DOI QR코드

DOI QR Code

A Study of WiMAX Security threats and Their Solution

  • Received : 2016.03.05
  • Accepted : 2016.04.02
  • Published : 2016.05.31

Abstract

In this study, we have discussed and illustrated the security issues of WiMAX technology including vulnerabilities, threats and some security solution. Both physical layer and data link layer have been considered. Jamming is a major threat in physical layer, and in data link layer we study an authentication problem and see the problem of some unencrypted messages leading to lack of confidentiality. Some of these vulnerabilities have been solved in the recent amendment of 802.16 and some still remain. Moreover WiMax is a new technology yet.

Keywords

References

  1. A. S. Tanenbaum, "Computer Networks," 4th Edition, Prentice Hall, Inc., New Jersey, 2006.
  2. http://en.wikipedia.org/wiki/WiMax
  3. Fuqiang Liu, Lei Lu, A WPKI-based Security Mechanism for IEEE 802.16e, IEEE Communications Society, Wuhan University, China 2006.
  4. Sen Xu Manton Matthews Chin-Tser Huang, Security Issues in Privacy and Key Management Protocols of Ieee 802.16, Acm Se'06, March 10-12, 2006, Melbourne, Florida, USA.
  5. Krawczyk et. al., RFC 2104: HMAC: Keyed-Hashing for Message Authentication, February 1997, http://tools.ietf.org/html/rfc2104.
  6. Sen Xu, Chin-Tser Huang, Manton M. Matthews, Secure Multicast in WiMAX, Journal Of Networks, Vol. 3, No. 2, February 2008.
  7. Leonardo Maccari, Matteo Paoli, Romano Fantacci, Security analysis of IEEE 802.16, Communications, 2007. ICC '07. IEEE International Conference on 24-28 June 2007 PP.1160-1165.
  8. Tian Haibo, Pang Liaojun, Wang Yumin, Key Management Protocol of the IEEE 802.16e, Wu han University Journal of Natural Sciences Vol.12 No.1, 2007.
  9. Jie Huang, Chin-Tser Huang, Secure Mutual Authentication Protocols for Mobile
  10. Multi-hop Relay WiMAX Networks against Rogue Base/Relay Stations., IEEE ICC, 2011. Vol.3, No.1, pp.1-12., 2011.Wikipedia, RSA, http://en.wikipedia.org/wiki/RSA, accessed: 8:11:2011.
  11. Housley, et. al., RFC 3280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, The Internet Society, April 2002,
  12. http://ieeexplore.ieee.org/iel5/10676/33683/016033
  13. Kejie Lu; Yi Qian; Hsiao-Hwa Chen, wireless broadband access: wimax and beyond - A Secure and Service-Oriented Network Control Framework for WiMAX Networks, IEEE Communications Magazine.May, Vol.1, No.1, pp.20-26, 2007
  14. http://www.cse.wustl.edu/-jain/cse571-09/ftp/wimax2/index.html
  15. Karen Scarfone, Cyrus Tibbs Matthew Sexton, Guide to Securing WiMAX Wireless Communications, Recommendations of the National Institute of Standards and Technology, 2013.
  16. Junaid Qayyum, Muhammad Lal, Faheem Khan, Muhammad Imad, Survey & Assessment of Wimax, Its Security Threats and Their Solutions, International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 11 No: 3, pp. 24-30, 2014.
  17. http://en.wikipedia.org/wiki/802.16
  18. Rakesh Kumar Jha, Dr Upena D Dalal , A Journey on WiMAX and its Security Issues, International Journal of Computer Science and Information Technologies, Vol. 1, No. 4, 256-263, 2010.
  19. Nirwan Ansari; WiMAX Security: Privacy Key Management; International Workshop on Network Security and Wireless Communications, Vol.1, No.1, pp.34-40,2007
  20. A. A. Ayesha Altaf, Rabia Sirhindi, A novel approach against dos attacks in wimax authentication using visual cryptography,The Second International Conference on Emerging Security Information, Systems and Technologies, securware, Vol.1, No.1, pp.56-64, 2008.