**4. Conclusions**

In this chapter, we reviewed the MBRA rekeying algorithm of the IEEE 802.16e and analyzed several rekeying algorithms for Mobile WiMAX. We reviewed the rekeying algorithms with emphasis on performance and security particularly their effects on operational efficiency, scalability and 1-affects-n phenomenon as well as backward and forward secrecy. We showed that SRA rekeying algorithm is a strong algorithm from the scalability aspect, because it establishes the number of subgroups dynamically and hence strikes a good balance between the number of MS in each subgroup and the total number of subgroups. The overall result is a reduction in the number of unicast messages on rekeying which produce better scalability and efficiency. The future work will focus on reducing energy consumption in the MSs upon rekeying, by broadcasting the group keys to only the selected MSs that need them, rather than sending to all MSs.

2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Op‐ eration in Licensed Bands and Amendment and Corrigendum to IEEE Std

Key Management in Mobile WiMAX Networks

http://dx.doi.org/10.5772/56154

147

[4] "IEEE Standard for Local and Metropolitan Area Networks, Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems," ed: IEEE Press, 2004.

[5] B. Aboba, L. J. Blunk, J. R. Vollbrecht, J. Carlson, and H. Levkowetz, "Extensible Au‐

[7] S. Ahson and M. Ilyas, WiMAX: Standards and Security. CRC Press, Inc. Boca Raton,

[8] D. Johnston and J. Walker, "Overview of IEEE 802.16 Security," IEEE Security and

[9] A. Deininger, S. Kiyomoto, J. Kurihara, and T. Tanaka, "Security Vulnerabilities and Solutions in Mobile WiMAX " IJCSNS International Journal of Computer Science and

[10] T. Shon, B. Koo, J. H. Park, and H. Chang, "Novel Approaches to Enhance Mobile WiMAX Security," EURASIP Journal on Wireless Communications and Networking,

[11] "P802.16m/D6, IEEE Standard for Local and Metropolitan Area Networks - Part 16: Air Interface for Broadband Wireless Access Systems - Advanced Air Interface," May

[12] J. Hur, H. Shim, P. Kim, H. Yoon, and N.-O. Song, "Security Considerations for Handover Schemes in Mobile WiMAX Networks," in IEEE Wireless Communications

[13] S. Rafaeli and D. Hutchison, "A survey of key management for secure group commu‐

[14] M. Baugher, R. Canetti, L. R. Dondeti, and F. Lindholm, "Multicast Security (MSEC)

[16] Y. Challal and H. Seba, "Group Key Management Protocols: A Novel Taxonomy," In‐

[17] S. Gharout, A. Bouabdallah, M. Kellil, and Y. Challal, "Key Management With Host Mobility in Dynamic Groups," in International conference on Security of information

[18] S. Xu, C.-T. Huang, and M. M. Matthews, "Secure Multicast in WiMAX," Journal of

and Networking Conference (WCNC), 2008, pp. 2531-2536.

Group Key Management Architecture," in RFC 4046, 2005

and networks New York, USA, 2010, pp. 186-193.

Networks, vol. 3, pp. 48-57, 2008.

nication " ACM Computing Surveys, vol. 35, pp. 309-329, 2003.

[15] T. Hardjono and L. R. Dondeti, Multicast And Group Security. USA, 2003.

ternational Journal of Information Technology, vol. 2, pp. 105-118, 2005.

802.16-2004," ed: IEEE Press, 2006.

thentication Protocol," RFC 3748, 2004.

Privacy, vol. 2, pp. 40-48, 2004.

Article ID 926275, 2010.

2010

Network Security vol. 7, pp. 7-15, 2007.

FL, USA, 2008.

[6] R. Laboratories, PKCS #1: RSA Cryptography Standard, 2002.
