Академический Документы
Профессиональный Документы
Культура Документы
Manuscript received December 18, 2012; revised May 19, 2013, September
1, 2013, and October 11, 2013; accepted November 2, 2013. Date of publication
November 26, 2013; date of current version July 10, 2014. This work was
supported in part by Ontario Centers for Excellence and EION Inc., Ottawa,
ON, Canada. The review of this paper was coordinated by Dr. L. Chen.
P. Rengaraju is with the Department of Information Technology, Velammal
College of Engineering and Technology, Tamil Nadu 625 009, India (e-mail:
rpr@vcet.ac.in).
C.-H. Lung is with the Department of Systems and Computer Engineering,
Carleton University, Ottawa, ON K1S 5B6, Canada (e-mail: chlung@sce.
carleton.ca).
A. Srinivasan is with EION Wireless Inc., Ottawa, ON K2K 2E3, Canada
(e-mail: anand@eion.com).
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org.
Digital Object Identifier 10.1109/TVT.2013.2292882
I. I NTRODUCTION
0018-9545 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
2887
2888
Fig. 2.
2889
2890
2891
TABLE I
S ECURITY T HREATS IN WiMAX N ETWORKS
messages, i.e., no protection, CMAC, and encrypted by AESCCM. As a consequence of adding encryption support for
MAC messages, some of the security threats discussed in [50]
no longer exist for multihop WiMAX, which are highlighted
in Table I. Further, the security threats that exist in multihop
WiMAX networks were not discussed in [50]. Therefore, the
security threats and countermeasures discussed in [50] and
the additional security threats for multihop WiMAX that are
discussed in other papers [46], [51] have been investigated,
analyzed, and summarized in Table I.
In addition, Layer-3 IPSec security was analyzed in a few
research efforts to overcome the existing security threats in
WiMAX [31][33]. To provide mobility support, IPSec is combined with Mobile IP (MIP) along with some modifications
[31]. Although IPSec is combined with the MIP, it does not
provide mobility support at high speed.
B. Security Threats in LTE Networks
Similar to WiMAX security, many research efforts have been
published for LTE networks. To understand the concept of security threats in LTE, Cao et al. in [62] presented a comprehensive survey of various attacks and solutions in LTE networks.
2892
TABLE II
S ECURIY T HREATS IN LTE N ETWORKS
the BS/eNB broadcasts the PHY layer and system parameters, including ECDH global parameters and public key of the
BS/eNB in the downlink channel descriptor (DCD) message
in the case of WiMAX and in MIBs and SIBs in the case of
LTE. Consider the initial-ranging process, any WiMAX node
(MS/RS) that wants to connect with the BS generates the public
and private key pairs and sends the public key to the BS, along
with initial-ranging code in the RNG_REQ message, which is
encrypted using the BS public key. In turn, the BS will send the
RSG_RSP message, which is encrypted with the MS/RS public
key. Hence, the MS/RS establishes a secure tunnel with the
BS during the initial-ranging process, and the subsequent MAC
messages are encrypted using the receivers ECDH public key.
In our secured initial-ranging process, the only additional
bandwidth overhead is the exchange of global parameters and
public keys, e.g., in WiMAX, the global parameter G(P, Q),
and the BSs public key PB in the DCD message, and then
the RSs public key PR in the RNG-REG message, which are
highlighted in the first three messages, as shown in Fig. 3. The
information in the remaining messages follows the standard,
i.e., WiMAX messages presented in regular font are similar to
that in Fig. 1, and LTE messages presented in italic font are
similar to that in Fig. 2. The computational overhead is added
for the BS and RS to encrypt the MAC messages using the
receivers public key until the SA is established. In total, the
Fig. 3.
2893
2894
Fig. 6.
TABLE III
S YSTEM PARAMETERS [47]
2895
TABLE V
SS C ONNECTIVITY T IME [47]
TABLE IV
IPS EC C ONFIGURATION AND S TATUS V ERIFICATION
2896
TABLE VI
S YSTEM PARAMETERS
TABLE VII
L ATENCY FOR D EFAULT AND ECDH S CHEME
Fig. 9. Latency performance.
link capacity, frame loss is small (< 40) until the input traffic
reaches 7 Mb/s. The frame losses in the IPSec scheme increases as the link capacity increases. The frame loss increases
almost linearly for the IPSec scheme between the input traffic
8 Mb/s and 12 Mb/s. After that, the IPSec security scheme
has much more packet losses where the frame loss at 15 Mb/s
for the default MAC security scheme is 25, but in IPSec, it is
225, because a 40-byte IPSec header is added to each frame.
