• Tidak ada hasil yang ditemukan

mobile multihop relay wimax networks

N/A
N/A
Protected

Academic year: 2024

Membagikan "mobile multihop relay wimax networks"

Copied!
24
0
0

Teks penuh

(1)

MOBILE MULTIHOP

RELAY WIMAX NETWORKS

SECURITY PERSPECTIVES

Arkib TK

5105.77 A238

2018

1,11,1

1 B1 11, vý1

(2)

['uýiil `1GI1dn1Al MfllÜllWht Aih..; rLiLº

UNIVERSITJ MALAYSIA SARAWAK

i

P. KNIDMAT MAKLUMAT AKADEMIK UNIMAS

IIIIAIIEIIIIWpp

2000280356

MOBILE MULTIHOP RELAY WIMAX NETWORKS

A SECURITY PERSPECTIVE

J __. _--- ----

COIºlJ)ýi iil('fl

ýý ,. ý" , t. j

, i' ý ...

1\º`/-ý'.

ý

1". ` \ý{ý (ý(/ýý

V1N 1ý ri ýý c

(3)

MOBILE MULTIHOP RELAY WIMAX NETWORKS

A SECURITY PERSPECTIVE

Adnan Shahid Khan

Abeda Muhammad Igbal

Universiti Malaysia Sarawak

Kota Samarahan

(4)

/'.

..

ý`

"ý' ý'

'ýC

First Publication 2018

© Adnan Shahid Khan, Abeda Muhammad Igbal

All rights reserved. No part of this publication may be reproduced, stored in retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the publisher.

Published in Malaysia by

UNIMAS Publisher,

Universiti Malaysia Sarawak, 94300 Kota Samarahan,

Sarawak, Malaysia.

Printed in Malaysia by

PPKS Production Sdn. Bhd. (B23666-M)

Jalan Canna Off, Jalan Alwi, Tabuan Jaya 93350 Kuching, Sarawak, Malaysia

Perpustakaan Negara Malaysia Cataloguing-in-Publication Data Adnan Shahid Khan

MOBILE MULTIHOP RELAY WIMAX NETWORKS : SECURITY PERSPECTIVES /Adnan Shahid Khan, Abeda Muhammad Igbal.

Includes index.

ISBN 978-967-2008-59-0 1. IEEE 802.16 (Standard).

2. Wireless LANs.

3. Wireless communication systems.

4. Mobile communication systems.

5. Government publications--Malaysia.

1. Abeda Muhammad Igbal.

II. Title. 621.384

ýý

TK

Cý0777 r

9618

(5)

Pusat Khidmat Maklumat Akademik UNWvERSITI MALAYSIA SARAWAK

Contents

Preface

Acknowledgement

List of Abbreviations

11 Introduction

1.1 Evolution of IEEE 802.16 Standards

1.2 MMR WiMAX Networks

1.3 Security Requirements and Issues of MMR WiMAX Networks

1.4 Security Scheme for MMR WiMAX Networks 1.5 Security Vulnerabilities of WiMAX Network

1.5.1 Masquerading Threat 1.5.2 Replay Attacks

1.5.3 Interleaving Attacks

1.5.4 Man in the Middle Attack 1.5.5 Denial of Service Attack

2 Security Mechanism in WiMax

2.1 WiMAX Security Protocol Architecture 2.2 WiMAX Security Sublayer

2.2.1 PKMvI Authentication Protocols 2.2.2 OD-2009 PKMV1

2.2.3 SEN XU PKMV1

ix

XI

XIII

1

2

3

7

8 9

9 10

11 13 14

15

15 16 17

18 20

V

(6)

