SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE)
e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 2 Ver. I (Mar. – Apr. 2016), PP 42-46
www.iosrjournals.org
DOI: 10.9790/1676-1102014246 www.iosrjournals.org 42 | Page
Mutual Authentication in Wimax Security Using Diffie Hellman
Stephen Ochieng Oguta1
, Dr. S. Musyoki2
, Dr. K. Langat3
1
Msc in Telecommunication And Information Engineering Student At Jomo Kenyatta University Of Agriculture
And Technology ( P.O BOX 333, 40222 Oyugis Kenya,
2
Department Of Telecommunication And Information Engineering At Jomo Kenyatta University Of Agriculture
And Technology (P.O.Box 62000, 00200, Nairobi, Kenya,
3
Senior Lecturer, Department Of Telecommunication And Information Engineering At Jomo Kenyatta
University Of Agriculture And Technology, (P.O.Box 62000, 00200, Nairobi, Kenya,
Abstract: Network security is becoming an area of concern with the expansion of wireless technology. Many
businesses have lost a lot of money as a result of compromised network security. The Worldwide
Interoperability for Microwave Access (WiMAX) is one example of 3G technology which is getting popular.
Most business establishemnst use WiMAX to network their communication equipments. The popularity of
WiMAX and its security vulnarability are the key motivation for this study. Presently, PKM versions of
authentication are used to secure WiMAX networks. The PKM authentication methods expose the WiMAX
network to third party risks like Man in the Middle attacks, eavesdropping and jamming attacks. WiMAX is thus
vulnerable to network attacks that compromise the radio links between the communicating Subscriber Station
(SS) and the serving Base Station (BS). The PKMv1 process involves a one sided authentication. The BS
authenticates the SS but the SS has no capacity to authenticate a BS. As a result, a rogue BS can successfully
enter the network of a SS without prevention. The rogue BS can then tap all the unencrypted management
messages. This constitutes a major security flaw. The Man-In- The-Middle (MITM) attack exploits this weakness
in the network by eavesdropping, interception and fabrication of the management messages, resulting in a
breach in the reliability of the entire network. In this research, a modification of the Diffie-Hellman (DH) key
exchange protocol is used to mitigate the man-in-the middle attack in WiMAX by modeling using the Dev C++
programming language. The DH protocol uses a unique algorithm whose solution must be obtained by both the
SS and the BS for communication to be allowed. Both the BS and the SS are given an opportunity to authenticate
one another before any communication can proceed.
Keywords: Diffie Hellman; Mutual Authentication; Security; WiMAX.
I. Introduction
With the deployment of wireless communication in recent years, security issues in wireless networks
also become a growing concern [1] [2]. The Institute of Electrical and Electronics Engineers (IEEE) and Internet
Engineers Task Force (IETF) has proposed security mechanisms and protocols to countermeasure security
breaches in a way that minimizes the damage which may be caused by the attacks [4]. Even if WiMAX
technology has complex authentication and authorization methods and a very strong encryption technique it is
still vulnerable to different attacks or threats like jamming, scrambling, MITM or water torture attacks [8].
Privacy or confidentiality is fundamental for secure communication, which provides resistance to interception
and eavesdropping. Man-in-the-middle attack is another classic attack and is generally applicable in a
communication protocol where mutual authentication is absent. Other familiar attacks include parallel session
attack, reflection attack, interleaving attack, attack due to type flaw, attack due to name omission, and attack due
to misuse of cryptographic services. PKM V1 and PKM V2 have been used in WiMAX for security purposes
[3]. The above versions only secure the data being transferred. It also secures the BS. The MS/SS is however
left vulnerable to rogue BS [4]. The rogue BS can tap the management messages before the actual passing of
transmitted data. This paper addresses the weaknesses in WiMAX security system and consequently illustrates
how DH can help improve the WiMAX network security. MITH takes advantage of the absence of mutual
authentication to pose threats to the system [3].
1.1 Objective
The main objective of this paper is to highlight the application of DH algorithm in WiMAX mutual
authentication
II. Diffie Hellman Algorithm
The latest standard, IEEE 802.16e-2005, includes a new version (PKMv2) of the protocol that caters
for the shortcomings of the first version. PKMv1 does not have a capacity for mutual authentication.
Mutual Authentication In Wimax Security Using Diffie Hellman
DOI: 10.9790/1676-1102014246 www.iosrjournals.org 43 | Page
Furthermore PKMv2 supports two different mechanisms for authentication: the SS and the BS may use RSA-
