SlideShare a Scribd company logo
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE)
e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 2 Ver. I (Mar. – Apr. 2016), PP 42-46
www.iosrjournals.org
DOI: 10.9790/1676-1102014246 www.iosrjournals.org 42 | Page
Mutual Authentication in Wimax Security Using Diffie Hellman
Stephen Ochieng Oguta1
, Dr. S. Musyoki2
, Dr. K. Langat3
1
Msc in Telecommunication And Information Engineering Student At Jomo Kenyatta University Of Agriculture
And Technology ( P.O BOX 333, 40222 Oyugis Kenya,
2
Department Of Telecommunication And Information Engineering At Jomo Kenyatta University Of Agriculture
And Technology (P.O.Box 62000, 00200, Nairobi, Kenya,
3
Senior Lecturer, Department Of Telecommunication And Information Engineering At Jomo Kenyatta
University Of Agriculture And Technology, (P.O.Box 62000, 00200, Nairobi, Kenya,
Abstract: Network security is becoming an area of concern with the expansion of wireless technology. Many
businesses have lost a lot of money as a result of compromised network security. The Worldwide
Interoperability for Microwave Access (WiMAX) is one example of 3G technology which is getting popular.
Most business establishemnst use WiMAX to network their communication equipments. The popularity of
WiMAX and its security vulnarability are the key motivation for this study. Presently, PKM versions of
authentication are used to secure WiMAX networks. The PKM authentication methods expose the WiMAX
network to third party risks like Man in the Middle attacks, eavesdropping and jamming attacks. WiMAX is thus
vulnerable to network attacks that compromise the radio links between the communicating Subscriber Station
(SS) and the serving Base Station (BS). The PKMv1 process involves a one sided authentication. The BS
authenticates the SS but the SS has no capacity to authenticate a BS. As a result, a rogue BS can successfully
enter the network of a SS without prevention. The rogue BS can then tap all the unencrypted management
messages. This constitutes a major security flaw. The Man-In- The-Middle (MITM) attack exploits this weakness
in the network by eavesdropping, interception and fabrication of the management messages, resulting in a
breach in the reliability of the entire network. In this research, a modification of the Diffie-Hellman (DH) key
exchange protocol is used to mitigate the man-in-the middle attack in WiMAX by modeling using the Dev C++
programming language. The DH protocol uses a unique algorithm whose solution must be obtained by both the
SS and the BS for communication to be allowed. Both the BS and the SS are given an opportunity to authenticate
one another before any communication can proceed.
Keywords: Diffie Hellman; Mutual Authentication; Security; WiMAX.
I. Introduction
With the deployment of wireless communication in recent years, security issues in wireless networks
also become a growing concern [1] [2]. The Institute of Electrical and Electronics Engineers (IEEE) and Internet
Engineers Task Force (IETF) has proposed security mechanisms and protocols to countermeasure security
breaches in a way that minimizes the damage which may be caused by the attacks [4]. Even if WiMAX
technology has complex authentication and authorization methods and a very strong encryption technique it is
still vulnerable to different attacks or threats like jamming, scrambling, MITM or water torture attacks [8].
Privacy or confidentiality is fundamental for secure communication, which provides resistance to interception
and eavesdropping. Man-in-the-middle attack is another classic attack and is generally applicable in a
communication protocol where mutual authentication is absent. Other familiar attacks include parallel session
attack, reflection attack, interleaving attack, attack due to type flaw, attack due to name omission, and attack due
to misuse of cryptographic services. PKM V1 and PKM V2 have been used in WiMAX for security purposes
[3]. The above versions only secure the data being transferred. It also secures the BS. The MS/SS is however
left vulnerable to rogue BS [4]. The rogue BS can tap the management messages before the actual passing of
transmitted data. This paper addresses the weaknesses in WiMAX security system and consequently illustrates
how DH can help improve the WiMAX network security. MITH takes advantage of the absence of mutual
authentication to pose threats to the system [3].
1.1 Objective
The main objective of this paper is to highlight the application of DH algorithm in WiMAX mutual
authentication
II. Diffie Hellman Algorithm
The latest standard, IEEE 802.16e-2005, includes a new version (PKMv2) of the protocol that caters
for the shortcomings of the first version. PKMv1 does not have a capacity for mutual authentication.
Mutual Authentication In Wimax Security Using Diffie Hellman
DOI: 10.9790/1676-1102014246 www.iosrjournals.org 43 | Page
