ABSTRACT
The primary motivation for this research is to focus on issues of WiMAX security problems and analyzes of vulnerabilities on IEEE 802.16, which is a new and promised topic in telecommunication and wireless networks. Mobile WiMAX system based on the IEEE 802.16e-2005 amendment has more improved security features than previous IEEE 802.16d-based WiMAX network system. WiMAX authentication is achieved by using public key interchange protocol privacy key management and it is supported by RSA cryptography exchange and RSA based authentication applies X.509 certificate together with RSA encryption. In this tutorial we identify potential security requirements for future WiMAX environment and propose promising security technologies to address these requirements through the integration of specific security algorithms into WiMAX environment to enhance security. We expect this call for interest to motivate planning for evolution of 802.16e against security challenges.
- IEEE, IEEE Std 802.16-2004, IEEE standard for WiMAX 802.16-2004, published 1st October 2004, http://ieeexplore.ieee.org/iel5/9349/29691/01350465.pdf?tp=&arnumber=1350465&isnumber=29691Google Scholar
- IEEE, IEEE Std 802.16e-2005 and IEEE Std 802.16-2004/Cor 1-2005 (Amendment and Corrigendum to IEEE Std 802.16-2004), IEEE standard for 802.16e-2005, published 28th February 2006, http://ieeexplore.ieee.org/iel5/10676/33683/01603394.pdf?tp=&arnumber=1603394&isnumber=33683Google Scholar
- Jamshed Hasan, Security Issues of IEEE 802.16 (WiMAX), School of Computer and Information Science, Edith Cowan University, Australia, 2006.Google Scholar
- IEEE standards regarding the 802.16 technology, http://ieeexplore.ieee.org/xpl/standards.jsp?findtitle=802.16&letter=802.16&imageField.x=0&imageField.y=0&opentree=on.Google Scholar
- Ram Dantu, Gabriel Clothier, Anuj Atri, EAP methods for wireless networks, Computer Standards & Interfaces 29 (2007) 289--301. Google ScholarDigital Library
- Arkoudi-Vafea Aikaterini, Security of IEEE 802.16, Royal Institute of Technology 2006 http://people.dsv.su.se/~x04-aia/Final%20Document.pdfGoogle Scholar
- Housley, et. al., RFC 3280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, The Internet Society, April 2002, http://tools.ietf.org/html/rfc3280 Google ScholarDigital Library
- Fuqiang Liu, Lei Lu, A WPKI-based Security Mechanism for IEEE 802.16e, IEEE Communications Society, Wuhan University, China 2006Google Scholar
- Yi Yang; Rui Li. 2009. Toward WiMAX Security. International Conference on Computational Intelligence and Software Engineering, 1--5.Google Scholar
- Hasan S. S., Qadeer M. A. 2005. Security Concerns in WiMAX. First Asian Himalayas International Conference on Internet.Google Scholar
- Lang Wei-min; Zhong Jing-li; Li Jian-jun; Qi Xiang-yu. 2008. Research on the Authentication Scheme of WiMAX. 4th International Conference on Wireless Communications, Networking and Mobile Computing, 1--4.Google Scholar
- Fuqiang Liu, Lei Lu, A WPKI-based Security Mechanism for IEEE 802.16e, IEEE Communications Society, Wuhan University, China 2006Google Scholar
Index Terms
- Addressing security challenges in WiMAX environment
Recommendations
Moving toward seamless mobility: state of the art and emerging aspects in standardization bodies
The challenge to provide seamless mobility in the near future emerges as a key topic in various standardization bodies. This includes first of all the support of seamless handover between homogeneous networks. Distinct technologies--such as IEEE ...
A comparison study between the TLS-based security framework and IKEv2 when protecting DSMIPv6 signaling
This paper presents a comparison study between the TLS-based security for DSMIPv6 and IKEv2 when establishing Security Associations between MN and HA. The network transmission and processing costs are examined for each protocol using different ...
An integrated WiMAX/WiFi architecture with QoS consistency over broadband wireless networks
CCNC'09: Proceedings of the 6th IEEE Conference on Consumer Communications and Networking ConferenceWiMAX and WiFi have emerged as promising broadband access solutions for the latest generation of wireless MANs and LANs, respectively. Their complementary features enable the use of WiMAX as a backhaul service to connect multiple dispersed WiFi hotspots ...
Comments