based authentication or Extensible Authentication Protocol (EAP) -based authentication [21]. This is because
the RSA based authentication applies X.509 digital certificates together with RSA encryption. Authentication is
therefore made more secure. However, the exchange of vital management information is done before securing
the network. In the PKMv2, the BS asks the SS for its certificates and manufacturing IDs. The BS also sends its
management information details to SS in the public environment. Such vital information can be tapped by a
rogue Station.
Mutual authentication takes place in PKMv2 only after the transfer of management information. This is
where DH algorithm comes in handy. DH carries out authentication first before the exchange of management
information gets transferred.
The basic version of the Diffie-Hellman protocol is implemented as described below:
Let
1
2
Where:
 PkMS is the mobile Station’s public key
 PkBS is the base Station’s public key
 G and P are global variables called primes numbers
 G is a primitive root of P.
 ‘Na’ and ‘Nb’ are the private keys of the MS and the BS respectively.
In the basic version of DH, after the respective exchange of the public keys, the MS and the BS
calculate the shared encryption key as shown in the equations 1 and 2. In order to implement mutual
authentication, AS sends Na to BS, BS calculates AKB [6], [7]. BS then sends another unique number Nb to SS.
Similarly, SS calculates AKS. If AKS is equal to AKB, AS believes this message sent by BS [8]. The AK in
both SS and BS is calculated as follows:
3
The equation 3 illustrates the implementation of DH protocol.
Figure 1: Implementation procedure for DH
Key
Na- Unique number from SS
Nb- Unique number from BS
AKB- BS authentication key
The Diffie Hellman Mutual Authentication Code
Diffie-Hellman key exchange (DH) is a cryptographic protocol that allows two parties that have no
prior knowledge of each other to establish together a shared secret key over an insecure communications
SS sends its Na
to BS
BS sends its Nb to SS
BS calculates AK
SS Calculates AK
AKS = AKB
Allow communication
Mutual Authentication In Wimax Security Using Diffie Hellman
DOI: 10.9790/1676-1102014246 www.iosrjournals.org 44 | Page
channel [2] [5]. Then they use this key to encrypt subsequent communications using a symmetric-key cipher.
The scheme was first published publicly by Whitfield Diffie and Martin [4].
Figure 3.1 illustrates the implementation procedure of the proposed protocol. The SS sends a number Na to the
BS. The BS then sends another unique number Nb to SS. BS calculates a unique authentication key using the
number received from the SS. The SS also calculates a unique authentication key using the number received
from the BS. The two results obtained from the calculations must be the same for authentication is to succeed.
Communication will be terminated if AKS and AKB are not the same. The mutual authentication code for DH
protocol is programmed in Dev C ++ as shown in the code at the appendix section. The following code is
written in Dev C++. This program has the mutual authentication functions that illustrate DH algorithm.
III. Results And Discussion
Dev C ++ allows for the demonstration of DH mutual authentication. The above code is written to help
a BS and an SS to communicate one to another and in the process establish a shared authentication key that is
later used to access the network [1]. The Responder commits to a protocol session with the Initiator if, and only
if, it has correctly finished the session with the Initiator. The Responder will only commit to the Initiator if the
latter is correctly authenticated by the Responder and the same applies to the Initiator, if it correctly validates the
identity of the Responder as expressed in the challenge response process of the model. In the equations above,
Nb is the nonce generated by the Responder, while Na is the nonce generated by Initiator.
Equation 3 explains that a shared authentication key must be obtained if two parties are to
communicate. The results obtained in figure 2 below show the mutual authentication process. The SS selects its
first number to be used in the DH algorithm. This number is used to obtain that calculation result. The result is
then sent to BS in a public non secured environment [4]. The BS equally selects its number then sends the result
of calculation. The two equipments only arrive at the same solution to the algorithm is they have the right
formula. A wrong result is obtained is an equipment has a wring algorithm. This translates to a MITH.
Suspicious equipment can never get the right solution to the challenge because the algorithm is only known to
legitimate BS and SS [8]. A legitimate station will always get the correct solution to the algorithm challenge. It
is also necessary to have more than one trial on the algorithm challenge. This means that a legitimate station can
