Abstract

The importance of IEEE-Standard 802.16 (WiMAX) is growing and will compete with technologies such as UMTS. However, acceptance and adoption of technologies and services also depend on security. Therefore, this article will deal with some of the basic security features of IEEE 802.16d (Fixed WiMAX). It will summarize the most important elements of the security architecture, present some of its weaknesses, potential attacks and viable counter measurements. Furthermore, we will introduce the basic improvements made by the IEEE 802.16e standard (Mobile WiMAX) compared to Fixed WiMAX. This article extends the paper [11] presented at the IDAACS'2007 conference by describing the data encryption mechanisms in IEEE 802.16e in chapter 4.

Highlights

  • WiMAX (Worldwide Interoperability for Microwave Access) defines a Point-to-MultipointWireless network which operates within a range of 2 to 66 GHz

  • Mutual Authentication The most obvious weakness of IEEE 802.16d is that the SS is not able to check the identity of the base stations (BS)

  • IEEE 802.16d provides a security architecture which basically secures the wireless link using different components such as X.509-certificates, Security Associations (SA), encryption methods, the Encapsulation Protocol, and the Privacy Key Management Protocol (PKM)

Read more

Summary

ELEMENTS OF THE WIMAX SECURITY ARCHITECTURE

WiMAX (Worldwide Interoperability for Microwave Access) defines a Point-to-MultipointWireless network which operates within a range of 2 to 66 GHz. Security is implemented in the so called Privacy Sublayer of the Reference Model. Some essential elements of the IEEE 802.16 Security Architecture will be presented [1]. WiMAX defines the layers PHY and MAC within ISO-OSI. The physical layer (PHY) handles signal connectivity, error correction, initial ranging, registration, bandwidth requests, and connection channels for management and data. The MAC layer manages connections and security. Security Associations Encapsulation Protocol Privacy Key Management Protocol

SECURITY ASSOCIATIONS
ENCAPSULATION PROTOCOL
SECURITY MECHANISMS
PHASE II
PHASE III
KEY MATERIAL EXCHANGE PHASE ATTACKS AGAINST THE KEY SEQUENCE NUMBER
AUTHENTICATION AND AUTHORIZATION
TEK 3-WAY HANDSHAKE
ENCRYPTION OF DATA
ENCRYPTION OF KEYS
CONCLUSIONS

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.