Denial of service vulnerabilities in the 802.16 protocol
نویسندگان
چکیده
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threat model, we assume that the attacker is external to the network i.e. the attacker cannot associate with the network and send packets as a participant; nor can the attacker decrypt encrypted data. However , the attacker is able to analyze the unencrypted parts of the management traffic and observe the timing, size and source of traffic. Further, the attacker can send jamming signals that disrupt a specific packet and cause its contents to be discarded. In this scenario we analyze the vulnerabilities. We find that the attacker can prevent or hinder communication with little effort by disrupting certain important control packets. We detail these attacks and their effects. This analysis also suggests the mitigation techniques to be employed to reduce or eliminate such attacks.
منابع مشابه
Detecting Denial of Service Message Flooding Attacks in SIP based Services
Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol (SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation deficiencies cause some security concerns in SIP based infra...
متن کاملPotential Denial of Service Threat Assessment for Wired and Wireless Networks
Date The final copy of this thesis has been examined by the signatories, and we find that both the content and the form meet acceptable presentation standards of scholarly work in the above mentioned discipline. Thesis directed by Associate Professor Timothy X Brown WiMax was designed to provide Broadband Wireless Connectivity over large distances. Security was one of the important consideratio...
متن کاملDenial of Service Attacks and Challenges in Broadband Wireless Networks
Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and Wireless Mesh Network (WMN). Security attacks and vulnerabilities vary amongst these broadband wireless networks because of differences in topologies, network operations and physical setups. Amongst the various security ...
متن کاملDenial of Service on TCP/IP Security Protocols: Vulnerabilities, Tools and Countermeasures
TCP/IP protocol suite, the adapted standard for communication over network, suffers from inherent vulnerabilities in the design of underlying protocols. These vulnerabilities are the main source of various attacks. Security protocols are included in the original TCP/IP suite to provide integrity, availability and confidentiality to the data moving on networks. But these security protocols are a...
متن کاملGlobal Journal of Computer Science and Technology
Data security has become a major issue in most network protocols. For wireless system, security support is even more important to protect the users as well as the network. Due to this importance, different protocol were designed & deployed with network standards in order to add the security. The security sub layer of IEEE 802.16 employs an authenticated client/server key management protocol in ...
متن کامل