sometimes miss the correct choice of number in the initial attempt. DH algorithm helps two stations which have
no prior knowledge of one another to establish a common authentication key. System details can then be
exchanged once the shared authentication key is obtained.
IV. Conclusion
Privacy or confidentiality is fundamental for secure communication, which provides resistance to
interception and eavesdropping. Message authentication provides integrity of the message and sender
authentication, corresponding to the security attacks of message modification and impersonation. Even if
WiMAX technology has complex authentication and authorization methods and a very strong encryption
technique, it is still vulnerable to different attacks or threats like jamming, scrambling, MITM or water torture
attacks [8].
The results show that the DH protocol works to keep away any intruder in the network. The goal of DH
is to carry out mutual authentication. The process of solving the algorithm is complex and only known by the
legitimate communication gadgets. Any MITH is kept at bay since they do not have the knowledge of the
protocol. Diffie Hellmann protocol algorithm introduces mutual authentication between the BS and SS prior to
the exchange of any management information. WiMAX is selected for this research because it is a recent
technology and is presently being rolled out in many parts of the world because of its broadband capacities.
Further research is needed on the actual implementation of DH protocol in new mobile devices lke smart phones
and Ipads.
Acknowledgement
S. Oguta would like to thank Dr. S. Musyoki and DR. K. Langat for your guidance and presence during
the preparation of this paper. S. Oguta also appreciates his family for their understanding and encouragement.
Mutual Authentication In Wimax Security Using Diffie Hellman
DOI: 10.9790/1676-1102014246 www.iosrjournals.org 45 | Page
Figure 2: Results of compilation
References
[1]. Z.You, X. Xie, W.Zheng," Verification and Research of a WiMAX authentication protocol Based on SSM", ICETC, pp. 34-43,
2010.
[2]. E.Yuksel," Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis", Technical Paper at University of
Denmark, pp. 45-54, Feb 2007.
[3]. Z.You, X.Xie, W.Zheng," Verification and Research of a WiMAX authentication protocol Based on SSM", ICETC, pp. 22-32,
2010.
[4]. H.Tseng, R.Hong, W.Yang,"A chaotic maps-base key agreement protocol that preserves user anonymity", IEEE ICC, vol. 3, pp. 67-
70, 2009.
[5]. S.Sidharth, M.P.Sebastian," A Revised Secure Authentication Protocol for IEEE 802.16 (e)", International Conference on Advances
in Computer Engineering, pp. 34-42, 2010.
[6]. K.C.Chen, J.Boberto and B. De Marca, Mobile WiMAX. John Wiley & Sons Ltd, p. 56, 2008.
[7]. M.Barbeau, "WiMAX/802.16 Threat Analysis," in Proceedings of ACM Q2SWinet'05, Montreal, Quebec, Canada, 2005, pp. 8-15.
[8]. K. Jensen, L.Kristensen, L. Wells," Colored Petri Nets and CPN Tools for Modeling and Validation of Concurrent Systems”,
Department of Computer Science, pp. 112-122, 2008.
[9]. D. Gollmann. Computer Security Second Edition West Sussex, England: John Wiley & Sons, Ltd, 2006. Pp. 45.
Appendix
Implementation Code:
#include <iostream>
#include <math.h>
using namespace std;
int main ()
{
cout << "nntt" ;
int g, a, p, b, b2, A, X, B, Y, C, D, E, F, K1, K2 ;
cout << "SS to enter its unique numbernn";
g = 5;
p = 7; // the SS and BS agree to use same values of g and p. such an agreement is set at the point of
manufacture
cout << "nntt" ;
cin >> a ; // the SS selects its unique number for computation
cout << "nnttt" ;
A = pow (g, a);
cout << "the first SS computation result is nnntt" ;
B = A % p ;
cout << B ; // this is the value obtained by the SS
cout << "nntt";
// X is then sent by the SS across the network to the BS.
cout << " BS to enter its first unique number nntt" ;
cin >> b ; // BS selects its unique number for computation
Mutual Authentication In Wimax Security Using Diffie Hellman
DOI: 10.9790/1676-1102014246 www.iosrjournals.org 46 | Page
cout << "nn" ;
C = pow (g, b) ;
cout << "nntt" ;
D = C % p;
cout << "the BS computation result is: nntt";
cout << D ;
cout << "nntt" ;
cout << "SS sends its result to BS and BS equally sends its result to SS. these received values are used
in step two calculation nn" ;
E = pow (D, a) ;
cout << "nntt" ;
K1 = E % p ;
cout << "the authentication key obtained from SS is: nntt" ;
cout << K1 ;
cout << "nn" ;
F = pow (C, a);
cout << "nn" ;
K2 = F % p ;
cout << "nntt" ;
cout << "The authentication key obtained from BS is: nntt" ;
cout << K2;
cout << "nntt" ;
if ( K1 == K2)
{
cout << "value is the same mutual authentication has been obtained continue with communication the network
is securenntt" ;
}
else
{ cout << " mutual authentication not obtained. try againnntt" ;
cout << "SS to enter its unique number for second attempt nntt";
}