Furthermore PKMv2 supports two different mechanisms for authentication: the SS and the BS may use RSA-
based authentication or Extensible Authentication Protocol (EAP) -based authentication [21]. This is because
the RSA based authentication applies X.509 digital certificates together with RSA encryption. Authentication is
therefore made more secure. However, the exchange of vital management information is done before securing
the network. In the PKMv2, the BS asks the SS for its certificates and manufacturing IDs. The BS also sends its
management information details to SS in the public environment. Such vital information can be tapped by a
rogue Station.
Mutual authentication takes place in PKMv2 only after the transfer of management information. This is
where DH algorithm comes in handy. DH carries out authentication first before the exchange of management
information gets transferred.
The basic version of the Diffie-Hellman protocol is implemented as described below:
Let
1
2
Where:
 PkMS is the mobile Station’s public key
 PkBS is the base Station’s public key
 G and P are global variables called primes numbers
 G is a primitive root of P.
 ‘Na’ and ‘Nb’ are the private keys of the MS and the BS respectively.
In the basic version of DH, after the respective exchange of the public keys, the MS and the BS
calculate the shared encryption key as shown in the equations 1 and 2. In order to implement mutual
authentication, AS sends Na to BS, BS calculates AKB [6], [7]. BS then sends another unique number Nb to SS.
Similarly, SS calculates AKS. If AKS is equal to AKB, AS believes this message sent by BS [8]. The AK in
both SS and BS is calculated as follows:
3
The equation 3 illustrates the implementation of DH protocol.
Figure 1: Implementation procedure for DH
Key
Na- Unique number from SS
Nb- Unique number from BS
AKB- BS authentication key
The Diffie Hellman Mutual Authentication Code
Diffie-Hellman key exchange (DH) is a cryptographic protocol that allows two parties that have no
prior knowledge of each other to establish together a shared secret key over an insecure communications
SS sends its Na
to BS
BS sends its Nb to SS
BS calculates AK
SS Calculates AK
AKS = AKB
Allow communication
Mutual Authentication In Wimax Security Using Diffie Hellman
DOI: 10.9790/1676-1102014246 www.iosrjournals.org 44 | Page
channel [2] [5]. Then they use this key to encrypt subsequent communications using a symmetric-key cipher.
The scheme was first published publicly by Whitfield Diffie and Martin [4].
Figure 3.1 illustrates the implementation procedure of the proposed protocol. The SS sends a number Na to the
BS. The BS then sends another unique number Nb to SS. BS calculates a unique authentication key using the
number received from the SS. The SS also calculates a unique authentication key using the number received
from the BS. The two results obtained from the calculations must be the same for authentication is to succeed.
Communication will be terminated if AKS and AKB are not the same. The mutual authentication code for DH
protocol is programmed in Dev C ++ as shown in the code at the appendix section. The following code is
written in Dev C++. This program has the mutual authentication functions that illustrate DH algorithm.
III. Results And Discussion
Dev C ++ allows for the demonstration of DH mutual authentication. The above code is written to help
a BS and an SS to communicate one to another and in the process establish a shared authentication key that is
later used to access the network [1]. The Responder commits to a protocol session with the Initiator if, and only
if, it has correctly finished the session with the Initiator. The Responder will only commit to the Initiator if the
latter is correctly authenticated by the Responder and the same applies to the Initiator, if it correctly validates the
identity of the Responder as expressed in the challenge response process of the model. In the equations above,
Nb is the nonce generated by the Responder, while Na is the nonce generated by Initiator.
Equation 3 explains that a shared authentication key must be obtained if two parties are to
communicate. The results obtained in figure 2 below show the mutual authentication process. The SS selects its
first number to be used in the DH algorithm. This number is used to obtain that calculation result. The result is
then sent to BS in a public non secured environment [4]. The BS equally selects its number then sends the result
of calculation. The two equipments only arrive at the same solution to the algorithm is they have the right
formula. A wrong result is obtained is an equipment has a wring algorithm. This translates to a MITH.
Suspicious equipment can never get the right solution to the challenge because the algorithm is only known to
legitimate BS and SS [8]. A legitimate station will always get the correct solution to the algorithm challenge. It
