Denial of service vulnerabilities in the 802.16 protocol

نویسندگان

  • Siddharth Maru
  • Timothy X. Brown
چکیده

This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threat model, we assume that the attacker is external to the network i.e. the attacker cannot associate with the network and send packets as a participant; nor can the attacker decrypt encrypted data. However , the attacker is able to analyze the unencrypted parts of the management traffic and observe the timing, size and source of traffic. Further, the attacker can send jamming signals that disrupt a specific packet and cause its contents to be discarded. In this scenario we analyze the vulnerabilities. We find that the attacker can prevent or hinder communication with little effort by disrupting certain important control packets. We detail these attacks and their effects. This analysis also suggests the mitigation techniques to be employed to reduce or eliminate such attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Denial of Service Message Flooding Attacks in SIP based Services

Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its ‎security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol ‎‎(SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation ‎deficiencies cause some security concerns in SIP based infra...

متن کامل

Potential Denial of Service Threat Assessment for Wired and Wireless Networks

Date The final copy of this thesis has been examined by the signatories, and we find that both the content and the form meet acceptable presentation standards of scholarly work in the above mentioned discipline. Thesis directed by Associate Professor Timothy X Brown WiMax was designed to provide Broadband Wireless Connectivity over large distances. Security was one of the important consideratio...

متن کامل

Denial of Service Attacks and Challenges in Broadband Wireless Networks

Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and Wireless Mesh Network (WMN). Security attacks and vulnerabilities vary amongst these broadband wireless networks because of differences in topologies, network operations and physical setups. Amongst the various security ...

متن کامل

Denial of Service on TCP/IP Security Protocols: Vulnerabilities, Tools and Countermeasures

TCP/IP protocol suite, the adapted standard for communication over network, suffers from inherent vulnerabilities in the design of underlying protocols. These vulnerabilities are the main source of various attacks. Security protocols are included in the original TCP/IP suite to provide integrity, availability and confidentiality to the data moving on networks. But these security protocols are a...

متن کامل

Global Journal of Computer Science and Technology

Data security has become a major issue in most network protocols. For wireless system, security support is even more important to protect the users as well as the network. Due to this importance, different protocol were designed & deployed with network standards in order to add the security. The security sub layer of IEEE 802.16 employs an authenticated client/server key management protocol in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008