Mais conteúdo relacionado

Mais procurados

A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...IJNSA Journal
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 MULTI-STAGE ENCRYPTION USING SEEDED SDES MULTI-STAGE ENCRYPTION USING SEEDED SDES
MULTI-STAGE ENCRYPTION USING SEEDED SDESEswar Publications
 
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLESPROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLESIJNSA Journal
 
An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...Alexander Decker
 
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...IJNSA Journal
 
IRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DESIRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DESIRJET Journal
 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notesJayanth Dwijesh H P
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DESIRJET Journal
 
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...cscpconf
 
A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...csandit
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Shakas Technologies
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...ijcsit
 

Mais procurados (13)

A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 MULTI-STAGE ENCRYPTION USING SEEDED SDES MULTI-STAGE ENCRYPTION USING SEEDED SDES
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLESPROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
 
An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...
 
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
 
IRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DESIRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DES
 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notes
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
 
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
 
A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
 
Final report
Final reportFinal report
Final report
 

Destaque

A Generalization of QN-Maps
A Generalization of QN-MapsA Generalization of QN-Maps
A Generalization of QN-MapsIOSR Journals
 
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...IOSR Journals
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasIOSR Journals
 
The Performance Analysis of a Fettling Shop Using Simulation
The Performance Analysis of a Fettling Shop Using SimulationThe Performance Analysis of a Fettling Shop Using Simulation
The Performance Analysis of a Fettling Shop Using SimulationIOSR Journals
 
A Study on the Relationship between Nutrition Status and Physical Fitness of ...
A Study on the Relationship between Nutrition Status and Physical Fitness of ...A Study on the Relationship between Nutrition Status and Physical Fitness of ...
A Study on the Relationship between Nutrition Status and Physical Fitness of ...IOSR Journals
 
Optimized Traffic Signal Control System at Traffic Intersections Using Vanet
Optimized Traffic Signal Control System at Traffic Intersections Using VanetOptimized Traffic Signal Control System at Traffic Intersections Using Vanet
Optimized Traffic Signal Control System at Traffic Intersections Using VanetIOSR Journals
 
Cutting Strategies for Casting Die Manufacturing on CNC Milling Machine
Cutting Strategies for Casting Die Manufacturing on CNC Milling MachineCutting Strategies for Casting Die Manufacturing on CNC Milling Machine
Cutting Strategies for Casting Die Manufacturing on CNC Milling MachineIOSR Journals
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
 

Destaque (20)

Q01062121126
Q01062121126Q01062121126
Q01062121126
 
J1303067178
J1303067178J1303067178
J1303067178
 
I017325055
I017325055I017325055
I017325055
 
J017345864
J017345864J017345864
J017345864
 
A Generalization of QN-Maps
A Generalization of QN-MapsA Generalization of QN-Maps
A Generalization of QN-Maps
 
