Preview

Wimax: Ieee 802.16 Security Functions

Best Essays
Open Document
Open Document
2185 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wimax: Ieee 802.16 Security Functions
Summary
The wireless technologies have spread almost everywhere over the last few years. Their easiness of deployment and increase in speed make them very attractive for the everyday networking. On the other side the architecture makes wireless networks appealing for security attacks. The broadband wireless access technology WiMAX has been developed considering the security issues coming up with the deployment of Wi-­‐ Fi (WLAN) networks. The security tools implemented in WiMAX aim to overcome issues like access authorisation, user data privacy, and privacy key management. Security protocols in WiMAX reside in a MAC sub-­‐layer and include authentication protocols (EAP and X.509), key management protocols (PKMv2), and encryption standards (AES and 3DES).
The security standard of WiMAX is very high compared to other wireless technologies. However WiMAX is still vulnerable for some attacks that can be performed. Attacks like "jamming" one or "man-­‐in-­‐the-­‐middle" are rare and complex to be executed. Despite it 's still not the best broadband access choice for businesses, WiMAX presents enough security for private and domestic use.
Table of Contents
SUMMARY ................................................................................................................. 3
INTRODUCTION .........................................................................................................5
1. WIMAX SECURITY ..................................................................................................6
1.1 PHYSICAL LAYER SECURITY .............................................................................................6 1.2 WIMAX SECURITY NEEDS .............................................................................................8
2. KEY MANAGEMENT................................................................................................9
2.1 PKM PROTOCOL



References: S. Xu, M. Matthews, and C. T. Huang, “Security issues in privacy and key management protocols of IEEE 802.16,” in Proceedings of the 44th annual Southeast regional conference, Melbourne, Florida, 2006, pp. 113–118. S.P. Ahuja, “An Assessment of WiMAX Security,” Communications and Network, vol. 02, no. 02, pp. 134–137, 2010. A. Ghosh, R. Muhamed, and J. Andrews, “Overview of WiMAX,” in Fundamentals of WiMAX – Understanding Broadband Wireless Networking, Upper Saddle River, NJ: Prentice Hall, 2007. D. Johnston and J. Walker, “Overview of IEEE 802.16 Security,” IEEE SECURITY & PRIVACY, 2004 [Online]. Available: http://people.cs.vt.edu/~kafura/cs6204/Readings/Overview802.16Protocol.pdf. [Accessed: 26-­‐Oct-­‐2012] L J. Hasan, “Security Issues of IEEE 802.16 (WiMAX),” in Australian Information Security Management Conference, 2006, p. 71. Y. Xiao, WiMAX/MobileFi: advanced research and technology. Auerbach Publications, 2007. [15] H. Rohil, P. Mutreja, and S. Kumar, “A Comparative Analysis of WiMAX and Wi-­‐Fi,” IJRIME, vol. 1, no. 2, pp. 144–158, Sep. 2011. [16] A.V. Aikaterini, “Security of IEEE 802.16,” Department of Computer and Systems Science, 2006.

You May Also Find These Documents Helpful

  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    RESEARCH MAN-IN-THE MIDDLE ATTACKS IN ETHERNET WIFI. DESCRIBE HOW THEY ARE IMPLEMENTED AND HOW THEY CAN BE PREVENTED.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    This article gives a high level overview into the 802.11ac wireless standard. 802.11ac is also referred to as “gigabit Wi-Fi” and will be capable of significantly faster data transfer speeds than the current 802.11n. This article includes information on frequency, channels, spatial streams, beam forming and backwards compatibility. PC World is an internationally renowned computer magazine that is published monthly in print and digital form. PC World was established in 1983. The company offers advice, recommendations and information on a wide variety of technological hardware and software. The information in this article shares content that is relevant to the main points of the thesis statement (Bradley, 2012).…

    • 1693 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    802.21

    • 2871 Words
    • 12 Pages

    | W.-S. Lim, D.-W. Kim, Y.-J. Suh and J.-J. Won, "Implementation and performance study of IEEE 802.21 in integrated IEEE 802.11/802.16e networks," Computer Communications, vol. 32, no. 1, pp. 134-143, 2009.…

    • 2871 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    The first type of wireless radio wave transmission to describe in this paper is 802.11B. The 802.11B was an amendment to the original 802.11 standard released in because the original did not have fast enough speeds to be sufficient to support the needs that the technology required. 802.11B added speeds of 5.5 and 11 Mbps. The 802.11B standard also supports wireless devices that are up…

    • 764 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Standardsresearch

    • 1197 Words
    • 5 Pages

    IEEE 802.22. (2012, January 15). Working group for wireless regional area networks. Retrieved from http://standards.ieee.org/news/2011/80222wg_award.html…

    • 1197 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    |8 |Perform an wireless audit of an access point / router and decrypt WEP and WPA |…

    • 632 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Test

    • 414 Words
    • 2 Pages

    entities, materials, or equipment are necessarily the best available for the ..... WLAN Security Best Practices .......................................................................................8-1 ...…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assess and design proper authentication methods for RADIUS and TACACs+ authentication servers deployments as well as IEEE 802.11 WLAN infrastructures…

    • 858 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Wireless connections open our network to potential threats. We should do everything possible to limit the number of allowed wireless devices on our network. I suggest that we enforce a policy of a primary and secondary wireless network. This would allow us to give our employees the functions they need while maintaining a secure network. Our primary network will be secured with Wi-Fi Protected Access version 2 (WPA2) and the user of a complex passphrase to prevent brute force attacks. This section of our network will have a limited number of users allowed,…

    • 904 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Team B and associates were task by Riordan to analysis Riordan’s WAN and add a wireless Network to Riordan Manufacturing, also to analyze and update Riordan’s Internet security in each of the locations and provide documentation for security policies and procedures. What is a wireless network and what are the benefits of going wireless. With the current wireless technology, Wi-Fi is everywhere; one can connect to the Internet by going to coffee houses, airports, hospitals, hotels, and homes. Businesses can stay connected to their coworkers and customers without being tied…

    • 4151 Words
    • 17 Pages
    Better Essays
  • Better Essays

    Network Hardening

    • 2847 Words
    • 12 Pages

    There is nothing more important in any business than securing your network topology from hardware, design and software. This plan is called network hardening and this plan needs to be incredibly detailed with how the network will be secured in each area. The first step to the network hardening plan resides in how you will build the network and then from there how you will secure each section of the network. This paper will discuss access control measures, encryption, PKI, certificates, OS hardening, application hardening, transmission, remote access protection protocols, wireless security, anti-virus software as well as spyware, and email security.…

    • 2847 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Network Security Concepts

    • 1883 Words
    • 8 Pages

    References: Aber, R. (2004, May 7). Network security basics. Retrieved on November 2, 2005 from http://www.ciscopress.com/articles/article.asp?p=170742&seqNum=2…

    • 1883 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Samsung Strategy Map

    • 250 Words
    • 1 Page

    |Communication and Networking » »» » » » » |Access network architecture, security, radio air interface |…

    • 250 Words
    • 1 Page
    Satisfactory Essays