Security Vulnerabilities and Solutions in Mobile WiMAX

نویسندگان

  • Andreas Deininger
  • Shinsaku Kiyomoto
  • Jun Kurihara
  • Toshiaki Tanaka
چکیده

The development of IEEE 802.16 was started by the IEEE in 2001. After that it was revised several times and ended in the final standard IEEE 802.16-2004 which corresponds to revision D and is often called Fixed WiMAX [1]. It defines Wireless Metropolitan Broadband access for stationary and nomadic use. This means end devices can not move between base stations (BS) but they can enter the network at different locations. This specification was extended by the development of IEEE 802.16e which supports mobility so mobile stations (MS) can handover between BS while communicating. IEEE 802.16e is often called Mobile WiMAX [2] and is an amendment to the IEEE 802.16-2004 standard. Commercial services of Mobile WiMAX are already planned for several countries. On the link layer Mobile WiMAX introduces new features like different handover types, power saving methods and multiand broadcast support. Furthermore IEEE 802.16e eliminates most of the security vulnerabilities discovered in its predecessors [3]. It uses EAP-based mutual authentication, a variety of strong encryption algorithms, nonces and packet numbers to protect against replay attacks and reduced key lifetimes. First of all some parts of the functionality of Mobile WiMAX are introduced. Afterwards different security vulnerabilities and possible solutions to solve them are presented. 1.2 Initial network entry procedure

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey of WiMAX security threats

As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks in. This report is a survey of security vulnerabilities found in WiMAX network. Vulnerabilities and...

متن کامل

A Survey on Security for Smartphone Device

The technological advancements in mobile connectivity services such as GPRS, GSM, 3G, 4G, Blue-tooth, WiMAX, and Wi-Fi made mobile phones a necessary component of our daily lives. Also, mobile phones have become smart which let the users perform routine tasks on the go. However, this rapid increase in technology and tremendous usage of the smartphones make them vulnerable to malware and other s...

متن کامل

Fast and Secure Handover Schemes Based on Proposed WiMAX over EPON Network Security Architecture

In recent years, the integration of Worldwide Interoperability for Microwave Access (WiMAX) and Ethernet Passive Optical Network (EPON) has become one of the most promising broadband access solutions. The EPON network provides tremendous bandwidth while the WiMAX network can support mobility. Integration of PON and WiMAX combines the best of both technologies. However, the integration requires ...

متن کامل

Investigation of Security Issues in WiMAX Networks

In today's era of communication where wireless media is replacing wired media, security is of utmost concern. The WiMAX technology was developed after the analysis of security failures in IEEE 802.11 technology. As WiMAX has a very high coverage area, security becomes one of the most important issues. Both mobile and fixed WiMAX has many striking features like connection-oriented MAC layer, pre...

متن کامل

Security Problems in Mobile Wimax Networks

Mobile Wimax is a new technology which has all the feature in order to be used increasingly in the near future due to its high speed capabilities. Security for Mobile Wimax is an area that needs to be focused upon so as to protect its functionality. Mobile WiMAX systems are based on the IEEE 802.16e-2005 standards which involve a physical (PHY) layer and the medium access control (MAC) layer fo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007