I017446164
I017446164I017446164
I017446164
 
L017136269
L017136269L017136269
L017136269
 
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
 
F017544247
F017544247F017544247
F017544247
 
I017144954
I017144954I017144954
I017144954
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
 
G012125156
G012125156G012125156
G012125156
 
B017410916
B017410916B017410916
B017410916
 
The Performance Analysis of a Fettling Shop Using Simulation
The Performance Analysis of a Fettling Shop Using SimulationThe Performance Analysis of a Fettling Shop Using Simulation
The Performance Analysis of a Fettling Shop Using Simulation
 
A Study on the Relationship between Nutrition Status and Physical Fitness of ...
A Study on the Relationship between Nutrition Status and Physical Fitness of ...A Study on the Relationship between Nutrition Status and Physical Fitness of ...
A Study on the Relationship between Nutrition Status and Physical Fitness of ...
 
Optimized Traffic Signal Control System at Traffic Intersections Using Vanet
Optimized Traffic Signal Control System at Traffic Intersections Using VanetOptimized Traffic Signal Control System at Traffic Intersections Using Vanet
Optimized Traffic Signal Control System at Traffic Intersections Using Vanet
 
Cutting Strategies for Casting Die Manufacturing on CNC Milling Machine
Cutting Strategies for Casting Die Manufacturing on CNC Milling MachineCutting Strategies for Casting Die Manufacturing on CNC Milling Machine
Cutting Strategies for Casting Die Manufacturing on CNC Milling Machine
 
B012540914
B012540914B012540914
B012540914
 
E010513037
E010513037E010513037
E010513037
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 

Semelhante a G1102014246

Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXpijans
 
Mutual authentication between base and subscriber station can improve the sec...
Mutual authentication between base and subscriber station can improve the sec...Mutual authentication between base and subscriber station can improve the sec...
Mutual authentication between base and subscriber station can improve the sec...CSCJournals
 
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...Karthikeyan Ece venkatesan
 
A Review on security issues in WiMAX
A Review on security issues in WiMAXA Review on security issues in WiMAX
A Review on security issues in WiMAXEditor IJMTER
 
Analysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdfAnalysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdfPerumalraja Rengaraju
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
 
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLSECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLIJNSA Journal
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environmentidescitation
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key AgreementAn Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreementijtsrd
 
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...ijsrd.com
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-JM code group
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
 
Authentication in Different Scenarios
Authentication in Different ScenariosAuthentication in Different Scenarios
Authentication in Different ScenariosRaj Sikarwar
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Ericsson
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 

Semelhante a G1102014246 (20)

Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
 
Mutual authentication between base and subscriber station can improve the sec...
Mutual authentication between base and subscriber station can improve the sec...Mutual authentication between base and subscriber station can improve the sec...
Mutual authentication between base and subscriber station can improve the sec...
 
Paper1_Final
Paper1_FinalPaper1_Final
Paper1_Final
 
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
 
A Review on security issues in WiMAX
A Review on security issues in WiMAXA Review on security issues in WiMAX
A Review on security issues in WiMAX
 
Analysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdfAnalysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdf
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
 
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLSECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key AgreementAn Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreement
 
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 
Authentication in Different Scenarios
Authentication in Different ScenariosAuthentication in Different Scenarios
Authentication in Different Scenarios
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 