2.4 Key Management Protocol 2.4.1 AK Management

2.4.2 Authorization State Machine 2.4.3 TEK Management

2.4.4 TEK State Machine

2.5 Multicast and Broadcast Services 2.5.1 Security Challenges of MBS 2.5.2 MBRA in IEEE 802.16

2.5.3 RMRA in IEEE 802.16

31 SEAKS Protocol

3.1 Design of SEAKS protocol 3.2 SEAKS Concept Design

3.2.1 Authentication Management 3.2.2 Key Management

3.2.3 Development of SEAKS Protocol

3.3 Analysis of Authentication Protocols in SEAKS 3.3.1 MMR WiMAX Authentication goals

3.4 Development of Key Management Protocol

25 26 28 30

32 35

36

36 37

41

42

43

44

60

64 66

66 67

3.4.1 Development of AK Management 67

3.4.2 Development of Traffic Encryption Key Management

3.4.3 Cost Analysis of SEAKS Authentication Protocols

3.4.4 Cost Analysis of OD-2009 Authentication Protocol

68

70

71

vi

(7)

3.4.5 Cost Analysis of SEAKS Authentication

Protocol 72

3.5 Significant Contribution of SEAKS 74

41 SEDDRA Protocol

4.1 Design ofSEDRRA Protocol

4.1.1 SEAKS Initiation of SEDRRA Protocol 4.2 SEDRRA Concept Design

77

78

78

80

4.2.1 Forward Secrecy Management 85

4.2.2 Backward Secrecy Management 86

4.3 Development of SEDRRA Protocol 87

4.3.1 Development of BS-SEDRRA Protocol 4.3.2 Development of FS-SEDRRA Protocol

4.3.3 Performance Study throueh Mathematical

88

90

91 Analysis

4.3.4 Cost Analysis of SEDRRA Rekeying Scheme 92

4.3.5 Cost Analysis of RMRA Rekeying Scheme 4.3.6 Complexity of the Protocol

95

102

4.4 Significant Contribution of SEDRRA 103

5I Formal Analysis of Security Techniques 5.1 Formal Analysis of Security Protocut

5.1.1 Safety property

107

107

107

5.1.2 Liveness property 107

5.1.3 Traditional Formal Methods for

Authentication 108

VII

(8)

5.1.4 Traditional Formal Methods for Group

Communication 112

5.2 Formal Analysis of Authentication Protocols 115

5.2.1 Initial Assumptions 119

5.2.2 Analysis of SEN XU Authentication Protocol Analysis 119

5.2.3 Analysis of SEAKS Authentication Protocol 123 5.2.4 Performance Study through Formal Analysis 128 5.3 Formal Analysis of Group Key Protocols 128

5.3.1 Basic Notation 129

5.3.2 Formal Analysis of SEDRRA Protocol (Forward Secrecy) 130

5.3.3 Formal Analysis of RMRA Protocol (Forward Secrecy) 133

5.3.4 Formal Analysis of SEDRRA Protocol (Backward Secrecy 134

5.3.5 Formal Analysis of RMRA Protocol (Backward Secrecy) 135

References Appendix A

Simulation Analysis of SEAKS Protocols Packet Delivery Ratio

Comparison of Processing Time

Effect of Increasing Rogue Relay Stations Index

137 155 155 156 159 160 163

(9)

Preface

This book comprises in depth view of Mobile multihop relay (MMR) Worldwide Interoperability for Microwave Access (WiMAX) networks support multihop communication to increase wireless coverage and provide lower backhaul deployment cost with high throughput. It is believed that due to lack of physical infrastructure, MMR WiMAX is vulnerable to several medium access control (MAC) layer attacks especially denial of service, replay attack, man in the middle attack and interleaving attack. The objective of this book is to discuss the current security measure in MMR WiMAX networks that provides secure end to end data transmission and secure multicast and broadcast service (MBS). The discussed MMR WiMAX security protocols are incorporated at two different security phases, one for authentication and key management and the other for ensuring forward and backward secrecy in MBS. In the first phase, self-organized efficient authentication and key management scheme (SEAKS) is discussed to counter the various attacks. In the second phase, secure and efficient distributed relay-based rekeying algorithm (SEDRRA) is illustrated to tackle forward and backward secrecy. The performance of SEAKS has been evaluated using BAN LOGIC, National Chiao Tung University network simulator (NCTUns 6.0) and mathematical derivations. SEDRRA has been validated by formal method using rank theorem and mathematical derivation. Most importantly, the discussed security protocols have significantly enhanced network performance by providing efficient counter measures for security vulnerabilities. The proposed SEAKS protocols are backward and forward compatible and can also be applied to mobile WiMAX networks. SEDRRA can be applied to secure MBS for pay per view, TV broadcasting, and video conferencing applications.

ix

(10)
(11)

Acknowledgement

My deepest gratitude to Allah SWT, the most gracious, most merciful for giving me the strength and wisdom in His abundance.

