scholarly journals Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations

2016 ◽  
Vol 2016 ◽  
pp. 1-12 ◽  
Author(s):  
Jie Huang ◽  
Chin-Tser Huang

Mobile multihop relay (MMR) WiMAX networks have attracted lots of interest in the wireless communication industry recently because of its scalable coverage, improved data rates, and relatively low cost. However, security of MMR WiMAX networks is the main challenge to be addressed. In this paper, we first identify several possible attacks on MMR WiMAX networks in which a rogue base station (BS) or relay station (RS) can get authenticated and gain control over the connections and show that the current standard does not address this problem well. We then propose a set of new authentication protocols for protecting MMR WiMAX networks from rogue BS attack, rogue RS attack, and suppress-replay attack. Our protocols can provide centralized authentication by using a trusted authentication server to support mutual authentication between RS and BS, between RS and RS, and between mobile station (MS) and RS. Moreover, our protocols can also provide distributed authentication with a license issued by the trusted server. We use a formal tool called Scyther to analyze and verify the security properties of our protocols. The results show that our protocols can counter rogue BS and RS attacks and suppress-replay attack and are not susceptible to any known attacks.

Author(s):  
Noor Nateq Alfaisaly ◽  
Suhad Qasim Naeem ◽  
Azhar Hussein Neama

Worldwide interoperability microwave access (WiMAX) is an 802.16 wireless standard that delivers high speed, provides a data rate of 100 Mbps and a coverage area of 50 km. Voice over internet protocol (VoIP) is flexible and offers low-cost telephony for clients over IP. However, there are still many challenges that must be addressed to provide a stable and good quality voice connection over the internet. The performance of various parameters such as multipath channel model and bandwidth over the Star trajectoryWiMAX network were evaluated under a scenario consisting of four cells. Each cell contains one mobile and one base station. Network performance metrics such as throughput and MOS were used to evaluate the best performance of VoIP codecs. Performance was analyzed via OPNET program14.5. The result use of multipath channel model (disable) was better than using the model (ITU pedestrian A). The value of the throughput at 15 dB was approximately 1600 packet/sec, and at -1 dB was its value 1300 packet/se. According to data, the Multipath channel model of the disable type the value of the MOS was better than the ITU Pedestrian A type.


Author(s):  
Shixun Wu ◽  
Min Li ◽  
Miao Zhang ◽  
Kai Xu ◽  
Juan Cao

AbstractMobile station (MS) localization in a cellular network is appealing to both industrial community and academia, due to the wide applications of location-based services. The main challenge is the unknown one-bound (OB) and multiple-bound (MB) scattering environment in dense multipath environment. Moreover, multiple base stations (BSs) are required to be involved in the localization process, and the precise time synchronization between MS and BSs is assumed. In order to address these problems, hybrid time of arrival (TOA), angle of departure (AOD), and angle of arrival (AOA) measurement model from the serving BS with the synchronization error is investigated in this paper. In OB scattering environment, four linear least square (LLS), one quadratic programming and data fusion-based localization algorithms are proposed to eliminate the effect of the synchronization error. In addition, the Cramer-Rao lower bound (CRLB) of our localization model on the root mean-square error (RMSE) is derived. In hybrid OB and MB scattering environment, a novel double identification algorithm (DIA) is proposed to identify the MB path. Simulation results demonstrate that the proposed algorithms are capable to deal with the synchronization error, and LLS-based localization algorithms show better localization accuracy. Furthermore, the DIA can correctly identify the MB path, and the RMSE comparison of different algorithms further prove the effectiveness of the DIA.


2011 ◽  
Vol 2 (1) ◽  
pp. 103-114 ◽  
Author(s):  
Mohammad Hassan Habibi ◽  
Mahmoud Gardeshi ◽  
Mahdi Alaghband

Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5824
Author(s):  
Souhir Gabsi ◽  
Vincent Beroulle ◽  
Yann Kieffer ◽  
Hiep Manh Dao ◽  
Yassin Kortli ◽  
...  

The radio frequency identification (RFID) system is one of the most important technologies of the Internet of Things (IoT) that tracks single or multiple objects. This technology is extensively used and attracts the attention of many researchers in various fields, including healthcare, supply chains, logistics, asset tracking, and so on. To reach the required security and confidentiality requirements for data transfer, elliptic curve cryptography (ECC) is a powerful solution, which ensures a tag/reader mutual authentication and guarantees data integrity. In this paper, we first review the most relevant ECC-based RFID authentication protocols, focusing on their security analysis and operational performances. We compare the various lightweight ECC primitive implementations designed for RFID applications in terms of occupied area and power consumption. Then, we highlight the security threats that can be encountered considering both network attacks and side-channel attacks and analyze the security effectiveness of RFID authentication protocols against such types of attacks. For this purpose, we classify the different threats that can target an ECC-based RFID system. After that, we present the most promising ECC-based protocols released during 2014–2021 by underlining their advantages and disadvantages. Finally, we perform a comparative study between the different protocols mentioned regarding network and side-channel attacks, as well as their implementation costs to find the optimal one to use in future works.


