The wireless technologies have spread almost everywhere over the last few years. Their easiness of deployment and increase in speed make them very attractive for the everyday networking. On the other side the architecture makes wireless networks appealing for security attacks. The broadband wireless access technology WiMAX has been developed considering the security issues coming up with the deployment of Wi-‐ Fi (WLAN) networks. The security tools implemented in WiMAX aim to overcome issues like access authorisation, user data privacy, and privacy key management. Security protocols in WiMAX reside in a MAC sub-‐layer and include authentication protocols (EAP and X.509), key management protocols (PKMv2), and encryption standards (AES and 3DES).
The security standard of WiMAX is very high compared to other wireless technologies. However WiMAX is still vulnerable for some attacks that can be performed. Attacks like "jamming" one or "man-‐in-‐the-‐middle" are rare and complex to be executed. Despite it 's still not the best broadband access choice for businesses, WiMAX presents enough security for private and domestic use.
Table of Contents
SUMMARY ................................................................................................................. 3
INTRODUCTION .........................................................................................................5
1. WIMAX SECURITY ..................................................................................................6
1.1 PHYSICAL LAYER SECURITY .............................................................................................6 1.2 WIMAX SECURITY NEEDS .............................................................................................8
2. KEY MANAGEMENT................................................................................................9
2.1 PKM PROTOCOL
References: S. Xu, M. Matthews, and C. T. Huang, “Security issues in privacy and key management protocols of IEEE 802.16,” in Proceedings of the 44th annual Southeast regional conference, Melbourne, Florida, 2006, pp. 113–118. S.P. Ahuja, “An Assessment of WiMAX Security,” Communications and Network, vol. 02, no. 02, pp. 134–137, 2010. A. Ghosh, R. Muhamed, and J. Andrews, “Overview of WiMAX,” in Fundamentals of WiMAX – Understanding Broadband Wireless Networking, Upper Saddle River, NJ: Prentice Hall, 2007. D. Johnston and J. Walker, “Overview of IEEE 802.16 Security,” IEEE SECURITY & PRIVACY, 2004 [Online]. Available: http://people.cs.vt.edu/~kafura/cs6204/Readings/Overview802.16Protocol.pdf. [Accessed: 26-‐Oct-‐2012] L J. Hasan, “Security Issues of IEEE 802.16 (WiMAX),” in Australian Information Security Management Conference, 2006, p. 71. Y. Xiao, WiMAX/MobileFi: advanced research and technology. Auerbach Publications, 2007. [15] H. Rohil, P. Mutreja, and S. Kumar, “A Comparative Analysis of WiMAX and Wi-‐Fi,” IJRIME, vol. 1, no. 2, pp. 144–158, Sep. 2011. [16] A.V. Aikaterini, “Security of IEEE 802.16,” Department of Computer and Systems Science, 2006.