Mais de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

G1102014246

  • 1. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 2 Ver. I (Mar. – Apr. 2016), PP 42-46 www.iosrjournals.org DOI: 10.9790/1676-1102014246 www.iosrjournals.org 42 | Page Mutual Authentication in Wimax Security Using Diffie Hellman Stephen Ochieng Oguta1 , Dr. S. Musyoki2 , Dr. K. Langat3 1 Msc in Telecommunication And Information Engineering Student At Jomo Kenyatta University Of Agriculture And Technology ( P.O BOX 333, 40222 Oyugis Kenya, 2 Department Of Telecommunication And Information Engineering At Jomo Kenyatta University Of Agriculture And Technology (P.O.Box 62000, 00200, Nairobi, Kenya, 3 Senior Lecturer, Department Of Telecommunication And Information Engineering At Jomo Kenyatta University Of Agriculture And Technology, (P.O.Box 62000, 00200, Nairobi, Kenya, Abstract: Network security is becoming an area of concern with the expansion of wireless technology. Many businesses have lost a lot of money as a result of compromised network security. The Worldwide Interoperability for Microwave Access (WiMAX) is one example of 3G technology which is getting popular. Most business establishemnst use WiMAX to network their communication equipments. The popularity of WiMAX and its security vulnarability are the key motivation for this study. Presently, PKM versions of authentication are used to secure WiMAX networks. The PKM authentication methods expose the WiMAX network to third party risks like Man in the Middle attacks, eavesdropping and jamming attacks. WiMAX is thus vulnerable to network attacks that compromise the radio links between the communicating Subscriber Station (SS) and the serving Base Station (BS). The PKMv1 process involves a one sided authentication. The BS authenticates the SS but the SS has no capacity to authenticate a BS. As a result, a rogue BS can successfully enter the network of a SS without prevention. The rogue BS can then tap all the unencrypted management messages. This constitutes a major security flaw. The Man-In- The-Middle (MITM) attack exploits this weakness in the network by eavesdropping, interception and fabrication of the management messages, resulting in a breach in the reliability of the entire network. In this research, a modification of the Diffie-Hellman (DH) key exchange protocol is used to mitigate the man-in-the middle attack in WiMAX by modeling using the Dev C++ programming language. The DH protocol uses a unique algorithm whose solution must be obtained by both the SS and the BS for communication to be allowed. Both the BS and the SS are given an opportunity to authenticate one another before any communication can proceed. Keywords: Diffie Hellman; Mutual Authentication; Security; WiMAX. I. Introduction With the deployment of wireless communication in recent years, security issues in wireless networks also become a growing concern [1] [2]. The Institute of Electrical and Electronics Engineers (IEEE) and Internet Engineers Task Force (IETF) has proposed security mechanisms and protocols to countermeasure security breaches in a way that minimizes the damage which may be caused by the attacks [4]. Even if WiMAX technology has complex authentication and authorization methods and a very strong encryption technique it is still vulnerable to different attacks or threats like jamming, scrambling, MITM or water torture attacks [8]. Privacy or confidentiality is fundamental for secure communication, which provides resistance to interception and eavesdropping. Man-in-the-middle attack is another classic attack and is generally applicable in a communication protocol where mutual authentication is absent. Other familiar attacks include parallel session attack, reflection attack, interleaving attack, attack due to type flaw, attack due to name omission, and attack due to misuse of cryptographic services. PKM V1 and PKM V2 have been used in WiMAX for security purposes [3]. The above versions only secure the data being transferred. It also secures the BS. The MS/SS is however left vulnerable to rogue BS [4]. The rogue BS can tap the management messages before the actual passing of transmitted data. This paper addresses the weaknesses in WiMAX security system and consequently illustrates how DH can help improve the WiMAX network security. MITH takes advantage of the absence of mutual authentication to pose threats to the system [3]. 1.1 Objective The main objective of this paper is to highlight the application of DH algorithm in WiMAX mutual authentication II. Diffie Hellman Algorithm The latest standard, IEEE 802.16e-2005, includes a new version (PKMv2) of the protocol that caters for the shortcomings of the first version. PKMv1 does not have a capacity for mutual authentication.