is also necessary to have more than one trial on the algorithm challenge. This means that a legitimate station can
sometimes miss the correct choice of number in the initial attempt. DH algorithm helps two stations which have
no prior knowledge of one another to establish a common authentication key. System details can then be
exchanged once the shared authentication key is obtained.
IV. Conclusion
Privacy or confidentiality is fundamental for secure communication, which provides resistance to
interception and eavesdropping. Message authentication provides integrity of the message and sender
authentication, corresponding to the security attacks of message modification and impersonation. Even if
WiMAX technology has complex authentication and authorization methods and a very strong encryption
technique, it is still vulnerable to different attacks or threats like jamming, scrambling, MITM or water torture
attacks [8].
The results show that the DH protocol works to keep away any intruder in the network. The goal of DH
is to carry out mutual authentication. The process of solving the algorithm is complex and only known by the
legitimate communication gadgets. Any MITH is kept at bay since they do not have the knowledge of the
protocol. Diffie Hellmann protocol algorithm introduces mutual authentication between the BS and SS prior to
the exchange of any management information. WiMAX is selected for this research because it is a recent
technology and is presently being rolled out in many parts of the world because of its broadband capacities.
Further research is needed on the actual implementation of DH protocol in new mobile devices lke smart phones
and Ipads.
Acknowledgement
S. Oguta would like to thank Dr. S. Musyoki and DR. K. Langat for your guidance and presence during
the preparation of this paper. S. Oguta also appreciates his family for their understanding and encouragement.
Mutual Authentication In Wimax Security Using Diffie Hellman
DOI: 10.9790/1676-1102014246 www.iosrjournals.org 45 | Page
Figure 2: Results of compilation
References
[1]. Z.You, X. Xie, W.Zheng," Verification and Research of a WiMAX authentication protocol Based on SSM", ICETC, pp. 34-43,
2010.
[2]. E.Yuksel," Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis", Technical Paper at University of
Denmark, pp. 45-54, Feb 2007.
[3]. Z.You, X.Xie, W.Zheng," Verification and Research of a WiMAX authentication protocol Based on SSM", ICETC, pp. 22-32,
2010.
[4]. H.Tseng, R.Hong, W.Yang,"A chaotic maps-base key agreement protocol that preserves user anonymity", IEEE ICC, vol. 3, pp. 67-
70, 2009.
[5]. S.Sidharth, M.P.Sebastian," A Revised Secure Authentication Protocol for IEEE 802.16 (e)", International Conference on Advances
in Computer Engineering, pp. 34-42, 2010.
[6]. K.C.Chen, J.Boberto and B. De Marca, Mobile WiMAX. John Wiley & Sons Ltd, p. 56, 2008.
[7]. M.Barbeau, "WiMAX/802.16 Threat Analysis," in Proceedings of ACM Q2SWinet'05, Montreal, Quebec, Canada, 2005, pp. 8-15.
[8]. K. Jensen, L.Kristensen, L. Wells," Colored Petri Nets and CPN Tools for Modeling and Validation of Concurrent Systems”,
Department of Computer Science, pp. 112-122, 2008.
[9]. D. Gollmann. Computer Security Second Edition West Sussex, England: John Wiley & Sons, Ltd, 2006. Pp. 45.
Appendix
Implementation Code:
#include <iostream>
#include <math.h>
using namespace std;
int main ()
{
cout << "nntt" ;
int g, a, p, b, b2, A, X, B, Y, C, D, E, F, K1, K2 ;
cout << "SS to enter its unique numbernn";
g = 5;
p = 7; // the SS and BS agree to use same values of g and p. such an agreement is set at the point of
manufacture
cout << "nntt" ;
cin >> a ; // the SS selects its unique number for computation
cout << "nnttt" ;
A = pow (g, a);
cout << "the first SS computation result is nnntt" ;
B = A % p ;
cout << B ; // this is the value obtained by the SS
cout << "nntt";
// X is then sent by the SS across the network to the BS.
cout << " BS to enter its first unique number nntt" ;
cin >> b ; // BS selects its unique number for computation
Mutual Authentication In Wimax Security Using Diffie Hellman
DOI: 10.9790/1676-1102014246 www.iosrjournals.org 46 | Page
cout << "nn" ;
C = pow (g, b) ;
cout << "nntt" ;
D = C % p;
cout << "the BS computation result is: nntt";
cout << D ;
cout << "nntt" ;
cout << "SS sends its result to BS and BS equally sends its result to SS. these received values are used
in step two calculation nn" ;
E = pow (D, a) ;
cout << "nntt" ;
K1 = E % p ;
cout << "the authentication key obtained from SS is: nntt" ;
cout << K1 ;
cout << "nn" ;
F = pow (C, a);
cout << "nn" ;
K2 = F % p ;
cout << "nntt" ;
cout << "The authentication key obtained from BS is: nntt" ;
cout << K2;
cout << "nntt" ;
if ( K1 == K2)
{
cout << "value is the same mutual authentication has been obtained continue with communication the network
is securenntt" ;
}
else
{ cout << " mutual authentication not obtained. try againnntt" ;
cout << "SS to enter its unique number for second attempt nntt";
}