This 40-byte overhead in the IPSec tunnel increases the frame
losses for the IPSec security scheme. The packet drop increases
in both schemes when the input traffic exceeds the practical
system capacity of 18.5 Mb/s.
The average delay/latency experienced by the traffic for different link capacities is shown in Fig. 9. The delay experienced
by the traffic in the IPSec security scheme steadily increases
from 4 to 9 Mb/s. The delay for the IPSec scheme is much
higher than that for the MAC security scheme when the wireless
link capacity reaches 10 Mb/s. After 10 Mb/s, the average
delay experienced by the IPSec is more than double when
compared with the default MAC security. At 11-Mb/s input
traffic, the average delay experienced by the MAC security is
50 ms, whereas the average delay experienced by the IPSec
is 100 ms. This increase in delay is due to the processing
time for the IPSec encryption and additional queuing delay at
SSs and BS. Although the wireless link capacity is the same,
additional overhead in Layer-3 and Layer-2 headers increases
the payload before entering into the wireless interfaces.
B. ECDH Performance Using Simulation
In the previous subsection, the performance of the IPSec
security scheme is compared with the default WiMAX security scheme. In that experiment, the Layer-3 IPSec is crosscompiled and running as a module in the WiMAX target
board. Hence, the IPSec tunnel is established between SS and
BS-IDU after the IP connectivity. On the other hand, the ECDH
implementation is at Layer 2. For that, as the lower MAC and
security functions are embedded on the chips, it is not possible
to test ECDH using testbed. Hence, simulation environment is
selected for the ECDH performance evaluation. The simulation
environment has the following assumptions.
The main aim of ECDH implementation is to protect the
MAC messages that are in plain text.
The WiMAX and LTE standards provide secure environments for data transfer once SA is established.
In many practical implementations, it has been proved
that ECDH can establish a shared secret over an insecure
channel at highest security strength [29], [30]. Hence,
the intention for this simulation is to evaluate the QoS
performance, not to measure the security strength.
Once the SA is established, the network adopts the default
security (compliance to the standard). Hence, the security
level and the QoS performance, such as latency for traffic,
throughput, and frame loss, are the same.
Based on the given assumptions, the main aim of this simulation is to find the MS initial connectivity latency and the handover latency of the vehicular networks. However, the existing
WiMAX patches for NS-2 simulators and other simulators such
as OPNET, etc., do not have the WiMAX security functions.
Hence, we integrate the DiffieHellman algorithm with NS-2
for generating shared secret and added the necessary message
flows for authentication and authorization functions. The MAC
messages are encrypted using the receivers (either the BS or the
MS) DiffieHellman public key. The system parameters used in
this simulation are given in Table VI.
ECDH-Related Computations:
DiffieHellman public key A = Ga mod P, where a = private key.
Public keys of network nodes BS = 155, RS = 243, MS1 =
947, MS2 = 597.
Shared secrets between A and B = Ba mod P = Ab mod P,
where, A, a = public and private keys of A.
Shared secrets between BS and RS = 810; RS and MS1 = 609;
RS and MS2 = 431.
The simulation results for measuring the initial connectivity
latency (first two rows) and handover latency (second two rows)
are given in Table VII. From the initial connectivity latency
results in the first two rows, it is clear that both MS1 and MS2
are connected at the same frame period for both scenarios. The
time needed to compute the key values and share secret is less
than one frame duration (5 ms, given in Table VI). Hence,
it is possible to schedule the subsequent MAC messages for
both scenarios at the same time. Next, the handover latency
is compared between the default and the ECDH schemes. The
handover latency is the measure of the time difference between
the Handover-Indication message and the connectivity with the
target BS for data transfer. For measuring the handover latency
in the ECDH scheme, the authentication process is performed
at the BS, and during a handover, the DiffieHellman key
is refreshed instead of reauthentication. When comparing the
handover latency, the average handover latency for ECDH is
30% (from 42.2 to 20.1 ms for MS1 and from 47.1 to 30.2 ms
for MS2) reduced because the message flows for basic capability and authentication (third and fourth message flows in
Fig. 1) are not included in the handover process. Therefore,
the proposed ECDH scheme aids in the preauthentication and
reduces the latency during handovers for vehicular users.
