Paper Title
Customized Key Derivation Function for New Time Stamp Identity Authentication Protocol on WiMAX
Abstract
To be able to achieve the desired level of confidentiality, integrity, and availability for the network system and services, future network security faces various important security issues. Many of these security problems need to be addressed in different modes and for different user types, even in the final security standard of Worldwide Interoperability for Microwave Access (WiMAX), Privacy and Key Management version 2 (PKMv2). In this paper a new technique for securing Wireless Local Area Network (WLAN), especially WiMAX networks using customized encryption and decryption standard algorithms that depend on different Secure Hashing Algorithm (SHA) is proposed and applied in our New Timestamp Identity Authentication Protocol (NTIAP). This technique is based on the addition of a new security level for key generation after the Master Session Key (MSK) expansion. This level helps the user to adapt the complexity of all keys derived between the Subscriber Station (SS), served Base Station (BS) and the expected BS during the handover process. Also, we can use the techniques to overcome most of the effects of attacks in the IEEE 802.16 without degrading service quality. The Customized Key Derivation Function (CKDF) was simulated and tested using a MATLAB simulation tool. A Graphical User Interface (GUI) which is capable of generating all types of keys that the user may use in the serving cell, and the expected one during the handover, is also developed. We used the most optimized techniques published for implementing the transformations used in the WiMAX security, to complete our design for the CKDF with our proposed NTIAP. A fair comparison and verification between the two standard authentication protocols (PKMv1 and PKMv2) and the proposed one (NTIAP) after adding the CKDF, is accomplished using the same sets of data and claims. Results demonstrated that the proposed protocol outperforms both standard ones in terms of higher security level since the new solution is efficient to tackling the various security threats such as replay, man in the middle and Denial of Service (DOS) attacks. The revised authentication protocol is expected to provide better secure platform for IEEE 802.16(e). Also, the new design helps the user to work in different modes of operations and with both fixed and mobile WiMAX.
Index Terms - WiMAX, PKM, PKMv1, PKMv2, Nonce, Timestamp, NTIAP, CKDF, AES, AAA, EAP.