More Related Content

What's hot

A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
IJNSA Journal
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 MULTI-STAGE ENCRYPTION USING SEEDED SDES MULTI-STAGE ENCRYPTION USING SEEDED SDES
MULTI-STAGE ENCRYPTION USING SEEDED SDES
Eswar Publications
 
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLESPROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
IJNSA Journal
 
An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...
Alexander Decker
 
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
IJNSA Journal
 
IRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DESIRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET Journal
 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notes
Jayanth Dwijesh H P
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
IRJET Journal
 
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
cscpconf
 
A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...
csandit
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
Shakas Technologies
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
ijcsit
 
Final report
Final reportFinal report
Final reportRahul Sihag
 

What's hot (13)

A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
A LIGHT WEIGHT PROTOCOL TO PROVIDE LOCATION PRIVACY IN WIRELESS BODY AREA NET...
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 MULTI-STAGE ENCRYPTION USING SEEDED SDES MULTI-STAGE ENCRYPTION USING SEEDED SDES
MULTI-STAGE ENCRYPTION USING SEEDED SDES
 
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLESPROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
 
An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...
 
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
 
IRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DESIRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DES
 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notes
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
 
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...
 
A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...A secure key computation protocol for secure group communication with passwor...
A secure key computation protocol for secure group communication with passwor...
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
PREVENTION METHOD OF FALSE REPORT GENERATION IN CLUSTER HEADS FOR DYNAMIC EN-...
 
Final report
Final reportFinal report
Final report
 

Viewers also liked

Q01062121126
Q01062121126Q01062121126
Q01062121126
IOSR Journals
 
J1303067178
J1303067178J1303067178
J1303067178
IOSR Journals
 
I017325055
I017325055I017325055
I017325055
IOSR Journals
 
J017345864
J017345864J017345864
J017345864
IOSR Journals
 
A Generalization of QN-Maps
A Generalization of QN-MapsA Generalization of QN-Maps
A Generalization of QN-Maps
IOSR Journals
 
I017446164
I017446164I017446164
I017446164
IOSR Journals
 
L017136269
L017136269L017136269
L017136269
IOSR Journals
 
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
IOSR Journals
 
F017544247
F017544247F017544247
F017544247
IOSR Journals
 
I017144954
I017144954I017144954
I017144954
IOSR Journals
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
IOSR Journals
 
G012125156
G012125156G012125156
G012125156
IOSR Journals
 
B017410916
B017410916B017410916
B017410916
IOSR Journals
 
The Performance Analysis of a Fettling Shop Using Simulation
The Performance Analysis of a Fettling Shop Using SimulationThe Performance Analysis of a Fettling Shop Using Simulation
The Performance Analysis of a Fettling Shop Using Simulation
IOSR Journals
 
A Study on the Relationship between Nutrition Status and Physical Fitness of ...
A Study on the Relationship between Nutrition Status and Physical Fitness of ...A Study on the Relationship between Nutrition Status and Physical Fitness of ...
A Study on the Relationship between Nutrition Status and Physical Fitness of ...
IOSR Journals
 
Optimized Traffic Signal Control System at Traffic Intersections Using Vanet
Optimized Traffic Signal Control System at Traffic Intersections Using VanetOptimized Traffic Signal Control System at Traffic Intersections Using Vanet
Optimized Traffic Signal Control System at Traffic Intersections Using Vanet
IOSR Journals
 
Cutting Strategies for Casting Die Manufacturing on CNC Milling Machine
Cutting Strategies for Casting Die Manufacturing on CNC Milling MachineCutting Strategies for Casting Die Manufacturing on CNC Milling Machine
Cutting Strategies for Casting Die Manufacturing on CNC Milling Machine
IOSR Journals
 
B012540914
B012540914B012540914
B012540914
IOSR Journals
 
E010513037
E010513037E010513037
E010513037
IOSR Journals
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
IOSR Journals
 