I would like to express my appreciation to Professor Dr Norsheila binti Fisal, Professor Dr Mazlan Abbas, Professor Dr Narayanan Kulathuramaiyar, Associate Prof. Dr Sharifah Hafizah Syed Ariffin, Associate Prof. Dr Johari

Bin Abdullah and Dr Halikul Bin Lenando for their review and feedback;

my key aspirations to complete this book. I wish to extend my gratitude to D. Nauman Shahid, Dr Shazia Parveen, Dr Madeeha Atta, Dr Attaullah Shah Bukhari, Sabiha Umar, Umar Ali Parvaiz Butt, Dr Maliha Waseem and Dr Waseem Zia for generously sharing their time, knowledge, experience, love and prayers. I would also like to say special thanks to my daughter Ayesha binti Adnan Ali Khan for sincerely offering me her inspiring smile, day in, day out.

Finally, I wish to express my appreciation to my parents Shahid Ali Khan (Father) and Nadra Parveen (Mother) whose financial support, love and persistent confidence in me, has taken the load off my shoulder. This work would not have been completed without their moral support, patience, encouragement, understanding and unwavering love and care. The continued encouragement and support have held up my spirit to make this piece possible.

xi

(12)
(13)

List of Abbreviations

AES - Advanced Encryption Standard AKID - Authorization Key Identifier

API - Application Programming Interface AUTH-INFO - Authentication Information

AUTH - Authentication

AK - Authorization Key

AAA - Authentication, Authorization, and Accounting BSAddr - Base Station Mac Address

BCID

- Basic Connection Identifier

BS - Base Station

BS - Backward Secrecy

BWA - Broadband Wireless Access CPS - Common Part Sub-layer

CS - Convergence Sub-layer CERT - Certificate

CCM - Counter with CBC-MAC CBC - Cipher Block Chaining

DSL - Digital Subscriber Line DoS - Denial of Service

XIII

(14)

EAP - Extensible Authentication Protocol ECB - Electronic Codebook

FS - Forward Secrecy

GU1 - Graphical User Interface

GTEK - Group Traffic Encryption Key GKEK - Group Key Encryption Key

GKUC - Group Key Update Command

HMAC - Hash-based Message Authentication Code KEK - Key Encryption Key

KST - Knowledge Shared Table LOS - Line of Sight

MAC - Media Access Control

MMR - Mobile Multihop Relay

MBRA - Multicast and Broadcast rekeying algorithm

MS - Mobile Station

MR-BS - Multihop Relay Base station M-1-TM Man-in-the-Middle

MD-SHA - Message Digest Secure Hash Algorithm N-RS - Non-Transparent Relay Station

NLOS - Non-line of Sight Authority OD-2009 - Official Draft-2009

0- Big 0

XIV

(15)

PO - Packet Overhead

PDR - Packet Delivery Ratio

PR - Packet Received

PS - Packet Send

PDU - Protocol Data Unit

Pre-PAK - Pre-Primary Authorization Key PKM - Privacy Key Management

PHY - PHYsical Layer

PKMv1 - Privacy Key Management version 1 PKMv2 - Privacy Key Management version 2 QoS - Quality of Service

RS - Relay Station

RSA - Ron Rivest, Adi Shamir and Leonard Adleman RMRA - Relay Multicast Rekeying Algorithm

