Loading…
Design of distributed security architecture for multihop WiMAX networks
In this paper, we study the current security standards in multihop WiMAX networks and their security issues. For secured communications, hop-by-hop authentication is necessary for any multihop wireless networks [5][6]. WiMAX multihop networks provide default hop-by-hop authentication in a distribute...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 61 |
container_issue | |
container_start_page | 54 |
container_title | |
container_volume | |
creator | Rengaraju, P Chung-Horng Lung Srinivasan, A |
description | In this paper, we study the current security standards in multihop WiMAX networks and their security issues. For secured communications, hop-by-hop authentication is necessary for any multihop wireless networks [5][6]. WiMAX multihop networks provide default hop-by-hop authentication in a distributed security mode only. Apart from this, the multihop standards should consider the existing security issues in mobile WiMAX standard [4]. The new multihop standard IEEE 802.16m has improved functionalities and security support. It provides the solution for medium access control (MAC)-control message issues. At the same time, network coding is used for enhanced-multicast broadcast service (E-MBS) retransmission to improve the performance of MBS. However, the standard IEEE 802.16m/D4 fails to consider the security threats for network coding, multihop support and initial ranging. For the above issues, we propose a distributed security architecture using the Elliptic Curve Diffie-Hellman (ECDH) key exchange protocol. Our proposed architecture solves the network coding and other multihop security issues with the help of neighbor authentication/security association (SA), distributed security architecture and ECDH protocol. |
doi_str_mv | 10.1109/PST.2010.5593247 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5593247</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5593247</ieee_id><sourcerecordid>5593247</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-7f3066e499a6d4ef0eb4f364328253a8563eeaf053607be3d08a58b0106e05db3</originalsourceid><addsrcrecordid>eNotj81KAzEURiMiqHX2gpu8wNT83CSTZalahYqCFbsrmZkbG207JclQ-vYWnG_zcTYHDiG3nI05Z_b-_WMxFuxESlkpwJyRaw4CwCiwy3NSWFMNrLi8JEVKP-w0UIJruCKzB0zhe0c7T9uQcgx1n7GlCZs-hnykLjbrkLHJfUTqu0i3_SaHdbenX-F1sqQ7zIcu_qYbcuHdJmEx_Ih8Pj0ups_l_G32Mp3My8CNyqXxkmmNYK3TLaBnWIOXGqSohJKuUloiOs-U1MzUKFtWOVXVpz6NTLW1HJG7f29AxNU-hq2Lx9XQLv8AVUdNBQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Design of distributed security architecture for multihop WiMAX networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Rengaraju, P ; Chung-Horng Lung ; Srinivasan, A</creator><creatorcontrib>Rengaraju, P ; Chung-Horng Lung ; Srinivasan, A</creatorcontrib><description>In this paper, we study the current security standards in multihop WiMAX networks and their security issues. For secured communications, hop-by-hop authentication is necessary for any multihop wireless networks [5][6]. WiMAX multihop networks provide default hop-by-hop authentication in a distributed security mode only. Apart from this, the multihop standards should consider the existing security issues in mobile WiMAX standard [4]. The new multihop standard IEEE 802.16m has improved functionalities and security support. It provides the solution for medium access control (MAC)-control message issues. At the same time, network coding is used for enhanced-multicast broadcast service (E-MBS) retransmission to improve the performance of MBS. However, the standard IEEE 802.16m/D4 fails to consider the security threats for network coding, multihop support and initial ranging. For the above issues, we propose a distributed security architecture using the Elliptic Curve Diffie-Hellman (ECDH) key exchange protocol. Our proposed architecture solves the network coding and other multihop security issues with the help of neighbor authentication/security association (SA), distributed security architecture and ECDH protocol.</description><identifier>ISBN: 9781424475513</identifier><identifier>ISBN: 1424475511</identifier><identifier>EISBN: 142447549X</identifier><identifier>EISBN: 1424475740</identifier><identifier>EISBN: 1424475503</identifier><identifier>EISBN: 9781424475742</identifier><identifier>EISBN: 9781424475490</identifier><identifier>EISBN: 9781424475506</identifier><identifier>DOI: 10.1109/PST.2010.5593247</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Distance measurement ; IEEE 802.16j ; IEEE 802.16m ; Multi-hop Relay ; Network coding ; Protocols ; Security ; Spread spectrum communication ; WiMAX</subject><ispartof>2010 Eighth International Conference on Privacy, Security and Trust, 2010, p.54-61</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5593247$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5593247$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Rengaraju, P</creatorcontrib><creatorcontrib>Chung-Horng Lung</creatorcontrib><creatorcontrib>Srinivasan, A</creatorcontrib><title>Design of distributed security architecture for multihop WiMAX networks</title><title>2010 Eighth International Conference on Privacy, Security and Trust</title><addtitle>PST</addtitle><description>In this paper, we study the current security standards in multihop WiMAX networks and their security issues. For secured communications, hop-by-hop authentication is necessary for any multihop wireless networks [5][6]. WiMAX multihop networks provide default hop-by-hop authentication in a distributed security mode only. Apart from this, the multihop standards should consider the existing security issues in mobile WiMAX standard [4]. The new multihop standard IEEE 802.16m has improved functionalities and security support. It provides the solution for medium access control (MAC)-control message issues. At the same time, network coding is used for enhanced-multicast broadcast service (E-MBS) retransmission to improve the performance of MBS. However, the standard IEEE 802.16m/D4 fails to consider the security threats for network coding, multihop support and initial ranging. For the above issues, we propose a distributed security architecture using the Elliptic Curve Diffie-Hellman (ECDH) key exchange protocol. Our proposed architecture solves the network coding and other multihop security issues with the help of neighbor authentication/security association (SA), distributed security architecture and ECDH protocol.