Viewers also liked (20)

Q01062121126
Q01062121126Q01062121126
Q01062121126
 
J1303067178
J1303067178J1303067178
J1303067178
 
I017325055
I017325055I017325055
I017325055
 
J017345864
J017345864J017345864
J017345864
 
A Generalization of QN-Maps
A Generalization of QN-MapsA Generalization of QN-Maps
A Generalization of QN-Maps
 
I017446164
I017446164I017446164
I017446164
 
L017136269
L017136269L017136269
L017136269
 
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
 
F017544247
F017544247F017544247
F017544247
 
I017144954
I017144954I017144954
I017144954
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
 
G012125156
G012125156G012125156
G012125156
 
B017410916
B017410916B017410916
B017410916
 
The Performance Analysis of a Fettling Shop Using Simulation
The Performance Analysis of a Fettling Shop Using SimulationThe Performance Analysis of a Fettling Shop Using Simulation
The Performance Analysis of a Fettling Shop Using Simulation
 
A Study on the Relationship between Nutrition Status and Physical Fitness of ...
A Study on the Relationship between Nutrition Status and Physical Fitness of ...A Study on the Relationship between Nutrition Status and Physical Fitness of ...
A Study on the Relationship between Nutrition Status and Physical Fitness of ...
 
Optimized Traffic Signal Control System at Traffic Intersections Using Vanet
Optimized Traffic Signal Control System at Traffic Intersections Using VanetOptimized Traffic Signal Control System at Traffic Intersections Using Vanet
Optimized Traffic Signal Control System at Traffic Intersections Using Vanet
 
Cutting Strategies for Casting Die Manufacturing on CNC Milling Machine
Cutting Strategies for Casting Die Manufacturing on CNC Milling MachineCutting Strategies for Casting Die Manufacturing on CNC Milling Machine
Cutting Strategies for Casting Die Manufacturing on CNC Milling Machine
 
B012540914
B012540914B012540914
B012540914
 
E010513037
E010513037E010513037
E010513037
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 

Similar to G1102014246

Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
pijans
 
Mutual authentication between base and subscriber station can improve the sec...
Mutual authentication between base and subscriber station can improve the sec...Mutual authentication between base and subscriber station can improve the sec...
Mutual authentication between base and subscriber station can improve the sec...
CSCJournals
 
Paper1_Final
Paper1_FinalPaper1_Final
Paper1_FinalViral Savani
 
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
Karthikeyan Ece venkatesan
 
A Review on security issues in WiMAX
A Review on security issues in WiMAXA Review on security issues in WiMAX
A Review on security issues in WiMAX
Editor IJMTER
 
Analysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdfAnalysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdf
Perumalraja Rengaraju
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
Mohammed Abdalhakam Taha
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
caijjournal
 
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLSECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
IJNSA Journal
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
idescitation
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
 
An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key AgreementAn Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreement
ijtsrd
 
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
ijsrd.com
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
JM code group
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
AM Publications,India
 
Authentication in Different Scenarios
Authentication in Different ScenariosAuthentication in Different Scenarios
Authentication in Different Scenarios
Raj Sikarwar
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
cscpconf
 
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Ericsson
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
idescitation
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
 

Similar to G1102014246 (20)

Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
 
Mutual authentication between base and subscriber station can improve the sec...
Mutual authentication between base and subscriber station can improve the sec...Mutual authentication between base and subscriber station can improve the sec...
Mutual authentication between base and subscriber station can improve the sec...
 
Paper1_Final
Paper1_FinalPaper1_Final
Paper1_Final
 
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...Three Tire Proxy Re - Encryption Secret Key (PRESK)  Generation for Secure Tr...
Three Tire Proxy Re - Encryption Secret Key (PRESK) Generation for Secure Tr...
 
A Review on security issues in WiMAX
A Review on security issues in WiMAXA Review on security issues in WiMAX
A Review on security issues in WiMAX
 
Analysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdfAnalysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdf
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
 
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLSECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOL
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key AgreementAn Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreement
 
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
 
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
 
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...
 