RNG-REQ - Ranging Request

RNG-RSP - Ranging Response

REQ - Request

RAR - Relay Authentication Request

MTRMs - Monthly Technology Review Meetings

RSP - Response

SEAKS - Self Organized Efficient Authentication and Key Management Scheme

xv

(16)

SEDRRA - Secure and Efficient Distributed Relay-Based Rekeying Algorithm

SS - Subscriber Station

SIG - Signature

SZK - Security Zone Key

SZKEK - Security Zone Key Encryption Key SBC - SS Basic Capability

SAID - Security Association Identifier SA - Security Association

SHP - Small Hydro Power

TEK - Traffic Encryption Key TLS - Transport Layer Security

WIMAX - Worldwide Interoperability for Microwave Access

xvi

(17)

1

Introduction

The IEEE 802.16 standard intends to provide broadband wireless access (BWA) for metropolitan area network (MAN), and is to design for the delivery of last mile BWA is substitute to the cable and DSL [1]. After adopting nomadic mobility i. e. IEEE 802.16e, the standard moves towards the mobile multihop relay (MMR) functions in IEEE 802.16j for coverage extension and throughput enhancement that is done simply by adding relays in between MR-BS and the SS [2,3]. However, insertion of new relays demand strict authentication and key management schemes between MR- BS, RS and SS to secure the traffic from different adversaries especially when the multihop RS initially joins the network [4]. Thus, security is essential in wireless technologies to allow rapid adoption and enhance their maturity, while designing the standard, the IEEE 802.16 working group has taken into consideration the security aspects to avoid mistakes of IEEE 802.11.

Standard security specifications can mainly be found within the MAC layer which is called security sublayer.

The separate security sublayer provides authentication, secure key exchange and encryption. IEEE 802.16 employs a concept of security association (SA) which defines security parameters keys and encryption algorithms [5,6]. First, the authorization consists of an X. 509 certificate, an authorization key (AK), a key encryption key (KEK) and a hash message authentication code (HMAC) key, which will be used for authentication and key management. Second, the data for transport connections consists of a SA identifier (SAID), a cipher; traffic encryption keys (TEKs) and initialization

1

(18)

Mubde Multihop Relay Wimax Nctýorkc Sccurig' I'cnlýectrvcs

vectors for TEKs, which will be used for secure data transmission. This chapter will present the security requirements, challenges and different schemes of MMR WiMAX network. It also discussed and analyzed the existing PKM authentication protocols, multicast and broadcast rekeying algorithms and related work to the proposed WiMAX security model.

1.1 Evolution of IEEE 802.16 Standards

Around 1999, Working Group on Broadband Wireless Access Standards was set up to design the standards with their recommendations to support the enhancement and deployment of broadband wireless access standard.

During 2001, IEEE 802.16-2001 standard was approved. Its frequency range and data transmission rates were 10-66GHZ and 70Mbps respectively and support LOS fixed point to point and point to multipoint communication [7, 8]. Due to absence of unlicensed spectrum and LOS demand, deployment of IEEE 802.16-2001 standard was restricted. Thus, for these reasons, during 2004, three more amendments, IEEE 802.16a-b-c were released [9). The purpose for these enhancements is to improve interpretability, QoS, data performance, mesh networking and to support NLOS communication. Later, all these amendments combine together under a single standard: IEEE 802.16-2004 [10-12].

In 2005, IEEE 802.16e-2005 or simply IEEE 802.16e was approved and in 2006 it was released [13]. It is basically the enhancement of IEEE 802.16- 2004 by adding mobility features and its also known as mobile WiMAX.

In 2006, IEEE802.16j was launched, the amendment to IEEE 802.16e by inserting relay stations in between BS and SS to enhance the coverage area. In 2009, IEEE merged all previous IEEE 802.16 standards together to form the latest standard i. e. IEEE 802.16-2009. During the same year, IEEE 802.16j- 2009 specifying the multihop relays were released [14-16]. This amendment provides a more enhanced and systematic security and communications architecture than was previously defined in older versions of this standard.

