SECURITY ASSESSMENT OF IEEE 802.16 (WIMAX) – A SHORT COMPARISON BETWEEN IEEE 802.16d AND 802.16e
DOI:
https://doi.org/10.47839/ijc.7.2.515Keywords:
WiMAX, IEEE 802.16e, IEEE 802.16d, WiMAX-Security, Attacks, Shortcomings, CountermeasuresAbstract
The importance of IEEE-Standard 802.16 (WiMAX) is growing and will compete with technologies such as UMTS. However, acceptance and adoption of technologies and services also depend on security. Therefore, this article will deal with some of the basic security features of IEEE 802.16d (Fixed WiMAX). It will summarize the most important elements of the security architecture, present some of its weaknesses, potential attacks and viable counter measurements. Furthermore, we will introduce the basic improvements made by the IEEE 802.16e standard (Mobile WiMAX) compared to Fixed WiMAX. This article extends the paper [11] presented at the IDAACS'2007 conference by describing the data encryption mechanisms in IEEE 802.16e in chapter 4.References
Bundesamt fur Sicherheit in der Informationstechnik 2006. Drahtlose Kommunikations-systeme und Ihre Sicherheitsaspekte, 2006: http://www.bsi.bund.de/literat/doc/drahtkom/drahtkom.pdf
H. Chin-Tser, M. Matthews, X. Sen. Security Issues in Privacy and Key Management Protocols of IEEE 802.16. Department of Computer Science and Engineering – University of South Carolina Columbia, USA, 2006: http://www.cse.sc.edu/~huangct/acmse06cr.pdf#search=acmse06cr.pdf
S. Wattanachai. Security Architecture of the IEEE 802.16 Standard for Mesh Networks. Department of Computer and Systems Sciences Stockholm University/Royal Institute of Technology, 2006. http://www.dsv.su.se/research/seclab/pages/pdf-files/2006-x-360.pdf#search=2006-x-360.pdf
A.-V. Aikaterini. Security of IEEE 802.16 Master of Information and Communication Systems Security. Department of Computer and Systems – Science Royal Institute of Technology, 2006: http://www.dsv.su.se/research/seclab/pages/pdf-files/2006-x-332.pdf
D. Johnston, J. Walker. Overview of IEEE 802.16 Security. IEEE Computer Society, 2004: http://mia.ece.uic.edu/~papers/WWW/Bubbles/segment/WiMax_Security.pdf#search=WiMax_Security.pdf
M. Barbeau. WiMAX/802.16 Threat Analysis. School of Computer Science Carleton University, Ottawa, Ontario, Canada, 2005: http://www.scs.carleton.ca/~barbeau/Publications/2005/iq2-barbeau.pdf#search=iq2-barbeau.pdf
F. Ohrtmann. Wimax Handbook. Building 802.16 Wireless Network, McGraw-Hill Communications, 2005.
IEEE Standard for Local and Metropolitan Area: Networks-Part 16: Air Interface for Fixed Broadband Wireless Access Systems. 2006: http://standards.ieee.org/getieee802/download/802.16e-2005.pdf
Network Working Group. Request for comments: 3394, 2002: http://www.ietf.org/rfc/rfc3394.txt
F. Pugliese. Sicherheitsarchitektur des Standards IEEE 802.16-2004 fur Point-To-Multipoint Netzwerke. 2007.
E. Eren. WiMAX Security Architecture. 4th IEEE Workshop on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS 2007)”, Dortmund, 6-8 September 2007.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.