Authentication in Different Scenarios
Authentication in Different ScenariosAuthentication in Different Scenarios
Authentication in Different Scenarios
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor NetworksHierarchical Key Agreement Protocol for Wireless Sensor Networks
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

G1102014246

  • 1. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 2 Ver. I (Mar. – Apr. 2016), PP 42-46 www.iosrjournals.org DOI: 10.9790/1676-1102014246 www.iosrjournals.org 42 | Page Mutual Authentication in Wimax Security Using Diffie Hellman Stephen Ochieng Oguta1 , Dr. S. Musyoki2 , Dr. K. Langat3 1 Msc in Telecommunication And Information Engineering Student At Jomo Kenyatta University Of Agriculture And Technology ( P.O BOX 333, 40222 Oyugis Kenya, 2 Department Of Telecommunication And Information Engineering At Jomo Kenyatta University Of Agriculture And Technology (P.O.Box 62000, 00200, Nairobi, Kenya, 3 Senior Lecturer, Department Of Telecommunication And Information Engineering At Jomo Kenyatta University Of Agriculture And Technology, (P.O.Box 62000, 00200, Nairobi, Kenya, Abstract: Network security is becoming an area of concern with the expansion of wireless technology. Many businesses have lost a lot of money as a result of compromised network security. The Worldwide Interoperability for Microwave Access (WiMAX) is one example of 3G technology which is getting popular. Most business establishemnst use WiMAX to network their communication equipments. The popularity of WiMAX and its security vulnarability are the key motivation for this study. Presently, PKM versions of authentication are used to secure WiMAX networks. The PKM authentication methods expose the WiMAX network to third party risks like Man in the Middle attacks, eavesdropping and jamming attacks. WiMAX is thus vulnerable to network attacks that compromise the radio links between the communicating Subscriber Station (SS) and the serving Base Station (BS). The PKMv1 process involves a one sided authentication. The BS authenticates the SS but the SS has no capacity to authenticate a BS. As a result, a rogue BS can successfully enter the network of a SS without prevention. The rogue BS can then tap all the unencrypted management messages. This constitutes a major security flaw. The Man-In- The-Middle (MITM) attack exploits this weakness in the network by eavesdropping, interception and fabrication of the management messages, resulting in a breach in the reliability of the entire network. In this research, a modification of the Diffie-Hellman (DH) key exchange protocol is used to mitigate the man-in-the middle attack in WiMAX by modeling using the Dev C++ programming language. The DH protocol uses a unique algorithm whose solution must be obtained by both the SS and the BS for communication to be allowed. Both the BS and the SS are given an opportunity to authenticate one another before any communication can proceed. Keywords: Diffie Hellman; Mutual Authentication; Security; WiMAX. I. Introduction With the deployment of wireless communication in recent years, security issues in wireless networks also become a growing concern [1] [2]. The Institute of Electrical and Electronics Engineers (IEEE) and Internet Engineers Task Force (IETF) has proposed security mechanisms and protocols to countermeasure security breaches in a way that minimizes the damage which may be caused by the attacks [4]. Even if WiMAX technology has complex authentication and authorization methods and a very strong encryption technique it is still vulnerable to different attacks or threats like jamming, scrambling, MITM or water torture attacks [8]. Privacy or confidentiality is fundamental for secure communication, which provides resistance to interception and eavesdropping. Man-in-the-middle attack is another classic attack and is generally applicable in a communication protocol where mutual authentication is absent. Other familiar attacks include parallel session attack, reflection attack, interleaving attack, attack due to type flaw, attack due to name omission, and attack due to misuse of cryptographic services. PKM V1 and PKM V2 have been used in WiMAX for security purposes [3]. The above versions only secure the data being transferred. It also secures the BS. The MS/SS is however left vulnerable to rogue BS [4]. The rogue BS can tap the management messages before the actual passing of transmitted data. This paper addresses the weaknesses in WiMAX security system and consequently illustrates how DH can help improve the WiMAX network security. MITH takes advantage of the absence of mutual authentication to pose threats to the system [3]. 1.1 Objective The main objective of this paper is to highlight the application of DH algorithm in WiMAX mutual authentication II. Diffie Hellman Algorithm The latest standard, IEEE 802.16e-2005, includes a new version (PKMv2) of the protocol that caters for the shortcomings of the first version. PKMv1 does not have a capacity for mutual authentication.