</description><subject>Authentication</subject><subject>Distance measurement</subject><subject>IEEE 802.16j</subject><subject>IEEE 802.16m</subject><subject>Multi-hop Relay</subject><subject>Network coding</subject><subject>Protocols</subject><subject>Security</subject><subject>Spread spectrum communication</subject><subject>WiMAX</subject><isbn>9781424475513</isbn><isbn>1424475511</isbn><isbn>142447549X</isbn><isbn>1424475740</isbn><isbn>1424475503</isbn><isbn>9781424475742</isbn><isbn>9781424475490</isbn><isbn>9781424475506</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj81KAzEURiMiqHX2gpu8wNT83CSTZalahYqCFbsrmZkbG207JclQ-vYWnG_zcTYHDiG3nI05Z_b-_WMxFuxESlkpwJyRaw4CwCiwy3NSWFMNrLi8JEVKP-w0UIJruCKzB0zhe0c7T9uQcgx1n7GlCZs-hnykLjbrkLHJfUTqu0i3_SaHdbenX-F1sqQ7zIcu_qYbcuHdJmEx_Ih8Pj0ups_l_G32Mp3My8CNyqXxkmmNYK3TLaBnWIOXGqSohJKuUloiOs-U1MzUKFtWOVXVpz6NTLW1HJG7f29AxNU-hq2Lx9XQLv8AVUdNBQ</recordid><startdate>201008</startdate><enddate>201008</enddate><creator>Rengaraju, P</creator><creator>Chung-Horng Lung</creator><creator>Srinivasan, A</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201008</creationdate><title>Design of distributed security architecture for multihop WiMAX networks</title><author>Rengaraju, P ; Chung-Horng Lung ; Srinivasan, A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-7f3066e499a6d4ef0eb4f364328253a8563eeaf053607be3d08a58b0106e05db3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Authentication</topic><topic>Distance measurement</topic><topic>IEEE 802.16j</topic><topic>IEEE 802.16m</topic><topic>Multi-hop Relay</topic><topic>Network coding</topic><topic>Protocols</topic><topic>Security</topic><topic>Spread spectrum communication</topic><topic>WiMAX</topic><toplevel>online_resources</toplevel><creatorcontrib>Rengaraju, P</creatorcontrib><creatorcontrib>Chung-Horng Lung</creatorcontrib><creatorcontrib>Srinivasan, A</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Rengaraju, P</au><au>Chung-Horng Lung</au><au>Srinivasan, A</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Design of distributed security architecture for multihop WiMAX networks</atitle><btitle>2010 Eighth International Conference on Privacy, Security and Trust</btitle><stitle>PST</stitle><date>2010-08</date><risdate>2010</risdate><spage>54</spage><epage>61</epage><pages>54-61</pages><isbn>9781424475513</isbn><isbn>1424475511</isbn><eisbn>142447549X</eisbn><eisbn>1424475740</eisbn><eisbn>1424475503</eisbn><eisbn>9781424475742</eisbn><eisbn>9781424475490</eisbn><eisbn>9781424475506</eisbn><abstract>In this paper, we study the current security standards in multihop WiMAX networks and their security issues. For secured communications, hop-by-hop authentication is necessary for any multihop wireless networks [5][6]. WiMAX multihop networks provide default hop-by-hop authentication in a distributed security mode only. Apart from this, the multihop standards should consider the existing security issues in mobile WiMAX standard [4]. The new multihop standard IEEE 802.16m has improved functionalities and security support. It provides the solution for medium access control (MAC)-control message issues. At the same time, network coding is used for enhanced-multicast broadcast service (E-MBS) retransmission to improve the performance of MBS. However, the standard IEEE 802.16m/D4 fails to consider the security threats for network coding, multihop support and initial ranging. For the above issues, we propose a distributed security architecture using the Elliptic Curve Diffie-Hellman (ECDH) key exchange protocol. Our proposed architecture solves the network coding and other multihop security issues with the help of neighbor authentication/security association (SA), distributed security architecture and ECDH protocol.</abstract><pub>IEEE</pub><doi>10.1109/PST.2010.5593247</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424475513 |
ispartof | 2010 Eighth International Conference on Privacy, Security and Trust, 2010, p.54-61 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5593247 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authentication Distance measurement IEEE 802.16j IEEE 802.16m Multi-hop Relay Network coding Protocols Security Spread spectrum communication WiMAX |
title | Design of distributed security architecture for multihop WiMAX networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T19%3A49%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Design%20of%20distributed%20security%20architecture%20for%20multihop%20WiMAX%20networks&rft.btitle=2010%20Eighth%20International%20Conference%20on%20Privacy,%20Security%20and%20Trust&rft.au=Rengaraju,%20P&rft.date=2010-08&rft.spage=54&rft.epage=61&rft.pages=54-61&rft.isbn=9781424475513&rft.isbn_list=1424475511&rft_id=info:doi/10.1109/PST.2010.5593247&rft.eisbn=142447549X&rft.eisbn_list=1424475740&rft.eisbn_list=1424475503&rft.eisbn_list=9781424475742&rft.eisbn_list=9781424475490&rft.eisbn_list=9781424475506&rft_dat=%3Cieee_6IE%3E5593247%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-7f3066e499a6d4ef0eb4f364328253a8563eeaf053607be3d08a58b0106e05db3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5593247&rfr_iscdi=true |