2016
DOI: 10.1155/2016/9859830
|View full text |Cite
|
Sign up to set email alerts
|

Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations

Abstract: Mobile multihop relay (MMR) WiMAX networks have attracted lots of interest in the wireless communication industry recently because of its scalable coverage, improved data rates, and relatively low cost. However, security of MMR WiMAX networks is the main challenge to be addressed. In this paper, we first identify several possible attacks on MMR WiMAX networks in which a rogue base station (BS) or relay station (RS) can get authenticated and gain control over the connections and show that the current standard d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…It uses Security Protocol Description Language (SPDL) to describe messages, roles, and security parameters. Scyther can be used to verify a protocol by implementing an unbounded or bounded number of roles and sessions [53]. It also has a graphical user interface and represents any attacks found using graphs.…”
Section: B Formal Security Analysismentioning
confidence: 99%
“…It uses Security Protocol Description Language (SPDL) to describe messages, roles, and security parameters. Scyther can be used to verify a protocol by implementing an unbounded or bounded number of roles and sessions [53]. It also has a graphical user interface and represents any attacks found using graphs.…”
Section: B Formal Security Analysismentioning
confidence: 99%
“…They found numerous weaknesses in ISO/IEC 9798 standard protocols 66 . The Scyther tool has been used to analyze and verify the security claims of many new AKA protocols in order to formally verify secrecy claims and mutual authentication for the newly designed protocols 43, 53, 67–73 …”
Section: The Security Verification Via Scyther Toolmentioning
confidence: 99%
“…The work of Zhang et al [152] describes how to set up a fake UMTS base station that connects the UE to a network which is different from the default one, leading to unaware use of expensive roaming services. Finally, the work in [153] describes a MITM attack in WiMAX networks that exploits the lack of synchronization between the user and a legitimate base station to spoof the identity of the user.…”
Section: Security Considerationsmentioning
confidence: 99%