상호 (충북대학교 전기전자 컴퓨터공학부)
  • Published : 2009.02.28

Abstract

As the use of mobile device is popularized, the needs of variable services of WiMAX technique and the importance of security is increasing. There is a problem that can be easily attacked from a malicious attack because the action is achieved connectionlessly between neighbor link establishing procedure and TEK exchange procedure in mobile WiMAX even though typical 1 hop network security technique is adapted to WiMAX for satisfying these security requirement. In this paper, security connected mechanism which safely connects neighbor link establishing procedure of WiMAX and TEK exchange procedure additional to the basic function provided by IEEE 802.16e standard to satisfy security requirement of mobile WiMAX is proposed. The proposed mechanism strengthens the function of security about SS and BS by application random number and private value which generated by SS and BS to public key of neighbor link establishing procedure and TEK exchange procedure. Also, we can prevent from inside attack like man-in-the-middle which can occur in the request of TEK through cryptographic connection of neighbor link establishing procedure and TEK exchange procedure.

이동 단말기의 사용이 일반화되면서 최근 WiMAX 기술의 다양한 서비스 요구가 점점 증가하여 보안의 중요성이 점점대두되고 있다. 이러한 보안 요구사항을 충족시키기 위해서 WiMAX에 전통적인 1 홉 네트워크 보안기법이 적용되더라도 이동 WiMAX에서는 이웃 링크 설립과정과 TEK 교환 과정사이에 비연결적으로 동작이 이루어져서 악의적이 공격에 쉽게 공격당할 수 있는 문제점을 가지고 있다. 이 논문에서는 이동 WiMAX의 보안 요구사항을 충족하기 위해 IEEE 802.16e 표준에서 제공하는 기본 기능이외에 WiMAX의 이웃 링크 설립 과정과 TEK 교환 과정 사이를 안전하게 연결하는 보안 연계 메커니즘을 제안한다. 제안 메카니즘에서는 SS와 BS가 생성한 임의의 난수와 비밀값을 이웃 링크 설립과 TEK 교환 과정의 암호학적 연결을 통해 TEK 요청에서 발생할 수 있는 man-in-the-middle 공격과 같은 내부 공격을 예방할 수 있다.

Keywords

References

  1. WiMAX Forum NWG, 'Stage-3: Detailed Protocol and Procedures', 2007
  2. IEEE 802.16e-2005, 'Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems', 2006
  3. D. Sweeney, 'WiMax Operator Manual: building 802.16 Wireless Networks', Apress, 2005
  4. D. Johnston and J. Walker, 'Overview of IEEE 802.16 security,' IEEE Security & Privacy, vol. 2, no. 3, pp. 40-88, May/June 2004 https://doi.org/10.1109/MSP.2004.20
  5. S. Xu, M. M. Matthews, and C.-T. Huang, 'Security issues in privacy and key management protocols of IEEE 802.16,' in ACM Southeast Regional Conference, R. Menezes, Ed. ACM, pp. 113-118, 2006
  6. M. Barbeau, 'Wimax/802.16 threat analysis,' in Q2SWinet '05: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks. New York, NY, USA: ACM Press, pp. 8-15, 2005
  7. A. Ghosh, D. R. J. Wolter, G. Andrews, and R. Chen, 'Broadband Wireless Access with WiMax/802.16: Current Performance Benchmarks and Future Potential', IEEE Communications Magazines, vol. 43, issue 2, pp. 129∼136. Feb. 2005
  8. IEEE 802.16e-2005, 'Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems', 2006
  9. IETF RFC 4285, 'Authentication Protocol for Mobile IPv6', 2006
  10. WiMAX Forum NWG, 'Stage-3: Detailed Protocol and Procedures' 2007
  11. S. Xu and C.-T. Huang, "Attacks on PKM protocols of IEEE 802.16 and its later versions", Proceedings of the 3rd International Symposium on Wirelesss Comunication Systems (ISWCS 2006), Sep. 2006
  12. D. Johnston and J. Walker, 'Overview of IEEE 802.16 Security', IEEE Security & Privacy, 2004
  13. S. Xu, M. Mattews and C.-T. Huang, 'Security issues in privacy and key management protocols of IEEE 802.16', Proceedings of the 44th ACM Southeast Conference(ACMSE 2006), Mar. 2006