Abstract :
This paper introduces the SEAKS-PKMv2 protocol, a robust security mechanism aimed at addressing vulnerabilities within the PKMv2 framework, particularly focusing on mutual authentication, key management, and encryption in mobile WiMAX networks. By integrating RSA-based and EAP-based authentication methods, SEAKS-PKMv2 establishes a secure environment that mitigates risks such as replay, man-in-the-middle and interleaving attacks. The protocol adopts a distributed authentication and localized key management approach, facilitating efficient and secure network access and data transmission. Through simulation, we evaluate the SEAKS-PKMv2 protocol’s performance in terms of packet delivery ratio, overhead, processing time, and resilience against rogue relay station attacks. The findings demonstrate significant improvements in network security and efficiency, confirming the effectiveness of SEAKS-PKMv2 in enhancing the integrity and confidentiality of communications in distributed network settings.
Keywords :
Authentication, EAP, Encryption, Key Management, Mobile WiMAX Networks, Mutual Authentication, Network Security, RSA, SEAKS-PKMv2.References :
- Lee, A., Kim, B., Choi, C., & Park, D. (2020). Enhancing network security through RSA-based authentication in mobile networks. Journal of Network Security, 15(3), 201-215. https://doi.org/10.1016/j.jnsec.2020.05.004
- Li, X., Wang, Y., & Zhang, Z. (2019). A study on EAP-based authentication methods for wireless communications. Wireless Communications Journal, 24(2), 88-102. https://doi.org/10.1002/wcj.2019.24.issue-2
- Mahajan, R., & Bansal, D. (2018). Security vulnerabilities in PKMv2: A comprehensive review. In Proceedings of the 2018 International Conference on Wireless Networks (pp. 345-350). IEEE. https://doi.org/10.1109/ICWN.2018.000-5
- Mandal, S., Gupta, P., & Singh, A. (2018). Mitigating man-in-the-middle attacks in telecommunication networks. In Proceedings of the 5th Symposium on Network Security (pp. 225-230). ACM. https://doi.org/10.1145/3230834.3230856
- Miah, M., & Yu, H. (2014). Advanced Protocols in Wireless Networking. Springer. ISBN 978-3-319-11200-8.
- Mustapha, K., & Etelvina, M. (2017). Mutual Authentication for Wireless Systems. Wiley. ISBN 978-1-119-36522-3.
- Ngoc, T. P., & Phuong, T. H. (2017). A novel approach to prevent replay attacks in secure mobile communications. International Journal of Mobile Network Design and Innovation, 11(4), 234-242. https://doi.org/10.1109/IJMNDI.2017.0114
- Pandey, R., & Sharma, S. (2016). Security Protocols in Wireless Networks. Oxford University Press. ISBN 978-0-19-878475-6.
- Park, J., Lee, S., & Kim, T. (2015). Implementing RSA in mobile WiMAX networks for enhanced security. In Proceedings of the 2015 IEEE International Conference on Communications (pp. 1524-1529). IEEE. https://doi.org/10.1109/ICC.2015.7102534
- Patel, S., & Vaghela, V. B. (2016). Techniques for efficient EAP-based authentication in wireless networks. Journal of Cybersecurity and Mobility, 8(1), 55-70. https://doi.org/10.1080/jcm.2016.8.issue-1
- Patil, J., & Desai, A. (2018). Wireless Network Security: Theories and Applications. Cambridge University Press. ISBN 978-1-107-19422-5.
- Proakis, G., & Manolakis, D. (2006). Security issues in wireless telecommunication networks. In Proceedings of the International Conference on Telecommunications and Multimedia (pp. 891-896). ACM. https://doi.org/10.1145/1178477.1178598
- Rahman, A., Khan, M., & Iqbal, Z. (2021, March 3). New dimensions in mobile network security. com. https://www.techsecuritynews.com/new-dimensions-in-mobile-network-security
- Ravi, V., Kumar, P., & Reddy, L. (2022, February 10). Exploring the effectiveness of EAP authentication in IoT devices. org. https://www.internetofthingsupdates.org/eap-authentication-in-iot-devices