In an advancement of communication field, wireless technology plays a predominant role in data transmission. In the timeline of wireless domain, Wi-Fi, Bluetooth, zigbee etc are some of the standards, which are being used in today’s wireless medium. In addition, the WiMax is introduced by IEEE in IEEE 802.16 for long distance communication, specifically 802.16e standard for mobile WiMax. It is an acronym of Worldwide Interoperability for Microwave Access. It is to be deliver wireless transmission with high quality of service in a secured environment. Since, security becomes dominant design aspect of every communication, a new technique has been proposed in wireless environment. Privacy across the network and access control management is the goal in the predominant aspects in the WiMax protocol. Especially, MAC sub layer should be evaluated in the security architecture. It has been proposed on cryptography algorithm AES that require high cost. Under this scenario, we present the optimized AES 128 bit counter mode security algorithm for MAC layer of 802.16e standards. To design a efficient MAC layer, we adopt the modification of security layers data handling process. As per the efficient design strategy, the power and speed are the dominant factors in mobile device. Since we concentrate mobile WiMax, efficient design is needed for MAC Security layer. Our proposed model incorporates the modification of AES algorithm. The design has been implemented in Xilinx virtex5 device and power has been analyzed using XPower analyzer. This proposed system consumes 41% less power compare to existing system.
References
[1]
Khan, A.S., Fisal, N., Bakar, Z.A., Salawu, N., Maqbool, W., Ullah, R. and Safdar, H. (2014) Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks. Indian Journal of Science and Technology, 7, 282-295.
[2]
Luo, C.L. (2009) A Simple Encryption Scheme Based on WiMAX. International Conference on E-Business and Information System Security, Wuhan, 23-24 May 2009, 1-4. http://dx.doi.org/10.1109/ebiss.2009.5137899
[3]
Rais, M.H. and Qasim, S.M. (2009) FPGA Implementation of Rijndael Algorithm Using Reduced Residue of Prime Numbers. 4th IEEE International Design and Test Workshop (IDR09), Riyadth, 15-17 November 2009, 1-4. http://dx.doi.org/10.1109/idt.2009.5404130
[4]
Fan, C.P. and Hwang, J.K. (2008) FPGA Implementation of High Throughput Sequential and Fully Pipelined AES Algorithm. International Journal of Electrical Engineering, 15, 447-455.
[5]
Samiee, H., Atani, R.E. and Amindavar, H. (2011) A Novel Area Throughput Optimized Architecture for AES Algorithm. International Conference on Electronic Devices, Systems and Applications (ICEDSA), Kuala Lumpur, 25-27 April 2011, 29-32. http://dx.doi.org/10.1109/ICEDSA.2011.5959055
[6]
Hodjat, A. and Verbauwhede, I. (2004) A 21.54 Gbits/s Fully Pipelined AES Processor on FPGA. 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, Los Angeles, April 2004, 308-309. http://dx.doi.org/10.1109/FCCM.2004.1
[7]
Daemen, J. and Rijmen, V. (1998) The Block Cipher Rijndael. Smart Card Research and Applications. Third International Conference, CARDIS’98, Louvain-la-Neuve, Belgium, 1998, 288-296.
[8]
Dadhich, R., Narang, G. and Yadav, D.M. (2012) Analysis and Literature Review of IEEE 802.16e (Mobile WiMAX) Security. International Journal of Engineering and Advanced Technology, 1, 167-173.
[9]
Ranjeeth, K.D., Alukaidey, T., Salman, K. and Alzaabi, M. (2013) Security Algorithms for WiMax. International Journal of Network Security & Its Applications (IJNSA), 5.
[10]
Yu, N. and Heys, H.M. (2005) Investigation of Compact Hardware Implementation of the Advanced Encryption Standard. Canadian Conference on Electrical and Computer Engineering, Saskatoon, 1-4 May 2005, 1069-1072.
[11]
Algredo-Badillo, I., Feregrino-Uribe, C., Cumplido, R. and Morales-Sandoval, M. (2008) FPGA Implementation Cost and Performance Evaluation of the IEEE 802.16e and IEEE 802.11i Security Architectures Based on AES-CCM. 5th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE 2008), Mexico City, 12-14 November 2008, 304-309. http://dx.doi.org/10.1109/ICEEE.2008.4723408
[12]
Hasan, J. (2006) Security Issues of IEEE 802.16 (WiMAX). 4th Australian Information Security Management Conference, Perth, 5 December 2006.
[13]
Mohamed, M.A., Zaki, F.W. and El-Mohandes, A.M. (2012) Novel Fast Encryption Algorithms for Multimedia Transmission over Mobile WiMax Networks. International Journal of Computer Science, 9, 60.
[14]
FIPPUB197 (2001) Advanced Encryption Standard (AES). November 2001.
[15]
Forouzan, B.A. and Mukhopadhyay, D. (2012) Cryptogrpah and Network Security. 2nd Edition, Tata McGraw-Hill, New Delhi.
[16]
McLoone, M. and McCanny, J.V (2001) High Performance Single-Chip FPGA Rijndael Algorithm Implementations. In: Koc, C.K., Naccache, D. and Paar, C., Eds., Cryptographic Hardware and Embedded Systems—CHES 2001, Springer, Berlin Heidelberg, 65-76. http://dx.doi.org/10.1007/3-540-44709-1_7
[17]
Shanthini. N., Rajasekar, P. and Mangalam, H. (2014) Design of Low Power S-Box in Architecture Level Using GF. International Journal of Engineering Research and General Science, 2, 268-276.
[18]
Rajasekar, P. and Mangalam, H. (2015) Design and Implementation of Low Power Multistage AES S Box. International Journal of Applied engineering Research, 10, 40535-40540.
[19]
Rajasekar, P. and Mangalam, H. (2016) Design of Low Power Optimized MixColumn/Inverse MixColumn Architecture for AES. International Journal of Applied Engineering Research, 11, 922-926.
[20]
Tshering, F. and Sardana, A. (2011) A Review of Privacy and Key Management Protocol in IEEE 802.16e. International Journal of Computer Applications, 20, 25-31. http://dx.doi.org/10.5120/2405-3199
[21]
Litochevski, M. and Dongjum, L. (2012) High Throughput and Low Area AES: Core Specifications. HT LA AES Core Specifications, OpenCores, 1-9.
[22]
Sathyanarayana, H (2012) AES 128. Open Core Projects.