skip to main content
10.1145/2459976.2459993acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Cost-effective quality assurance of wireless network security

Published: 08 January 2013 Publication History

Abstract

Wireless communication is a common part of modern society, incorporated into new products and services bringing additional security risks and requirements. To meet these needs and assure quality assurance, thorough wireless security testing needs to be completed before new products or services are released. Meticulous testing is expensive, consuming resources and time. This paper presents a general method for network security analysis and experimentation that reduces time and costs. Factorial experiment design tests multiple factors in parallel, while producing robust, repeatable and statistically significant results by treating all other parameters as noise when testing first order effects. Also, second and third order effects can be analyzed with less significance. This paper presents this approach used in the experimental design and statistical analysis of a WiMAX denial of service (DoS) attack targeting bandwidth contention resolution system parameters of IEEE 802.16e. We outline how this approach can be used as a cost-effective method for network security analysis.

References

[1]
Anderson, R. 2001. Why information security is hard - an economic perspective. Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual, (Dec. 2001) 358--365, 10--14. DOI= 10.1109/ACSAC.2001.991552
[2]
Boom, D. D. 2004. Denial of service vulnerabilities in IEEE 802.16 wireless networks. Master's thesis, Naval Postgraduate School, 2004.
[3]
Deng, J., Brooks, R. and Martin, J. 2012. WiMAX system parameter settings on MAC-level local DoS vulnerability. International Journal of Performability Engineering, Vol. 8, (March 2012) 163--178
[4]
Latkoski, P., Hadzi-Velkov, Z. and Popovski Latkoski. B. 2010. Modeling and optimization of bandwidth request procedure in IEEE 802.16 networks. 2010 IEEE 21 st International Symposium on Personal Indoor and Mobile Radio Communications, (2010) 1469--1474.
[5]
Montgomery, D. C. 1991. Design and Analysis of Experiments. Third Edition, John Wiley & Sons, 1991.
[6]
Naseer, S., Younus, M. and Ahmed, A. 2008. Vulnerability exposing IEEE 802.16e networks to dos attacks: a survey. The 9th ACIS International Conference on Software Engineering, Artifcial Intelligence, Networking and Parallel/Distributed Computing, (August 2008) 344--349.
[7]
NIST. Simulation models for ns-2. http://www.nist.gov/itl/antd/emntg/ssm tools.cfm, 2009.
[8]
ns. The network simulator - ns-2. www.isi.edu/nsnam/ns/.
[9]
Prasad, R. and Velex, F. J. 2010. WiMAX Networks: Techno-Economic Vision and Challenges. Springer Science+Business Media, (2010) 137--190.
[10]
Rutherford, A. 2001. Introducing ANOVA and ANCOVA. Great Britain by Athenaeum Press, Gateshead, 2001.
[11]
Sayenko, A., Alanen, O. and Hamalainen, T. 2007. On contention resolution parameters for the IEEE 802.16 base station. Global Telecommunications Conference, (November 2007) 4957--4962.

Index Terms

  1. Cost-effective quality assurance of wireless network security

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
    January 2013
    282 pages
    ISBN:9781450316873
    DOI:10.1145/2459976

    Sponsors

    • Los Alamos National Labs: Los Alamos National Labs
    • Sandia National Labs: Sandia National Laboratories
    • DOE: Department of Energy
    • Oak Ridge National Laboratory
    • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
    • BERKELEYLAB: Lawrence National Berkeley Laboratory
    • Argonne Natl Lab: Argonne National Lab
    • Idaho National Lab.: Idaho National Laboratory
    • Pacific Northwest National Laboratory
    • Nevada National Security Site: Nevada National Security Site

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 January 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. IEEE 802.16e
    2. WiMAX
    3. bandwidth contention resolution
    4. denial of service
    5. factorial experimental design
    6. quality assurance
    7. statistical analysis
    8. wireless security

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CSIIRW '13
    Sponsor:
    • Los Alamos National Labs
    • Sandia National Labs
    • DOE
    • Lawrence Livermore National Lab.
    • BERKELEYLAB
    • Argonne Natl Lab
    • Idaho National Lab.
    • Nevada National Security Site
    CSIIRW '13: Cyber Security and Information Intelligence
    January 8 - 10, 2013
    Tennessee, Oak Ridge, USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 173
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media