Font Size: a A A

Design And Analysis On Authenticated Key Agreement Protocol Of The Wimax Network

Posted on:2010-03-28Degree:MasterType:Thesis
Country:ChinaCandidate:K Y WangFull Text:PDF
GTID:2198330332978446Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Authenticated key agreement (AKA) protocols enable two parties agreeing on a session key over a public network in secure and authenticated manner. With a rapid development of WiMAX network, network security becomes an important issue and how to design a secure AKA protocol is not only a work of great realistic significance, but also has wide application prospects.Two situations shows our worthwhile researching directions. The one is that the security of WiMAX has some small shortcomings, the other one is that the security functionality of WiMAX just provides a protection from end user to station and End to End security hasn't have mature resolvents. So we have designed two security protocols in this dissertation. They are an ID-Based AKA protocol in WiMAX air interface stage and a HMQV-Based End to End AKA protocol. The following are the details of our researching work:Firstly, we consider and analyse the RSA AKA protocol and the EAP protocol in WiMAX using Rubin logic. The results of our analysis demonstrated that the two protocols have those shortcomings which were discovered previously. This results also shows the fact that choosing Rubin logic as analysis tool is an efficient method.Secondly, through analysis of the framework and security of the original protocols, it is worthwhile to consider how to design a new ID-Based AKA protocol in WiMAX air interface stage. In our designing method, we use elliptic curve bilinear pairings and the ECDLP and ECDH assumptions. The new designed ID-Based AKA protocol's anthentication section is an ID-Based scheme and the computing section of key agreement uses elliptic curve operation. This designing method not only prompts security properties of AKA protocol but also avoids additional expensive computational cost. Comparing with the original protocol in the WiMAX air interface stage, our new ID-Based protocol has stronger security and simpler architecture of protocol messages. The protocol was proven to be safe using Rubin logic.Finally, we consider how to design the End to End AKA protocol in WiMAX network. In our designing method, we use the HMQV protocol which is famous in the international extent. We also consider the performance features of protocol's participating parts in WiMAX network and combined the secret-key anthenticating and public-key anthenticating technology in our designing method. This new designed End to End protocol was also proven to be safe using Rubin logic.
Keywords/Search Tags:Identity Authentication, Key Agreement, WiMAX, Security Protocol Analysis
PDF Full Text Request
Related items