Collaborative attacks in WiMAX networks

نویسندگان

  • Bharat K. Bhargava
  • Yu Zhang
  • Nwokedi C. Idika
  • Leszek Lilien
  • Mehdi Azarmi
چکیده

In this paper, we discuss security problems, with a focus on collaborative attacks, in the Worldwide Interoperability for Microwave Access (WiMAX) scenario. The WiMAX protocol suite, which includes but is not limited to DOCSIS, DES, and AES, consists of a large number of protocols. We present briefly the WiMAX standard and its vulnerabilities. We pinpoint the problems with individual protocols in the WiMAX protocol suite, and discuss collaborative attacks on WiMAX systems. We present several typical WiMAX attack scenarios, including: bringing a large number of attackers to increase their computation power and break WiMAX protocols; assembling a sufficient number of attackers to influence the decision-making of core machines, which includes routing attacks and Sybil attacks; and exploiting implementations that do not conform to the WiMAX specification completely, causing interoperability problems among various protocols, including the ones in typical WiMAX/WiFi/LAN deployment scenarios. We present theoretical models and practical solutions to profile, model, and analyze collaborative attacks in WiMAX. We employ attack graphs to do vulnerability analysis. Experimental results verify our models and validate our analysis. Copyright © 2009 John Wiley & Sons, Ltd.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model

In this paper, a security problem of cooperative immunization against collaborative attacks such as blackhole attacks and wormhole attacks, in the mobile ad hoc networks such as theWorldwide Interoperability forMicrowave Access (WiMAX) networks, was discussed. Because of the vulnerabilities of the protocol suites, collaborative attacks in the mobile ad hoc networks can cause more damages than i...

متن کامل

Assessing the Effect of WiMAX System Parameter Settings on MAC-level Local DoS Vulnerability

The research community has established that WiMAX networks suffer from Denial of Service (DoS) vulnerabilities. In this paper, we analyze how WiMAX system parameter settings increase or decrease DoS vulnerabilities of WiMAX networks. The behavior of the WiMAX MAC level protocol is sensitive to the settings of core system parameters. Unlike traditional network-based DoS attacks, attacks resultin...

متن کامل

DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems

The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...

متن کامل

DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems

The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...

متن کامل

A COUNTERMEASURE FOR FLOODING ATTACK IN MOBILE WiMAX NETWORKS

Worldwide Interoperability for Microwave Access (WiMAX) is a new communication technology that conduits the fissure between fixed and mobile access and offers the same Quality of Service (QoS) to both types of users. Generally, WiMAX is more vulnerable to the inside and outside attacks due to the absence of any clear line of defense. The Mobile Subscriber Stations (MSSs) selected to transfer th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Security and Communication Networks

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2009