  • 2. Mutual Authentication In Wimax Security Using Diffie Hellman DOI: 10.9790/1676-1102014246 www.iosrjournals.org 43 | Page Furthermore PKMv2 supports two different mechanisms for authentication: the SS and the BS may use RSA- based authentication or Extensible Authentication Protocol (EAP) -based authentication [21]. This is because the RSA based authentication applies X.509 digital certificates together with RSA encryption. Authentication is therefore made more secure. However, the exchange of vital management information is done before securing the network. In the PKMv2, the BS asks the SS for its certificates and manufacturing IDs. The BS also sends its management information details to SS in the public environment. Such vital information can be tapped by a rogue Station. Mutual authentication takes place in PKMv2 only after the transfer of management information. This is where DH algorithm comes in handy. DH carries out authentication first before the exchange of management information gets transferred. The basic version of the Diffie-Hellman protocol is implemented as described below: Let 1 2 Where:  PkMS is the mobile Station’s public key  PkBS is the base Station’s public key  G and P are global variables called primes numbers  G is a primitive root of P.  ‘Na’ and ‘Nb’ are the private keys of the MS and the BS respectively. In the basic version of DH, after the respective exchange of the public keys, the MS and the BS calculate the shared encryption key as shown in the equations 1 and 2. In order to implement mutual authentication, AS sends Na to BS, BS calculates AKB [6], [7]. BS then sends another unique number Nb to SS. Similarly, SS calculates AKS. If AKS is equal to AKB, AS believes this message sent by BS [8]. The AK in both SS and BS is calculated as follows: 3 The equation 3 illustrates the implementation of DH protocol. Figure 1: Implementation procedure for DH Key Na- Unique number from SS Nb- Unique number from BS AKB- BS authentication key The Diffie Hellman Mutual Authentication Code Diffie-Hellman key exchange (DH) is a cryptographic protocol that allows two parties that have no prior knowledge of each other to establish together a shared secret key over an insecure communications SS sends its Na to BS BS sends its Nb to SS BS calculates AK SS Calculates AK AKS = AKB Allow communication
  • 3. Mutual Authentication In Wimax Security Using Diffie Hellman DOI: 10.9790/1676-1102014246 www.iosrjournals.org 44 | Page channel [2] [5]. Then they use this key to encrypt subsequent communications using a symmetric-key cipher. The scheme was first published publicly by Whitfield Diffie and Martin [4]. Figure 3.1 illustrates the implementation procedure of the proposed protocol. The SS sends a number Na to the BS. The BS then sends another unique number Nb to SS. BS calculates a unique authentication key using the number received from the SS. The SS also calculates a unique authentication key using the number received from the BS. The two results obtained from the calculations must be the same for authentication is to succeed. Communication will be terminated if AKS and AKB are not the same. The mutual authentication code for DH protocol is programmed in Dev C ++ as shown in the code at the appendix section. The following code is written in Dev C++. This program has the mutual authentication functions that illustrate DH algorithm. III. Results And Discussion Dev C ++ allows for the demonstration of DH mutual authentication. The above code is written to help a BS and an SS to communicate one to another and in the process establish a shared authentication key that is later used to access the network [1]. The Responder commits to a protocol session with the Initiator if, and only if, it has correctly finished the session with the Initiator. The Responder will only commit to the Initiator if the latter is correctly authenticated by the Responder and the same applies to the Initiator, if it correctly validates the identity of the Responder as expressed in the challenge response process of the model. In the equations above, Nb is the nonce generated by the Responder, while Na is the nonce generated by Initiator. Equation 3 explains that a shared authentication key must be obtained if two parties are to communicate. The results obtained in figure 2 below show the mutual authentication process. The SS selects its first number to be used in the DH algorithm. This number is used to obtain that calculation result. The result is then sent to BS in a public non secured environment [4]. The BS equally selects its number then sends the result of calculation. The two equipments only arrive at the same solution to the algorithm is they have the right formula. A wrong result is obtained is an equipment has a wring algorithm. This translates to a MITH. Suspicious equipment can never get the right solution to the challenge because the algorithm is only known to legitimate BS and SS [8]. A legitimate station will always get the correct solution to the algorithm challenge. It is also necessary to have more than one trial on the algorithm