Abstract
The importance of IEEE-Standard 802.16 (WiMAX) is growing and will compete with technologies such as UMTS. However, acceptance and adoption of technologies and services also depend on security. Therefore, this article will deal with some of the basic security features of IEEE 802.16d (Fixed WiMAX). It will summarize the most important elements of the security architecture, present some of its weaknesses, potential attacks and viable counter measurements. Furthermore, we will introduce the basic improvements made by the IEEE 802.16e standard (Mobile WiMAX) compared to Fixed WiMAX. This article extends the paper [11] presented at the IDAACS'2007 conference by describing the data encryption mechanisms in IEEE 802.16e in chapter 4.
Highlights
WiMAX (Worldwide Interoperability for Microwave Access) defines a Point-to-MultipointWireless network which operates within a range of 2 to 66 GHz
Mutual Authentication The most obvious weakness of IEEE 802.16d is that the SS is not able to check the identity of the base stations (BS)
IEEE 802.16d provides a security architecture which basically secures the wireless link using different components such as X.509-certificates, Security Associations (SA), encryption methods, the Encapsulation Protocol, and the Privacy Key Management Protocol (PKM)
Summary
WiMAX (Worldwide Interoperability for Microwave Access) defines a Point-to-MultipointWireless network which operates within a range of 2 to 66 GHz. Security is implemented in the so called Privacy Sublayer of the Reference Model. Some essential elements of the IEEE 802.16 Security Architecture will be presented [1]. WiMAX defines the layers PHY and MAC within ISO-OSI. The physical layer (PHY) handles signal connectivity, error correction, initial ranging, registration, bandwidth requests, and connection channels for management and data. The MAC layer manages connections and security. Security Associations Encapsulation Protocol Privacy Key Management Protocol
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.