Security Analysis of Identity Based Cryptography and Certificate Based in Wimax Network Using Omnet++ Simulator

N. Chauhan, R. Yadav
{"title":"Security Analysis of Identity Based Cryptography and Certificate Based in Wimax Network Using Omnet++ Simulator","authors":"N. Chauhan, R. Yadav","doi":"10.1109/ACCT.2012.100","DOIUrl":null,"url":null,"abstract":"WiMAX is a promising technology that provides high data throughput with low delays for various user types and modes of operation. These advantages make WiMAX applicable both for infrastructure purposes and end-client usage. Since WiMAX is presented as a network framework and a last-mile technology, it is believed to be capable of handling a wide range of usage scenarios. Many security problems remain to be addressed in different modes and for different user types even in the final security standard of WiMAX, privacy and key management version 2 (PKMv2). Identity Based Cryptography (IBC) has potential benefits that can provide enhancements to the overall security and efficiency of the security standard. WiMAX as the primary connection medium for acquiring services such as on-demand video streaming, VoIP connections and mobile bank transactions, the service providers may use it for data relaying purposes among access points. To meet the technical requirements of these various scenarios, majority of the WiMAX research has been conducted on physical and MAC layers, however little has been invested in a comprehensive and efficient security solution, which has resulted in a wide range of security weaknesses and reactive solutions. One such enhancement is combining user identity with the public key and therefore eliminating the public key distribution load from the network. However, IBC has a few caveats, such as the necessity of a secure medium to distribute private keys. To compensate for these disadvantages, in this study, IBC is combined with certificate-based security. As a result, the benefits of IBC are maintained while the disadvantages are eliminated.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"126 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Second International Conference on Advanced Computing & Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACCT.2012.100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

WiMAX is a promising technology that provides high data throughput with low delays for various user types and modes of operation. These advantages make WiMAX applicable both for infrastructure purposes and end-client usage. Since WiMAX is presented as a network framework and a last-mile technology, it is believed to be capable of handling a wide range of usage scenarios. Many security problems remain to be addressed in different modes and for different user types even in the final security standard of WiMAX, privacy and key management version 2 (PKMv2). Identity Based Cryptography (IBC) has potential benefits that can provide enhancements to the overall security and efficiency of the security standard. WiMAX as the primary connection medium for acquiring services such as on-demand video streaming, VoIP connections and mobile bank transactions, the service providers may use it for data relaying purposes among access points. To meet the technical requirements of these various scenarios, majority of the WiMAX research has been conducted on physical and MAC layers, however little has been invested in a comprehensive and efficient security solution, which has resulted in a wide range of security weaknesses and reactive solutions. One such enhancement is combining user identity with the public key and therefore eliminating the public key distribution load from the network. However, IBC has a few caveats, such as the necessity of a secure medium to distribute private keys. To compensate for these disadvantages, in this study, IBC is combined with certificate-based security. As a result, the benefits of IBC are maintained while the disadvantages are eliminated.
基于omnet++模拟器的Wimax网络中基于身份的密码和证书的安全性分析
WiMAX是一项很有前途的技术,它为各种用户类型和操作模式提供高数据吞吐量和低延迟。这些优点使得WiMAX既适用于基础设施用途,也适用于终端客户端使用。由于WiMAX是作为一种网络框架和最后一英里技术提出的,它被认为能够处理广泛的使用场景。即使在WiMAX的最终安全标准——隐私和密钥管理第2版(PKMv2)中,在不同的模式和不同的用户类型中,仍有许多安全问题有待解决。基于身份的加密(IBC)具有潜在的好处,可以增强安全标准的整体安全性和效率。WiMAX作为获取诸如点播视频流、VoIP连接和移动银行交易等服务的主要连接媒介,服务提供商可以将其用于接入点之间的数据中继目的。为了满足这些不同场景的技术需求,大多数WiMAX研究都是在物理层和MAC层上进行的,而对全面高效的安全解决方案的投入很少,这导致了各种各样的安全漏洞和被动解决方案。这样的增强之一是将用户身份与公钥结合起来,从而消除了网络中的公钥分发负载。但是,IBC有一些注意事项,例如需要一种安全的媒介来分发私钥。为了弥补这些缺点,在本研究中,IBC与基于证书的安全性相结合。因此,IBC的优点得以保留,缺点得以消除。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信