challenge. This means that a legitimate station can sometimes miss the correct choice of number in the initial attempt. DH algorithm helps two stations which have no prior knowledge of one another to establish a common authentication key. System details can then be exchanged once the shared authentication key is obtained. IV. Conclusion Privacy or confidentiality is fundamental for secure communication, which provides resistance to interception and eavesdropping. Message authentication provides integrity of the message and sender authentication, corresponding to the security attacks of message modification and impersonation. Even if WiMAX technology has complex authentication and authorization methods and a very strong encryption technique, it is still vulnerable to different attacks or threats like jamming, scrambling, MITM or water torture attacks [8]. The results show that the DH protocol works to keep away any intruder in the network. The goal of DH is to carry out mutual authentication. The process of solving the algorithm is complex and only known by the legitimate communication gadgets. Any MITH is kept at bay since they do not have the knowledge of the protocol. Diffie Hellmann protocol algorithm introduces mutual authentication between the BS and SS prior to the exchange of any management information. WiMAX is selected for this research because it is a recent technology and is presently being rolled out in many parts of the world because of its broadband capacities. Further research is needed on the actual implementation of DH protocol in new mobile devices lke smart phones and Ipads. Acknowledgement S. Oguta would like to thank Dr. S. Musyoki and DR. K. Langat for your guidance and presence during the preparation of this paper. S. Oguta also appreciates his family for their understanding and encouragement.
  • 4. Mutual Authentication In Wimax Security Using Diffie Hellman DOI: 10.9790/1676-1102014246 www.iosrjournals.org 45 | Page Figure 2: Results of compilation References [1]. Z.You, X. Xie, W.Zheng," Verification and Research of a WiMAX authentication protocol Based on SSM", ICETC, pp. 34-43, 2010. [2]. E.Yuksel," Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis", Technical Paper at University of Denmark, pp. 45-54, Feb 2007. [3]. Z.You, X.Xie, W.Zheng," Verification and Research of a WiMAX authentication protocol Based on SSM", ICETC, pp. 22-32, 2010. [4]. H.Tseng, R.Hong, W.Yang,"A chaotic maps-base key agreement protocol that preserves user anonymity", IEEE ICC, vol. 3, pp. 67- 70, 2009. [5]. S.Sidharth, M.P.Sebastian," A Revised Secure Authentication Protocol for IEEE 802.16 (e)", International Conference on Advances in Computer Engineering, pp. 34-42, 2010. [6]. K.C.Chen, J.Boberto and B. De Marca, Mobile WiMAX. John Wiley & Sons Ltd, p. 56, 2008. [7]. M.Barbeau, "WiMAX/802.16 Threat Analysis," in Proceedings of ACM Q2SWinet'05, Montreal, Quebec, Canada, 2005, pp. 8-15. [8]. K. Jensen, L.Kristensen, L. Wells," Colored Petri Nets and CPN Tools for Modeling and Validation of Concurrent Systems”, Department of Computer Science, pp. 112-122, 2008. [9]. D. Gollmann. Computer Security Second Edition West Sussex, England: John Wiley & Sons, Ltd, 2006. Pp. 45. Appendix Implementation Code: #include <iostream> #include <math.h> using namespace std; int main () { cout << "nntt" ; int g, a, p, b, b2, A, X, B, Y, C, D, E, F, K1, K2 ; cout << "SS to enter its unique numbernn"; g = 5; p = 7; // the SS and BS agree to use same values of g and p. such an agreement is set at the point of manufacture cout << "nntt" ; cin >> a ; // the SS selects its unique number for computation cout << "nnttt" ; A = pow (g, a); cout << "the first SS computation result is nnntt" ; B = A % p ; cout << B ; // this is the value obtained by the SS cout << "nntt"; // X is then sent by the SS across the network to the BS. cout << " BS to enter its first unique number nntt" ; cin >> b ; // BS selects its unique number for computation
  • 5. Mutual Authentication In Wimax Security Using Diffie Hellman DOI: 10.9790/1676-1102014246 www.iosrjournals.org 46 | Page cout << "nn" ; C = pow (g, b) ; cout << "nntt" ; D = C % p; cout << "the BS computation result is: nntt"; cout << D ; cout << "nntt" ; cout << "SS sends its result to BS and BS equally sends its result to SS. these received values are used in step two calculation nn" ; E = pow (D, a) ; cout << "nntt" ; K1 = E % p ; cout << "the authentication key obtained from SS is: nntt" ; cout << K1 ; cout << "nn" ; F = pow (C, a); cout << "nn" ; K2 = F % p ; cout << "nntt" ; cout << "The authentication key obtained from BS is: nntt" ; cout << K2; cout << "nntt" ; if ( K1 == K2) { cout << "value is the same mutual authentication has been obtained continue with communication the network is securenntt" ; } else { cout << " mutual authentication not obtained. try againnntt" ; cout << "SS to enter its unique number for second attempt nntt"; }