  • 2. Mutual Authentication In Wimax Security Using Diffie Hellman DOI: 10.9790/1676-1102014246 www.iosrjournals.org 43 | Page Furthermore PKMv2 supports two different mechanisms for authentication: the SS and the BS may use RSA- based authentication or Extensible Authentication Protocol (EAP) -based authentication [21]. This is because the RSA based authentication applies X.509 digital certificates together with RSA encryption. Authentication is therefore made more secure. However, the exchange of vital management information is done before securing the network. In the PKMv2, the BS asks the SS for its certificates and manufacturing IDs. The BS also sends its management information details to SS in the public environment. Such vital information can be tapped by a rogue Station. Mutual authentication takes place in PKMv2 only after the transfer of management information. This is where DH algorithm comes in handy. DH carries out authentication first before the exchange of management information gets transferred. The basic version of the Diffie-Hellman protocol is implemented as described below: Let 1 2 Where:  PkMS is the mobile Station’s public key  PkBS is the base Station’s public key  G and P are global variables called primes numbers  G is a primitive root of P.  ‘Na’ and ‘Nb’ are the private keys of the MS and the BS respectively. In the basic version of DH, after the respective exchange of the public keys, the MS and the BS calculate the shared encryption key as shown in the equations 1 and 2. In order to implement mutual authentication, AS sends Na to BS, BS calculates AKB [6], [7]. BS then sends another unique number Nb to SS. Similarly, SS calculates AKS. If AKS is equal to AKB, AS believes this message sent by BS [8]. The AK in both SS and BS is calculated as follows: 3 The equation 3 illustrates the implementation of DH protocol. Figure 1: Implementation procedure for DH Key Na- Unique number from SS Nb- Unique number from BS AKB- BS authentication key The Diffie Hellman Mutual Authentication Code Diffie-Hellman key exchange (DH) is a cryptographic protocol that allows two parties that have no prior knowledge of each other to establish together a shared secret key over an insecure communications SS sends its Na to BS BS sends its Nb to SS BS calculates AK SS Calculates AK AKS = AKB Allow communication
  • 3. Mutual Authentication In Wimax Security Using Diffie Hellman DOI: 10.9790/1676-1102014246 www.iosrjournals.org 44 | Page channel [2] [5]. Then they use this key to encrypt subsequent communications using a symmetric-key cipher. The scheme was first published publicly by Whitfield Diffie and Martin [4]. Figure 3.1 illustrates the implementation procedure of the proposed protocol. The SS sends a number Na to the BS. The BS then sends another unique number Nb to SS. BS calculates a unique authentication key using the number received from the SS. The SS also calculates a unique authentication key using the number received from the BS. The two results obtained from the calculations must be the same for authentication is to succeed. Communication will be terminated if AKS and AKB are not the same. The mutual authentication code for DH protocol is programmed in Dev C ++ as shown in the code at the appendix section. The following code is written in Dev C++. This program has the mutual authentication functions that illustrate DH algorithm. III. Results And Discussion Dev C ++ allows for the demonstration of DH mutual authentication. The above code is written to help a BS and an SS to communicate one to another and in the process establish a shared authentication key that is later used to access the network [1]. The Responder commits to a protocol session with the Initiator if, and only if, it has correctly finished the session with the Initiator. The Responder will only commit to the Initiator if the latter is correctly authenticated by the Responder and the same applies to the Initiator, if it correctly validates the identity of the Responder as expressed in the challenge response process of the model. In the equations above, Nb is the nonce generated by the Responder, while Na is the nonce generated by Initiator. Equation 3 explains that a shared authentication key must be obtained if two parties are to communicate. The results obtained in figure 2 below show the mutual authentication process. The SS selects its first number to be used in the DH algorithm. This number is used to obtain that calculation result. The result is then sent to BS in a public non secured environment [4]. The BS equally selects its number then sends the result of calculation. The two equipments only arrive at the same solution to the algorithm is they have the right formula. A wrong result is obtained is an equipment has a wring algorithm. This translates to a MITH. Suspicious equipment can never get the right solution to the challenge because the algorithm is only known to legitimate BS and SS [8]. A legitimate station will always get the correct solution