C. Security Analysis
There are three security schemes considered for this analysis:
1) default MAC-layer security defined by standards; 2) IPSec
security on top of the MAC-layer security; and 3) the proposed
ECDH protocol at the MAC layer with default security. First,
we explain how the proposed ECDH protocol overcomes the
existing security threats in each category for both WiMAX and
LTE networks. Later, we compare the performance of these
three security schemes in Table VIII, where we enhanced our
previous analysis in [47].
Analysis on ECDH Protocol Against Security Threats in
WiMAX Networks:
1) Ranging attacks: In our proposed security architecture,
RNG_REQ and RNG_RSP messages are encrypted by
the public key of the receiver. Hence, the intermediate
rogue node has difficulty in processing the message in a
short period, and the system is free from DoS/Replay and
other attacks during initial ranging.
2) Power-saving attacks: Already, the IEEE 802.16m standard provides an option for encrypting the control messages in a power-saving mode. For IEEE standards, the
network may use ECDH implementation to overcome the
power-saving attacks.
3) Handover attacks: The MOB NBR-ADV attacks do not
exist in the IEEE 802.16 network because the BS can
encrypt the message. For other networks, the messages
are encrypted using ECDH to overcome those security
threats. For latency issues during handover, two scenarios
are considered: 1) RS mobility (e.g., RS is installed on
top of a train, and WiMAX users are inside the train), and
2) MS mobility. For RS mobility in the proposed security
architecture, reauthentication for RS is not necessary,
because the BS or the target RS knows the list of RSs
and the corresponding RS_ID in the network. Otherwise,
if the target node is another BS, the serving BS can
send the RS authentication information including AK in
2897
2898
TABLE VIII
P ERFORMANCE C OMPARISON OF D IFFERENT S CHEMES FOR 4G W IRELESS [47]
RSs and shares the digital signatures. Hence, the attackers have
difficulty in introducing the pollution attack. For the entropy
attack, the RS may introduce a time stamp field in the message
header. Subsequently, the RS can verify the time stamp of a
received packet with the older packets. If the time stamp is
older, then the RS may drop the packet to avoid the entropy
attacks.
VI. C ONCLUSION AND F UTURE R ESEARCH
As the increase in demand for multimedia applications and
for the safety of mobile users, providing Internet that supports
QoS-aware and safe multimedia services for vehicular networks
is mandatory for service providers. To provide high bandwidth
support at the vehicular speed of up to 350 km/h, the WiMAX
and LTE networks are the preferred candidates. 4G networks
have well-defined QoS and security architectures. However,
some major security threats such as DoS attack still exist in
4G multihop networks, because certain MAC messages are
transmitted only in plain text. For this reason, we have proposed
a distributed security architecture using the ECDH algorithm in
Layer 2 for 4G multihop wireless networks. In the proposed
scheme, the wireless nodes are initially authenticated by the
home network and then authorized by the access node. In
addition, the proposed scheme requires only a slightly higher
bandwidth and computational overhead than the default standard scheme (see the performance comparisons in Section V).
2899
2900
Perumalraja Rengaraju received the M.Eng. degree in communication systems from Anna University, Tamil Nadu, India, in 2006 and the Ph.D. degree
in electrical and computer engineering from Carleton
University, Ottawa, ON, Canada, in 2013.
In September 2013, he joined the Department
of Information Technology, Velammal College of
Engineering Technology, Tamil Nadu, where he is
currently an Associate Professor. He was with
CDOT-Alcatel Research Center, Chennai, India,
from 2006 to 2007 and with nGIN Technologies,
Chennai, from 2007 to 2009, where he worked on the research and development
of WiMAX technology. His current research interests include quality of service
and security in Fourth-Generation wireless networks and other networking
technologies.
Chung-Horng Lung (M13) received the B.S. degree from Chung Yuan Christian University, Zhongli,
Taiwan, and the M.S. and Ph.D. degrees from
Arizona State University, Tempe, AZ, USA, all in
computer science and engineering.
From 1995 to 2001, he was with Nortel Networks.
In September 2001, he joined the Department of
Systems and Computer Engineering, Carleton University, Ottawa, ON, Canada, where he is currently
an Associate Professor. His research interests include
communication networks, wireless ad hoc/sensor
networks, and software engineering.