2016 ◽  
Vol 78 (5-10) ◽  
Author(s):  
Nurul Nazirah Mohd Imam Ma’arof ◽  
Norsheila Fisal

Mobile Multihop Relay (MMR) network is an attractive and low-cost solution for expanding service coverage and enhancing throughput of the conventional single hop network. However, mobility of Mobile Station (MS) in MMR network might lead to performance degradation in terms of Quality of Service (QoS). Selecting an appropriate Relay Station (RS) that can support data transmission for high mobility MS to enhance QoS is one of the challenges in MMR network. The main goal of the work is to develop and enhance relay selection mechanisms that can assure continuous connectivity while ensuring QoS in MMR network using NCTUns simulation tools. The approach is to develop and enhance a relay selection for MS with continuous connectivity in non-transparent relay. In this approach, the standard network entry procedure is modified to allow continuous connectivity with reduced signaling messages whenever MS joins RS that is out of Multihop Relay Base Station (MRBS) coverage and the relay selection is based on Signal to Noise Ratio (SNR). The QoS performances of the proposed relay selections are in terms of throughput and average end-to-end (ETE) delay. The findings for the proposed relay selection in non-transparent relay shows that the throughput degradation between low mobility MS (30m/s) and high mobility MS (50m/s) is only about 2.0%. The proposed relay selection mechanisms can be applied in any high mobility multi-tier cellular network.


2014 ◽  
Vol 543-547 ◽  
pp. 2255-2261
Author(s):  
Bing Zhang ◽  
Zhi Guang Qin ◽  
Guo Gen Wan ◽  
Xin Xin Ma

This document analyzes the security drawback of the Hash-based algorithm authentication protocols which is frequently used in low-cost RFID systems, and proposes a lightweight mutual authentication protocol. In the proposed protocol, all authenticated information is encrypted , the location privacy is also provided by refreshing an identifier of a tag in each session and lost massages can be recovered from many attacks such as spoofing attacks. The comparison result of the simulation experiment and the formal correctness proof of the proposed authentication protocol is based on BAN logic. It shows that the proposed protocol in this article greatly enhance the capability of verifiability, confidentiality and integrality, it also corrects the existing Hash-based protocol secure deficiency so that it is more suitable for low-cost RFID systems than those existing ones.


2013 ◽  
Vol 411-414 ◽  
pp. 16-20 ◽  
Author(s):  
Zhi Cai Shi ◽  
Jin Zu Zhou ◽  
Yong Xiang Xia ◽  
Chao Gang Yu

RFID is a key technology that can be used to create the ubiquitous society. Owing to the characteristics of RFID systems, it may pose a serious threat to privacy and security. In order to solve these problems we proposed a novel mutual authentication protocol based on NTRU which can prevent tracing, eavesdropping, replay attack, and backward traceability effectively. This protocol uses less computing and memory resources, and it is very suitable to some low-cost RFID systems.


Author(s):  
Ashish Joshi ◽  
Amar Kumar Mohapatra

Background & Objective: Cryptographic protocols had been evident method for ensuring con dentiality, Integrity and authentication in various digital communication systems. However the validation and analysis of such cryptographic protocols was limited to usage of formal mathematical models until few years back. Methods: In this paper, various popular cryptographic protocols have been studied. Some of these protocols (PAP, CHAP, and EAP) achieve security goals in peer to peer communication while others (RADIUS, DIAMETER and Kerberos) can work in multiparty environment. These protocols were validated and analysed over two popular security validation and analysis tools AVISPA and Scyther. The protocols were written according to their documentation using the HLPSL and SPDL for analysis over AVISPA and Scyther respectively. The results of these tools were analysed to nd the possible attack an each protocol. Afterwards The execution time analysis of the protocols were done by repeating the experiment for multiple iterations over the command line versions of these tools.As the literature review suggested, this research also validates that using password based protocols (PAP) is faster in terms of execution time as compared to other methods, Usage of nonces tackles the replay attack and DIAMETER is secure than RADIUS. Results and Conclusion: The results also showed us that DIAMETER is faster than RADIUS. Though Kerberos protocol was found to safe, the results tell us that it is compromisable under particular circumstances.


Sign in / Sign up

Export Citation Format

Share Document