2

(19)

Introduction to Wimax

1.2 MMR WiMAX Networks

In IEEE 802.16j-2009, multihop relays are an elective deployment to support performance and converge area in WiMAX networks [17-29]. In multihop relays network, BS can be modified to multihop relay base station (MR-BS). Communication within SS and MR-BS are relayed through RS, thus enhancing the coverage area and efficiency of the network.

Multihop relays [30-39] are partially or fully under the supervision of MR- BS. Thus leads towards two different modes viz. centralized and distributed scheduling modes. Relays with full MR-BS supervision is functioned under centralized scheduling mode where MR-BS is full responsible for all the decisions. Relays with partial MR-BS supervision functioned under distributed scheduling mode where all the decisions are taken by RS with the collaboration of MR-BS [40].

Relays are categories into two, non-transparent and transparent relays.

Non-transparent relays function in both centralized as well as distributed scheduling mode. But for transparent relays, it only can function in centralized scheduling mode. These relays can operate in three separate schemes depending on the processing of received signals. These schemes includes amplify and forward, decode and forward and estimate and forward.

Decode and forward and amplify and forward relays are also termed as non- transparent relays and transparent relays respectively [41]. These relays may be fixed in location like mounting on the top of the building or mobile travelling on vehicles [42]. As far as security matters are concerns, these relays worked in two different security modes i. e. centralized security mode and distributed security mode [43,44] that are well discussed later in this chapter. The complete diagram for multihop relays with transparent and non-transparent features is shown in Figure 1.1.

3

(20)

Figure 1.1: Multihop Topology

In MMR WiMAX network, two different relay station operational mode are defined; transparent mode RS(T-RS) and non-transparent mode RS (N- RS) [45]. The key difference between these two relay modes of operation is the ability to generate and send control information to its sub-ordinate stations which are included in the frame header. The RS operating in transparent mode do not generate and transmit control information, but in non-transparent mode, the relays do generate and transmit its own control information to its sub-ordinate stations [46]. The frame header contains essential scheduling information which the nodes use to determine when they are allowed transmit and receive information.

i

4

(21)

Pus'it W'rlmat Maklnmat

. Akartemik tJN[N'ERSITI MALAYSIA $ARAWAK

The Transparent mode Relay Station (T-RS) [47]: This type of RSs only forward control information generated by the MR-BS, and hence they do not extend the coverage area of the BS. However, T-RS can be used to enhance the system capacity in term of throughput within the BS coverage area. T-RS has less complexity and cheaper as compared with the N-RS. So, the T-RS only can operate in a centralised scheduling mode and for topology up to two hops only [48,49]. Figure 1.2 illustrate the transparent relay mode.

MS

/

I-, - I--, '

Transparent RS

Figure 1.2: Transparent Relay Mode

In transparent relaying, the SSs communicating with relays can receive and decode the control information from the MR-BS. So, the RSs serving those SSs are not required to transmit control information themselves.

These SSs are in range of the MR-BS but by using multiple hops with the aid of RSs can achieve higher throughput [50]. So, the goal of this type relaying is to enhance network capacity in term of throughput. This scheme of relaying

5

(22)

is called transparent relaying; because the SS is not aware the RS exists. In the transparent relaying all control information originates from the MR-BS.

The Non-Transparent mode Relay Station (N-RS) [10,49]. The N-RSs can operate on both centralized and distributed scheduling. When NT-

RSs operate in distributed scheduling, they generate their own control information. However, when they are operating in a centralized scheduling, they only forward those provided by the BS. N-RSs can be used to provide cell coverage extension as well as capacity enhancement. Non-transparent

relay stations can operate in topologies larger than two hops in either a centralised or distributed scheduling mode [43,47,51521. On the other hand, the improved functions of the N-RSs lead to increased complexity and hence higher cost than T-RS. In addition, the transmission of the framing information can result in interference between neighbouring RSs. Figure 1.3 illustrate the non-transparent relay mode.

