AES Based Security Architecture Of WIMAX Using OMNET++
نویسندگان
چکیده
Although WiMAX is considered to be the last mile protocol but its security still remains a question because it neither encrypts the MAC (Media access control) headers nor the media MAC management messages. Therefore, an attacker can easily launch passive attacks to monitor WiMAX traffic and can retrieve valuable information from unencrypted MAC management messages. This research paper focuses on the analysis of security threats and their mitigation at MAC Layer of WiMAX. PKM (Privacy and Key management) protocol is used in this regard to gain authorization and traffic keying material between the Base Station to Subscriber Station, and to maintain periodic reauthorization and key refresh. The 128 bit key based AES (Advance Encryption Standard) encryption is also implemented. The target is to encrypt communication between WIMAX based BS (Base station) and MS/SS(Mobile station/subscriber station) using AES where encryption is applied on all the packets exchanged. All the simulations are made in OMNET++ and visual C++ language to visualize encrypted packet transmission between BS and SS. Index Term-Privacy Key Management(PKM), Advance Encryption Standard(AES), Subscriber Station (SS), Base Station (BS), Authorization Key(AK)
منابع مشابه
Efficient FPGA Implementation of AES 128 Bit for IEEE 802.16e Mobile WiMax Standards
In the present era of high speed communication, wireless technology plays a predominant role in data transmission. In the timeline of wireless domain, Wi-Fi, Bluetooth, ZigBee are some of the standards used in today’s wireless medium. In addition, WiMax is introduced by IEEE as IEEE 802.16 standard for long distance communication, and mobile WiMax as 802.16e. WiMax is an acronym of worldwide in...
متن کاملImproved Mobile WiMax Image Privacy Using Novel Encryption Techniques
Mobile WiMax security standards from IEEE specify some powerful standards-based security controls, including PKMv2 EAP-based authentication and over-the-air AES-based encryption. But encryption technique does not guarantee a powerful secure end-to-end image transmission, and, consequently, WiMax presents a range of security design and integration challenges. In this paper, two proposed chaos en...
متن کاملWiMAX : A - State - of - the - Art
In this paper we will review the basic mechanisms used in WiMAX networks to support quality of service guarantees. An outline of the various approaches has been proposed and involved tradeoffs have also been discussed. The various architecture and scheduling mechanism proposed to improve quality of service in WiMAX networks have also been discussed. Then the different type of service flows in W...
متن کاملThe Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملMobile WiMAX Network Security
WiMAX networks provide broadband data access to mobile as well as stationary users. While the wireless link is based on the 802.16e-2005 specification developed by IEEE, a complete network architecture “behind the base station” with global roaming support has been specified by the WiMAX forum. The security architecture for these networks covers EAP/AAA-based secure network access, secure bootst...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013