Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: INITIAL NETWORK ENTRY BASICS pdf
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
INITIAL NETWORK ENTRY BASICS

[attachment=38807]

THREATS TO INITIAL NETWORK ENTRY PROCESS

The threats that are possible to initial network entry process are given below [1, 6]:
(1) RNG-RSP vulnerability
(2) Auth-Request and Invalid vulnerability
(3) Rogue BS

RNG-RSP vulnerability

The messages that are used in the initial ranging process are RNG-REQ and RNG-RSP. RNG-REQ
message is used by the MS for requesting the BS to join the network [3] and RNG-RSP message is used by the
BS in response to the RNG-REQ message to the MS containing basic and primary CID. These ranging messages
are not encrypted and hence the attacker can access it and modify it accordingly.
In RNG-RSP vulnerability, the attacker can modify this message and set the status as failed. The attacker
can resends this message to the MS, which indicates the MS that it has to go for initial ranging again. An
attacker may intercept the RNG-RSP message again and again with the status providing as failed [1, 6]. Hence,
the MS cannot join the network and leads to the DoS attack. The solution to this problem is to use Diffie-
Hellman key exchange algorithm.

Auth-Request and Invalid vulnerability

In Auth-Request and Invalid vulnerability, the attacker intercepts the Auth-Request message and resends it
to the BS continuously. As the BS gets Auth-Request message continuously, it would be confused and sets the
Auth-Response message as failed. In some cases, an attacker may intercept the Auth-Response message and
resend it to the MS after time out period [1, 6].
The solution to this problem is to use the time-stamps. By adding time-stamps to the authorization
messages, MS and BS can verify that whether the authorization message is proper. Hence the attacker also
cannot modify the message. Use of time stamps avoids the replay attack.

PROPOSED MECHANISM

The suggested solution for the initial network entry process in some paper is to use Diffie-Hellman key
exchange algorithm. In this paper the mechanism is given which uses Elliptic Curve Diffie-Hellman (ECDH)
key exchange algorithm, which is explained in the next section, instead of Diffie-Hellman algorithm. The reason
behind using ECDH algorithm is to improve the security as well as to improve the performance of the system.
The performance will be increased because ECDH is much faster than the simple Diffie-Hellman algorithm.
The proposed model for initial network entry is shown in fig. 2. This proposed mechanism solves two
issues of initial network entry: RNG-RSP vulnerability and Rouge BS [6]. Here, the ECDH algorithm is used to
generate a common secrete key called as pre-TEK. This key is used to encrypt the RNG-RSP message. Hence
the intruder cannot modify the message. Hence MS and BS can perform secure ranging process. In the ranging
process the secure channel will be established, because of which the SBC parameter and authentication
messages are securely exchanged. As the complete initial network entry process is secure, the authentication
vulnerability gel also solved.
The initial network entry procedure is the first step in establishing a connection on an IEEE 802.16 (WiMAX) network. The process involves the transmission of unencrypted management messages, which constitutes a major security breach. The Man-InThe-Middle (MITM) attack exploits this weakness in the network by listening, intercepting and fabricating management messages, resulting in a breach of network-wide reliability. In this paper we analyze a modification of the proposed Diffie-Hellman key exchange protocol to mitigate the man-on-a-WiMAX attack by modeling the protocol in Promela. Verification is then performed by using the Spin model tester with the simultaneous interaction of an intrusive process to test or refute the validity of the protocol.

Global interoperability for microwave access (WiMAX-802.16) is an emerging standard that provides wireless broadband access with high bandwidths and transmission speeds. However, like all other wireless networks, WiMAX is vulnerable to network attacks that compromise the radio links between the communicating subscriber station (SS) and the service base station. With the integration of mobility in the Mobile WiMAX 802.16e 2005, complexities are introduced to ensure secure access to this network. Mobile WiMAX uses the privacy protocol and key management version 2 (PKMv2) that supports robust mutual authentication mechanisms, Advanced Encryption Standard (AES) and message confidentiality using Hashbased Message Authentication Code (HM) or Cipher based MAC (CMAC).