M9 I

Direct Aurae

I---

-

91

Multi hop Relay Acceee

/ i

/

W413

---I--"/

Non-Tranaparanl RS

Non-Tnmp. nnt RS

Figure 1.3: Non-Transparent Relay Mode

/

ý

MS

6

(23)

InIrudurtinn Ni Wim. n

Furthermore, the N-RS can operate on amplify and forward scheme or decode and forward scheme. In amplify and forward, the N-RS acts as an analogue repeater that only amplify the received signal and forward it to the next node [52,53].

In non-transparent relaying, the SSs served with RSs and cannot receive or decode the control information from the MR-BS [49,53]. So, the relays serving these SSs must generate and transmit its own frame containing control information at the beginning of it. The end SS considers the serving RS as its base station and cannot deal with control information sent by MR- BS. These relays are called non-transparent because the SS synchronizes and receives control information from it [43,46]. The SSs out of range of the MR-BS cannot even receive the control information sent by it, so the non-transparent RS can send to them its own frame and hence extend the MR-BS coverage.

1.3 Security Requirements and Issues of MMR WiMAX Networks

The security sublayer lies above the physical layer and below the MAC CPS, which is encrypted, authenticated and validated. However, header and control information added by the physical layer are not encrypted or authenticated [5,54]. Thus physical layer information attached to the higher layer packets is vulnerable to threats. The MAC management messages are sent in the clear to facilitate network operations. Thus, MAC header, MAC management messages like DCD, DL-MAP, UCD, UL-MAP, RNG-REQ RNG- RSP, PKM-REQ PKM-RSP, SBC-REQ and SBC-RSP are sent unencrypted, give wide field for the attacker to play [55-57]. Especially for the attacks

mentioned later in this chapter.

DoS attack on the BS may possibly ensue during the PKMv2 authentication because of the intense public key computational load, an attacker might simply flood the BS with messages and the BS could use up its computational

resources, evaluating signatures and decrypting messages[54,58]. BS authentication process in PKMv2 is vulnerable to an interleaving attack.

In this attack, the attacker impersonates a valid RS, exchange the first two

7

(24)

Muhlh' Muluhup ItoLry Nlniaý k. tiruintc I'rni t" "I

messages of PKMv2 sequences with a valid BS, and then it replays these to the original, valid RS to gain the final PKMv2 messages. The attacker then uses the final message from the original RS to complete the original PKMv2 sequence with the BS resulting in unauthorized access to the network [59].

As the number of Hops increases in the distributed and non-transparent environment, unreliability increases thus more powerful and complex attacks can occur [54,60]. In the case, when the attacks involves the BS,

it's a little bit tricky for the adversary to get successful as BS is much more intelligent device, however, if the case when RS is involved as RS is not too intelligent than BS, thus the chances of different attacks for RS is higher then BS.

MMR WiMAX network may need the following security function, which have not widely studied by others until now. Localized and hop-by-hop authentication is required. In MMR WiMAX network RS is introduced for coverage extension and throughput enhancement, for this purpose, localized and hop-by-hop authentication between RS, MS and MR-BS should be supported [4,61]. All the participating devices must be validated and authenticated byAAA server through MR-BS [62], because digital certificates of participating devices are only registered in AAA server database [63].

However, on the other hand, N-RS should authenticate other N-RS/MS on behalf of MR-BS [61,62]. Conventional MS should be used in MMR WiMAX network without any functional modification.

1.4 Security Scheme for MMR WiMAX Networks

In multihop relay WiMAX networks, two different security schemes has been proposed viz. centralized security scheme and distributed security scheme. Both schemes are discussed briefly in the following section.

Centralized security scheme normally resides in MR-BS in the multihop relay system where security association (SA) is established within RS and MR-BS without the participation of intermediate RS [5]. The intermediate RS does not decrypt the user data payload or do any kind of authentication

to the SS or other RS; it just relays what MR-BS transmits to it [64]. MR-BS

8

Gambar

Figure  1.1: Multihop  Topology
Figure  1.2: Transparent  Relay Mode
Figure  1.3: Non-Transparent  Relay Mode

Referensi

Dokumen terkait