Font Size: a A A

Research On WiMAX Wireless Network Access Security Technology

Posted on:2011-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:Z B ZhangFull Text:PDF
GTID:2178360305990589Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The openness of transmission channel enables the eavesdropping to the internet of any devices with reception ability. Thus,wireless network suffers from eavesdropping and illegal network attack comparatively more than wireline network. As the foundations for secured wireless access the security authentication protocol will threaten the whole security system once it gets attacked.The legal customers won't be able to access the system and to extract information and the attackers could unfortunately login the base stations illegally to steal information and to destroy them even, thus jeopardizing the security of the whole network. Therefore, the security authentication protocol plays a very critical role in wireless network secured access system.The WiMAX wireless network as one of the wireless metropolitan area network technologies,It mainly solves the air interface standard problem under the point-multipoint condition, it could provide stationary, portable,mobile and high speed device with broadband wireless connection and could be wireless substitute of current last-mile broadband access technologies.The complicate network application environment requires high security of the WiMAX wireless secured access network as a key point for WiMAX wireless network secured access technologies.The security promise of WiMAX wireless network authentication protocol is becoming more and more important.Research progress on WiMAX wireless network authentication protocol has been made, but it lacks the method of design a new authentication protocol and present a formal correctness and security proof of the new protocol under a security framework.In this paper, in order to effectively face the threaten of WiMAX Wireless Network Access Security Technology, we use the DDMP composition theory to derivate a new authentication protocol in WiMAX wireless network. Based on the research of WiMAX Wireless Network Access Security Technology and DDMP composition theory, we mainly analyzed the authentication protocol of WiMAX Wireless Network.In the history of development of WiMAX wireless security authentication,the draft of PKMv2 security authentication (DJ-PKMV2) for 802.16e provided by David Johnston plays a vital role in the final formulation of standard IEEE 802.16e-2005. In this paper, we used the Protocol Composition Logic (PCL) to analyze the DJ-PKMv2 authentication protocol's security and to detect interleaving attack. Based on the DJ-PKMv2 authentication protocol's component,we used the Protocol Derivation System (PDS)to derivate a new authentication protocol(FZM-PKMv2) in WiMAX wireless network based on the vulnerability of system security. Finally we presented a formal correctness and security proof with Protocol Composition Logic(PCL).FZM-PKMv2 authentication protocol has key secrecy and session authentication, it can defend the Lowe's attack,the interleaving attack and so on. Compared with other PKMv2 security authentication protocol this new protocol is more suitable for complicate wireless network application environment used in WiMAX.
Keywords/Search Tags:WiMAX, Authentication Protocol, Protocol Derivation System, Protocol Composition Logic
PDF Full Text Request
Related items