to the algorithm challenge. It is also necessary to have more than one trial on the algorithm challenge. This means that a legitimate station can sometimes miss the correct choice of number in the initial attempt. DH algorithm helps two stations which have no prior knowledge of one another to establish a common authentication key. System details can then be exchanged once the shared authentication key is obtained. IV. Conclusion Privacy or confidentiality is fundamental for secure communication, which provides resistance to interception and eavesdropping. Message authentication provides integrity of the message and sender authentication, corresponding to the security attacks of message modification and impersonation. Even if WiMAX technology has complex authentication and authorization methods and a very strong encryption technique, it is still vulnerable to different attacks or threats like jamming, scrambling, MITM or water torture attacks [8]. The results show that the DH protocol works to keep away any intruder in the network. The goal of DH is to carry out mutual authentication. The process of solving the algorithm is complex and only known by the legitimate communication gadgets. Any MITH is kept at bay since they do not have the knowledge of the protocol. Diffie Hellmann protocol algorithm introduces mutual authentication between the BS and SS prior to the exchange of any management information. WiMAX is selected for this research because it is a recent technology and is presently being rolled out in many parts of the world because of its broadband capacities. Further research is needed on the actual implementation of DH protocol in new mobile devices lke smart phones and Ipads. Acknowledgement S. Oguta would like to thank Dr. S. Musyoki and DR. K. Langat for your guidance and presence during the preparation of this paper. S. Oguta also appreciates his family for their understanding and encouragement.
  • 4. Mutual Authentication In Wimax Security Using Diffie Hellman DOI: 10.9790/1676-1102014246 www.iosrjournals.org 45 | Page Figure 2: Results of compilation References [1]. Z.You, X. Xie, W.Zheng," Verification and Research of a WiMAX authentication protocol Based on SSM", ICETC, pp. 34-43, 2010. [2]. E.Yuksel," Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis", Technical Paper at University of Denmark, pp. 45-54, Feb 2007. [3]. Z.You, X.Xie, W.Zheng," Verification and Research of a WiMAX authentication protocol Based on SSM", ICETC, pp. 22-32, 2010. [4]. H.Tseng, R.Hong, W.Yang,"A chaotic maps-base key agreement protocol that preserves user anonymity", IEEE ICC, vol. 3, pp. 67- 70, 2009. [5]. S.Sidharth, M.P.Sebastian," A Revised Secure Authentication Protocol for IEEE 802.16 (e)", International Conference on Advances in Computer Engineering, pp. 34-42, 2010. [6]. K.C.Chen, J.Boberto and B. De Marca, Mobile WiMAX. John Wiley & Sons Ltd, p. 56, 2008. [7]. M.Barbeau, "WiMAX/802.16 Threat Analysis," in Proceedings of ACM Q2SWinet'05, Montreal, Quebec, Canada, 2005, pp. 8-15. [8]. K. Jensen, L.Kristensen, L. Wells," Colored Petri Nets and CPN Tools for Modeling and Validation of Concurrent Systems”, Department of Computer Science, pp. 112-122, 2008. [9]. D. Gollmann. Computer Security Second Edition West Sussex, England: John Wiley & Sons, Ltd, 2006. Pp. 45. Appendix Implementation Code: #include <iostream> #include <math.h> using namespace std; int main () { cout << "nntt" ; int g, a, p, b, b2, A, X, B, Y, C, D, E, F, K1, K2 ; cout << "SS to enter its unique numbernn"; g = 5; p = 7; // the SS and BS agree to use same values of g and p. such an agreement is set at the point of manufacture cout << "nntt" ; cin >> a ; // the SS selects its unique number for computation cout << "nnttt" ; A = pow (g, a); cout << "the first SS computation result is nnntt" ; B = A % p ; cout << B ; // this is the value obtained by the SS cout << "nntt"; // X is then sent by the SS across the network to the BS. cout << " BS to enter its first unique number nntt" ; cin >> b ; // BS selects its unique number for computation
  • 5. Mutual Authentication In Wimax Security Using Diffie Hellman DOI: 10.9790/1676-1102014246 www.iosrjournals.org 46 | Page cout << "nn" ; C = pow (g, b) ; cout << "nntt" ; D = C % p; cout << "the BS computation result is: nntt"; cout << D ; cout << "nntt" ; cout << "SS sends its result to BS and BS equally sends its result to SS. these received values are used in step two calculation nn" ; E = pow (D, a) ; cout << "nntt" ; K1 = E % p ; cout << "the authentication key obtained from SS is: nntt" ; cout << K1 ; cout << "nn" ; F = pow (C, a); cout << "nn" ; K2 = F % p ; cout << "nntt" ; cout << "The authentication key obtained from BS is: nntt" ; cout << K2; cout << "nntt" ; if ( K1 == K2) { cout << "value is the same mutual authentication has been obtained continue with communication the network is securenntt" ; } else { cout << " mutual authentication not obtained. try againnntt" ; cout << "SS to enter its unique number for second attempt nntt"; }