skip to main content
10.1145/2523514.2523586acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
tutorial

Addressing security challenges in WiMAX environment

Published:26 November 2013Publication History

ABSTRACT

The primary motivation for this research is to focus on issues of WiMAX security problems and analyzes of vulnerabilities on IEEE 802.16, which is a new and promised topic in telecommunication and wireless networks. Mobile WiMAX system based on the IEEE 802.16e-2005 amendment has more improved security features than previous IEEE 802.16d-based WiMAX network system. WiMAX authentication is achieved by using public key interchange protocol privacy key management and it is supported by RSA cryptography exchange and RSA based authentication applies X.509 certificate together with RSA encryption. In this tutorial we identify potential security requirements for future WiMAX environment and propose promising security technologies to address these requirements through the integration of specific security algorithms into WiMAX environment to enhance security. We expect this call for interest to motivate planning for evolution of 802.16e against security challenges.

References

  1. IEEE, IEEE Std 802.16-2004, IEEE standard for WiMAX 802.16-2004, published 1st October 2004, http://ieeexplore.ieee.org/iel5/9349/29691/01350465.pdf?tp=&arnumber=1350465&isnumber=29691Google ScholarGoogle Scholar
  2. IEEE, IEEE Std 802.16e-2005 and IEEE Std 802.16-2004/Cor 1-2005 (Amendment and Corrigendum to IEEE Std 802.16-2004), IEEE standard for 802.16e-2005, published 28th February 2006, http://ieeexplore.ieee.org/iel5/10676/33683/01603394.pdf?tp=&arnumber=1603394&isnumber=33683Google ScholarGoogle Scholar
  3. Jamshed Hasan, Security Issues of IEEE 802.16 (WiMAX), School of Computer and Information Science, Edith Cowan University, Australia, 2006.Google ScholarGoogle Scholar
  4. IEEE standards regarding the 802.16 technology, http://ieeexplore.ieee.org/xpl/standards.jsp?findtitle=802.16&letter=802.16&imageField.x=0&imageField.y=0&opentree=on.Google ScholarGoogle Scholar
  5. Ram Dantu, Gabriel Clothier, Anuj Atri, EAP methods for wireless networks, Computer Standards & Interfaces 29 (2007) 289--301. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Arkoudi-Vafea Aikaterini, Security of IEEE 802.16, Royal Institute of Technology 2006 http://people.dsv.su.se/~x04-aia/Final%20Document.pdfGoogle ScholarGoogle Scholar
  7. Housley, et. al., RFC 3280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, The Internet Society, April 2002, http://tools.ietf.org/html/rfc3280 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Fuqiang Liu, Lei Lu, A WPKI-based Security Mechanism for IEEE 802.16e, IEEE Communications Society, Wuhan University, China 2006Google ScholarGoogle Scholar
  9. Yi Yang; Rui Li. 2009. Toward WiMAX Security. International Conference on Computational Intelligence and Software Engineering, 1--5.Google ScholarGoogle Scholar
  10. Hasan S. S., Qadeer M. A. 2005. Security Concerns in WiMAX. First Asian Himalayas International Conference on Internet.Google ScholarGoogle Scholar
  11. Lang Wei-min; Zhong Jing-li; Li Jian-jun; Qi Xiang-yu. 2008. Research on the Authentication Scheme of WiMAX. 4th International Conference on Wireless Communications, Networking and Mobile Computing, 1--4.Google ScholarGoogle Scholar
  12. Fuqiang Liu, Lei Lu, A WPKI-based Security Mechanism for IEEE 802.16e, IEEE Communications Society, Wuhan University, China 2006Google ScholarGoogle Scholar

Index Terms

  1. Addressing security challenges in WiMAX environment

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
            November 2013
            483 pages
            ISBN:9781450324984
            DOI:10.1145/2523514

            Copyright © 2013 Owner/Author

            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 26 November 2013

            Check for updates

            Qualifiers

            • tutorial

            Acceptance Rates

            Overall Acceptance Rate102of289submissions,35%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader