SlideShare a Scribd company logo
1 of 14
Download to read offline
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 
A COUNTERMEASURE FOR FLOODING 
ATTACK IN MOBILE WiMAX NETWORKS 
Deva Priya and Pradeep Kumar 
Department of CSE, Sri Krishna College of Technology, Coimbatore, Tamil Nadu, India. 
ABSTRACT 
Worldwide Interoperability for Microwave Access (WiMAX) is a new communication technology that 
conduits the fissure between fixed and mobile access and offers the same Quality of Service (QoS) to both 
types of users. Generally, WiMAX is more vulnerable to the inside and outside attacks due to the absence of 
any clear line of defense. The Mobile Subscriber Stations (MSSs) selected to transfer the packets to the 
Base Station (BS) are vulnerable to Denial of Service (DoS) attacks like flooding. Recent research has 
discovered that DoS attacks can easily be launched by injecting malevolent management frames into the 
WiMAX network based on the Privacy and Key Management- ReSPonse (PKM-RSP) and Automatic Repeat 
ReQuest (ARQ)-Reset messages. In this paper, an algorithm is proposed to mitigate the flooding attacks 
and enhance the security level in the network. 
KEYWORDS 
WiMAX, Threats, Flooding attack, Authentication, Flood count. 
1.INTRODUCTION 
WiMAX, Worldwide Interoperability for Microwave Access is a telecommunications technology 
that offers transmission of wireless data via a number of transmission methods. The WiMAX 
technology offers around 72 Mbps without any need for cables. It is based on IEEE 802.16 
standard, usually known as Broadband Wireless Access (BWA) networks. WiMAX Forum was 
formed to encourage compliance and interoperability of the WiMAX IEEE 802.16 standard. It 
offers last mile broadband access as a substitute to conventional cable and DSL lines. Existing 
technologies such as Digital Subscriber Line (DSL), cable and fixed wireless are overwhelmed by 
expensive installs, problems with loop lengths, upstream upgrade issues, line-of-sight restrictions 
and poor scalability. 
WiMAX is the next stage to broadband as well as a wireless world, extending broadband wireless 
access to new locations and over longer distances. It considerably reduces the cost of bringing 
broadband to new areas. It offers greater range and bandwidth than the other available or 
forthcoming broadband wireless technologies such as Wireless Fidelity (WiFi) and Ultra-wideband 
(UWB) family of standards. It provides a wireless alternative to wired backhaul and 
last mile deployments that use Data over Cable Service Interface Specification (DOGS1S) Cable 
modems, DSL, T-carrier and E-carrier (Tx/Ex) systems and Optical Carrier Level (OC-x) 
technologies. New organizations as well as individuals adopt broadband, whereas those already 
using broadband depend and demand better services with added benefits. To support this 
DOI:10.5121/ijcsa.2014.4508 99
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 
exceptional new demand, WiMAX has emerged as a feasible solution because of its inherent 
features that hold great promises for the future of wireless communications. 
There has been a lot of excitement about WiMAX and the impact that this standard based 
wireless network technology has on the broadband access market. This hype has generated great 
expectations and the industry has responded with exceptional aggression and commitment 
towards taking broadband to the next level with WiMAX. 802.16-2004 or 802.16d referred as 
fixed WiMAX was developed by a third party. This standard lacks mobility. Some amendments 
were made to 802.16d and it was referred as 802.16e. 802.16e introduced mobility and is known 
as mobile WiMAX. Figure 1 shows the WiMAX architecture. 
100 
Figure 1. WiMAX Architecture 
The general initiative of metropolitan area wireless networking as envisioned by 802.16 begins 
with fixed wireless. A backbone of Base Stations (BSs) is connected to a public network and each 
BS carries hundreds of fixed Mobile Subscriber Stations (MSSs) which can be both public hot 
spots and fire-walled enterprise networks. 
Later in the development cycle of 802.16e, WiMAX encourages mobile wireless technology 
specifically wireless transmissions directly to mobile end users. This is similar in function to the 
General Packet Radio Service (GPRS) and the one time Radio Transmission Technology (RTT) 
offered by mobile phone companies. 
The Time Division Duplexing (TDD) and Frequency Division Duplexing (FDD) are the two 
types of duplexing mechanism followed by IEEE 802.16. 
Downlink-MAP (DL-MAP) and Uplink-MAP (UL-MAP) are used to describe the contents of 
Downlink (DL) and Uplink (UL) respectively and also the timing in both transmissions [1]. In 
TDD, the MSSs are provided with time slots for transmission and the BSs with the DL schedules. 
In FDD, both UL and UL are simultaneous processes. 
The privacy issues are dealt by the Privacy Sublayer (PS) in the Medium Access Control (MAC) 
layer. The PS is based on two main components, an encapsulation protocol for providing packet 
data encryption and Privacy and Key Management (PKM) protocol for providing secure 
distribution of the keying material and authorized access to connection between BS and SS.
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 
101 
The two main goals of WiMAX are 
• To provide maximum security to the wireless networks 
• To provide the network with access control 
In [2], various requirements that a WiMAX protocol should satisfy to provide high security are 
discussed. Following features are to be considered for ensuring security in a network. 
Confidentiality 
When sensitive data is transferred through the WiMAX network, it should ensure that the data is 
available only to authorized users. If this confidentiality is not maintained, security of the 
standard is not guaranteed. 
Authenticity 
Mutual authentication should be provided to ensure authenticity. This mutual authentication 
mechanism should ensure that the data sent by the user is received without any modification. It 
should not be possible for intruders to insert false information into the original data. The data 
should be accessible only by authenticated users. 
Integrity 
The standard must ensure that the shared key should not be tampered or altered by the intruder. 
The data should not be tampered while in transit by an intruder. This property is as important as 
authentication. 
Access Control 
The standard should ensure that only authorized users should access the network by connecting to 
it and receive desired services. 
1.1.How WiMAX Works? 
The backhaul of the WiMAX is based on the typical connection to the public wireless networks 
by using optical fibre, microwave link, cable or any other high speed connectivity. In few cases 
such as mesh networks, Point-to-Multipoint (PMP) connectivity is also used as a backhaul. 
Ideally, it uses Point-to-Point (P2P) antennas as a backhaul to join subscriber sites to each other 
and to BSs across long distances. 
A WiMAX BS serves MSSs using Non-Line-of-Sight (NLOS) or Line-of-Sight (LOS) PMP 
connectivity which is referred to as the last mile communication. Ideally, WiMAX uses NLOS 
PMP antennas to connect residential or business subscribers to the BS. A WiMAX Customer 
Premises Equipment (CPE) typically serves a building using wired or wireless Local Area 
Network (LAN).
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 
1.2.Layered Architecture 
The WiMAX/802.16 is a layered architecture consisting of two main layers: 
• Physical (PHY)layer 
• Medium Access Control 
(MAC) layer 
Both the layers are vulnerable to attacks of their own kind. In the 
transmitted as equal length sequenced frames. This layer is subjected to attacks like jamming and 
scrambling. The MAC layer is connection oriented with two types of connections: 
• Management connections 
• Data transport connection 
This layer experiences attacks like Man 
2 shows the layers of IEEE 802.16 protocol. The important part of this layered architecture is the 
sublayer system. The standard defines the Services Access points (SAPs 
consists of three sublayers they are 
• Convergence Sublayer (CS) 
• Common Part Sublayer (CPS) 
• Privacy Sublayer (PS) 
Fig 
Convergence Sublayer (CS) 
The service specific CS maps higher level data services to 
connections. There are two types of CSs: 
• Asynchronous Transfer Mode (ATM) 
PHY layer the bits are 
ayer connections 
Man-In-The-Middle (MITM), DoS and eavesdropping. Figure 
ublayer SAPs). The MAC layer 
Figure2. WiMAX Layered Architecture 
the MAC layer service flows and 
CS which is designed for ATM network 
102 
avesdropping. ).
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 
• Service packet CS is designed to support Ethernet, P2P, both IPv4 and IPv6 internet 
103 
protocols and Virtual Local Area Network (VLAN) [3]. 
Common Part Sublayer (CPS) 
The CPS is the core of the standard. The CPS defines the rules and mechanisms for system 
access, connection management and bandwidth allocation. Functions like UL scheduling, 
bandwidth request and grant, Automatic Repeat Request (ARQ) and connection control are also 
defined here. Communications between the CS and the MAC CPS are done by MAC Service 
Access Point (MAC SAP). 
Privacy Sublayer 
There are two main protocols in this sublayer: 
• Encapsulation protocol for encrypting packet data across the fixed BWA. 
• PKM for providing secure distribution of keying data from the BS to the MSS [4]. 
2.THREATS IN WiMAX 
Some of the common threats in WiMAX are discussed below. 
Jamming 
Radio Frequency (RF) jamming is seen in all wireless networks. This attack is due to the 
overwhelmed interference of the RF signal into the spectrum range used by the system. This 
denies the service of the wireless nodes that are in the range of the RF signals. This jamming 
attack is a DoS attack. 
Scrambling 
Scrambling is due to the interference of the RF signal during the transmission of the management 
signals. As this attack is seen for a short period of time, it is difficult to detect when compared to 
jamming attack. It leads to overall degradation of the system. 
Man-In-The-Middle (MITM) 
MITM attacks occur when an adversary deceives a MSS to appear as a legitimate BS while 
simultaneously deceiving a BS to appear as a legitimate MSS. This allows an adversary to 
eavesdrop and corrupt data communications. 
Denial of Service (DoS) Attack 
It is the most harmful and dangerous attack which can be launched on any layer of BWA 
network. When authorized users are not provided requested services within a defined maximum 
waiting time, it means that a DoS violation has occurred. DoS attacks target availability by 
preventing communication between network devices or by preventing a single device from 
sending or receiving traffic, where availability ensures that authorized users can access the data, 
services and network resources from anywhere anytime. This type of attack will invoke 
unnecessary state transitions.
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 
104 
Eavesdropping 
Eavesdropping occurs when an adversary uses a WiMAX traffic analyzer within the range of a 
BS and/or SS/MS. The adversary may monitor management message traffic to identify 
encryption ciphers, determine the footprint of the network or conduct traffic analysis regarding 
specific WiMAX nodes. 
Flooding Attack 
Flooding attacks occur when a network or service becomes heavy with packets, initiating 
incomplete connection requests that it can no longer process genuine connection requests. In data 
flooding attack, the attacker gets into the network and sets up paths between all the nodes in the 
network. Once the paths are established, the attacker injects an immense amount of useless data 
packets into the network which are directed to all the other nodes in the network. These immense 
unwanted data packets congest the network. Any node that serves as destination will be mounted 
with useless and unwanted data. 
Blackhole Attack 
In the blackhole attack, the intruder takes hold of a particular routing node and makes it to drop 
all its packets. If the attacker drops only selective packets and keeps forwarding the rest of the 
packets, then the attack is called as grayhole attack. Black hole attack results in extensive use of 
time and energy by the selected node in the WiMAX network. 
In [5], a confidence level based prediction mechanism to predict the prevalence of black hole 
attack is proposed which eliminates the vindictive nodes. 
Wormhole attack 
In wormhole attack, an attacker receives packets at one point in the network, tunnels them to 
another point in the network, and then replays them into the network from that point. Routing can 
be disrupted when routing control message are tunneled. This tunnel between two colluding 
attackers is known as a wormhole. The wormhole attack is particularly dangerous in ad hoc 
networks, in which the nodes that hear a packet transmission directly from some node consider 
themselves to be in range of that node. 
3.AUTHENTICATION IN WIMAX 
As explained in [6], the authentication method supported by the MSS is determined by the 
encapsulation protocol. The encapsulation protocol consists of data encryption algorithm, the data 
authentication algorithm and Traffic Encryption Key (TEK) encryption algorithm. The 
authentication and authorization by the MSS is defined by the PKM protocols. It also describes 
the periodic re-authorization, reception and renewal of key material. 
IEEE 802.6 supports two versions of PKM protocols: MSS authentication is provided by PKMv1 
and mutual authentication by PKMv2. The Security Association (SA) is a set of security 
parameters of the connection.
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 
105 
3.1.Vulnerabilities Analysis 
The various vulnerabilities in IEEE 802.16 are discussed in [7]. 
Unauthenticated Messages 
Most of the messages in IEEE 802.16 are integrity protected by either a Hash based Message 
Authentication Code (HMAC) or Cipher based Message Authentication Code (CMAC). In 
WiMAX security architecture there is no common key authentication used to secure the broadcast 
messages. There are certain messages which do not contain any common key, where these 
messages will become a threat. 
Unencrypted Management Communication 
In WiMAX management messages are still sent in the clear. The consequential risk is outlined in 
this section. When a MSS performs initial network entry, it negotiates communication parameters 
and settings with the BS. Here, a lot of information like security negotiation parameters, 
configuration settings, power settings, mobility parameters, vendor information and capabilities 
of the MSSs are exchanged. Currently the complete management message exchange in the 
network entry process is unencrypted and the above mentioned information can be accessed just 
by listening on the channel. 
3.2.Shared Key in Multicast and Broadcast Service 
The multicast and broadcast service offers the possibility to distribute data to multiple MS with 
one single message. This saves cost and bandwidth. Broadcasted messages in IEEE 802.16e are 
encrypted symmetrically with a shared key. Every member in the group knows the key and can 
decrypt the traffic. Message authentication is based on the same shared key. 
4.RELATED WORK 
In [8], various threats to wireless networks are discussed. It proposes a solution to eliminate the 
threats by using a strong encryption technique with intrusion prevention system. The PHYlayer is 
more vulnerable to threats than the MAC layer 
As described in [9], WiMAX uses mutual authentication to protect from forgery attacks, but the 
authorization process is still vulnerable because there is no way to ensure integrity of the 
messages. Anyone with a properly placed radio receiver can catch an authorization message, 
modify and retransmit it. There is no digest used to prove that the message is not modified. To 
overcome these attacks, PKM is used. 
In [10], key space vulnerability due to insufficient key size is discussed. To protect the keying 
materials from attack, a solution is proposed that increases the number of bits for both the keys. 
Network performance can be degraded if the attacker sends spoofed messages to the BS and 
make it believe that the MSS has weaker security algorithm. [11].
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 
The threats that arise from WiMAX authentication scheme are discussed in [12]. WiMAX 
supports unilateral device level authentication which can be implemented in a similar way as 
WiFi MAC filtering based on the hardware device address. Therefore, address sniffing and 
spoofing makes a MSS masquerade attack possible. In addition, the lack of mutual authentication 
makes a MITM attack from a rogue BS possible. However, a successful MITM attack is difficult 
because of the Time Division Multiple Access (TDMA) model in WiMAX. 
The attacker and the legitimate BS must transmit at the same time using a much higher power 
level to “hide” the legitimate signal. Various attacks in the authentication phase and the key 
material exchange phase are discussed. The process in the authentication phase can be interrupted 
by an intruder by obtaining the authorization reply message and sending false request message to 
the BS. This overloads the BS and it does not respond to the messages from the MSS. This is 
called as replay/DoS attack. In the data encryption phase, the MSS requests the key material 
(TEKs). The MSS periodically sends key request messages referring to one of its valid Security 
Association Identifiers (SAIDs). An attacker captures the TEK messages and replays them to gain 
information needed to decrypt the data traffic. This attack can be mitigated by increasing the 
length of the sequence number so that a satisfactory amount of TEK sequence numbers can be 
generated and transmitted within the longest validity duration of the Authentication Key (AK). 
In [13], the Rogue BS or Relay Station (RS) attack is discussed. It is one of the most common 
attacks on wireless authentication protocols. A malicious node impersonates a legitimate BS or 
RS node with fake credentials and tries to convince a joining RS or MSS to connect with it. 
Alternately, an attacker may try to compromise a legitimate BS or RS to get control over it. IEEE 
802.16j uses PKMv2 to counter possible rogue BS attack by using mutual authentication. 
However, there is an implicit assumption in PKMv2 that BS is always trustworthy. PKMv2 does 
not provide any protection to detect and counter the attack from a compromised BS. Moreover, 
the distributed security mode in Mobile Multihop Relay (MMR) WiMAX networks also makes 
rogue RS attack possible. This is because the authentication procedure between RS nodes is not 
performed by a centralized server but is based on the trust between nodes. If one node is 
compromised, its trust with other nodes is also compromised. 
In [14], a cross-layered mechanism is proposed which provides a secured transfer of data as well 
as avoids retransmission. This work proposes a novel energy-conserved, fault-tolerant, intrusion-less 
106 
clustering mechanism that ensures security at the group heads in a region. 
5.FLOODING ATTACK 
By flooding a server or host with connections that cannot be completed, the flooding attack 
eventually fills the host’s memory buffer. Once this buffer is full no further connections can be 
made and results in a DoS attack. The malicious node steams excessive amount of false packets 
into the network that clog the network and deplete the available network bandwidth for 
communication among other nodes in the network.
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 
Figure 3. Flooding attack 
A legitimated user will not be able to use the network resources for valid communication. The 
goal of flooding attack is to exhaust the network resources like bandwidth and to consume a 
node’s resources like computational and battery power or to disrupt the routing operation to caus 
severe degradation in network performance. Due to limited availability of resource constraints, 
resource consumption owing to flooding reduces the throughput of the network [15]. 
Flooding is possible in almost all on 
routing Secure Routing Protocol ( 
Authenticated Routing Ad hoc Network ( 
on-demand routing protocols, even in the secure on 
SRP), Secure Ad hoc On-Demand Distance Vector ( 
ARAN), Ariadne etc. 
cause 
e on-demand 
SAODV), 
Depending on the type of packets used to flood the network, flooding attack can be categorized 
into different categories. In Route REQuest ( 
addresses which do not exist in the networks as destination addresses 
creates a bulk of RREQ messages with maximum Time 
addresses. The whole network will be filled with RREQ packets sent by the attacker. As these 
destination addresses are invalid, no node 
and the reverse routes in the routing table of 
time and gets exhausted soon (Figure 3). 
RREQ) flooding attack, the attacker selects IP 
addresses. Then it successively 
Time-To-Live (TTL) value for these void IP 
sends Route REPly (RREP) packets for these RREQs 
the intermediate nodes will be occupied for longer 
A threshold can be set and the node sending more requests (above threshold) 
interval can be declared as vindictive. 
5.1. Flood Count (FC) based solution for Flooding attack 
within a certain time 
As stated earlier, a threshold can be set to restrict a node from sending more number of packets in 
a particular time interval. The 
destination and more than one intermediate node. The reason is given below. 
proposed algorithm is applicable for a topology with a source, a 
107 
.
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 
In Figure 4, let ‘S’ be the source and ‘D’ be the destination respectively. Let ‘i’ be an 
intermediate node with respect to which the observations are made. 
Let the total number of nodes in any network be ‘n’.Within a short time period say, ‘t’, node ‘i’ 
can receive packets from source ‘S’ and ‘n 
there are 6 intermediate nodes. To be more clear, any intermediate node can be involved ‘n 
times in forwarding the packets to ‘i’. For example, a packet originating from ‘S’ can reach ‘i’ 
through ‘d’. 
1. S - a - d - i - D 
2. S - c - b - d - i - D 
3. S - a - b - c - d - i - D 
4. S - a - e - d - i - D 
5. S - c - f - d - i - D 
From the above listed paths, it is understood that, any intermediate no 
atmost ‘n - 3’ times in forwarding packets to another intermediate node or the destinati 
nodes preceding the node ‘d’ may be any one of the nodes 
d’). The algorithm is given in Figure 5. 
figure, 
- 3’ 
The above discussion was made to make a correct choice of the limit say, FLOOD_COUNT. For 
each node, HOP_COUNT and FLOOD_COUNT are computed and stored dynamically. If node 
‘i’ comprehends a node with HOP_COUNT = 0, then it identifies it as the source and sets the 
FLOOD_COUNT to ‘n - 3’ for that node (Figure. 4). 
When a source ‘S’ transmits a packet, its 
node gets ‘1’. This is done so as to ensure that no node acts as a source more than once in time ‘t’. 
initialize( ) 
begin 
Figure 4. Example 
, termediate - 3’ (leave S, D, i) intermediate nodes. In the 
node say ‘d’, may be involved 
- a, b, c, e, f, S (other than the ‘D, i and 
FLOOD_COUNT is set to ‘n -3’, while intermediate 
108 
de destination. The
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 
109 
Source sends RREQ to all the neighbours for each intermediate node ‘i’ 
HOP_COUNT = 0 
FLOOD_COUNT = 0 
end for 
end 
Algorithm Flood ( ) 
begin 
initialize( ) 
for each intermediate node ‘i’ 
if ( ‘i’ generates and sends a packet and is the Source) 
Set FLOOD_COUNT [i] += n - 3 
else if (‘i’ forwards a packet and is an intermediate node) 
Set FLOOD_COUNT [i] += 1 
HOP_COUNT [i] +=1 
end if 
if ( FLOOD_COUNT [i]  (n - 3) and ‘i’ is an intermediate node ||FLOOD_COUNT [i] 
= (n - 3) and ‘i’ is the source node S) 
Flooding has not occurred. 
else if ( FLOOD_COUNT [i]  (n - 3)) 
Flooding has occurred. 
‘i’ is a malicious node. 
end if 
end for 
Choose the path with the least total FLOOD_COUNT 
Send packets along the chosen path. 
end
International Journal on Computational Sciences  Applications (IJCSA) Vol.4, No.5, October 2014 
110 
Figure 5. Flood Count based Algorithm for Flooding attack 
Initially, 
FLOODCOUNT = 1, forintermediatenode 
n − 3, forS 
 
Finally, 
≤ n − 3, forintermediatenodes 
FLOODCOUNT =  
= n − 3, forS 
   − 3, !#$%'(')* +,* 
 
If there is only one intermediate node, then the FLOOD_COUNT will become ‘0’. There are 
chances for the ‘S’ to be the malicious node. A scenario with a single intermediate node is very 
rare and hence can be ignored.The TOTAL_FLOOD COUNT for a path with ‘n’ nodes is given 
by, 
/ 
TOTALFLOODCOUNT =.FLOODCOUNT 
012 
6.PERFORMANCE ANALYSIS 
This section describes the parameters (Table 1) and performance metrics used in the simulations. 
The system was simulated using ns2. 
The performance of the network degrades when the network is flooded with RREQs. In the Flood 
Count (FC) based prediction technique, the malicious nodes are eliminated thus avoiding further 
floods, thus yielding better results (Figure 6 to 8). 
Table 1. Simulation parameters 
PARAMETER VALUE 
Number of nodes 50 
Packet size 1000 
Data rate 100 Mbps 
Traffic Type CBR 
Mobility model Random way-point 
Queuing policy Drop Tail 
Queue Length 50 
Simulation Duration / Start time / Stop time 250 ms / 20 ms / 100 ms 
Modulation Scheme OFDM_QPSK 
Frame Duration 0.020 ms 
The Flood Count (FC) based algorithm yields better results. The PDR of the network is improved 
after applying the FC algorithm as shown in the figure (Figure 6).
International Journal on Computational Sciences  Applications (IJCSA) Vol.4, No.5, October 2014 
111 
Figure 6. Packet Delivery Ratio 
Figure 7. Control Overhead 
Control overhead is the ratio of total number of control packets transmitted and the number of 
data packets expected to be received. The control overhead involved in overcoming the flooding 
attack is tolerable (Figure 7). 
Similarly, the throughput of the system does not deteriorate after the application of FC algorithm 
as shown in Figure 8. 
Figure 8. Throughput 
7.CONCLUSION 
This work mainly focusses on flooding attacks in mobile WiMAX. It is obvious that the 
prediction mechanism yields better results in terms of throughput, control overhead and Packet
International Journal on Computational Sciences  Applications (IJCSA) Vol.4, No.5, October 2014 
Delivery Ratio (PDR) when paths without malicious nodes are selected for transmission. In the 
future, this prediction method can be employed in other multicasting protocols with some 
modifications. 
112 
REFERENCES 
[1] Thamilarasu, Geethapriya, Sumita Mishra, and Ramalingam Sridhar, “A cross-layer approach to detect 
jamming attacks in wireless ad hoc networks”, In Proceedings of the Military Communications 
Conference, MILCOM 2006, pp. 1-7, 2006. 
[2] Wei-min, Lang, Wu Run-Sheng, and Wang Jian-qiu, “A Simple Key Management Scheme based on 
WiMAX”, In Proceedings of the International Symposium on Computer Science and Computational 
Technology, ISCSCT'08, vol. 1, pp. 3-6, 2008. 
[3] Aslan, Mahmoud NasreldinHeba, Magdy El-Hennawy, and Adel El-Hennawy, “WiMAX security”, 
2008. 
[4] Sakib, AKM Nazmus, and Mir Md Saki Kowsar, “Shared key vulnerability in IEEE 802.16e: Analysis 
 solution”, In Proceedings of the 13th International Conference on Computer and Information 
Technology (ICCIT), pp. 600-605, 2010. 
[5] Barbeau, Michel, “WiMAX/802.16 threat analysis”, In Proceedings of the 1st ACM International 
workshop on Quality of Service Security in Wireless and Mobile Networks, pp. 8-15, 2005. 
[6] Priya, M. Deva, M. L. Valarmathi, S. Aishwarya, and K. Jaya Bharathi, “A Countermeasure for Black 
Hole Attack in Mobile WiMAX Networks”, International Journal of Advanced Research in Computer 
Engineering  Technology (IJARCET), Vol. 2, No. 3, pp-0964, 2013. 
[7] Saeed, Nuha, and MahfuzaMunira, “WiMAX security analysis”, PhD diss., Department of Electrical 
and Electronic Engineering, 2011. 
[8] Hasan, Jamshed, “Security Issues of IEEE 802.16 (WiMAX)”, In Proceedings of the Australian 
Information Security Management Conference, pp. 71, 2006. 
[9] Liu, Fuqiang, and Lei Lu, “A WPKI-based Security Mechanism for IEEE 802.16e”, In Proceedings of 
the International Conference on Wireless Communications, Networking and Mobile Computing, 
WiCOM 2006, pp. 1-4, 2006. 
[10] Sikkens, Bart, “Security issues and proposed solutions concerning authentication and authorization for 
WiMAX (IEEE 802.16e)”, In Proceedings of the 8th Conference on IT Enschede University of Twente, 
2008. 
[11] Maccari, Leonardo, Matteo Paoli, and Romano Fantacci, “Security analysis of IEEE 802.16.” In 
Proceedings of the International Conference on Communications, ICC'07, pp. 1160-1165, 2007. 
[12] Deininger, Andreas, ShinsakuKiyomoto, Jun Kurihara, and Toshiaki Tanaka, “Security vulnerabilities 
and solutions in mobile WiMAX”, International Journal of Computer Science and Network Security, 
Vol. 7, No. 11,pp. 7-15, 2007. 
[13] Huang, Jie, and Chin-Tser Huang, “Secure Mutual Authentication Protocols for Mobile Multi-hop 
Relay WiMAX Networks against Rogue Base/Relay Stations”, In Proceedings of the International 
Conference on Communications (ICC), pp. 1-5, 2011. 
[14] Priya, M. Deva, J. Sengathir, and M. L. Valarmathi, “ARPE: An Attack-Resilient and Power Efficient 
Multihop WiMAX Network”, International Journal on Computer Science and Engineering, 2010. 
[15] Refaei, M. Tamer, Vivek Srivastava, Luiz DaSilva, and Mohamed Eltoweissy, “A reputation-based 
mechanism for isolating selfish nodes in ad hoc networks”, In Proceedings of the 2nd Annual 
International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 
2005, pp. 3-11, 2005.

More Related Content

What's hot

EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK IJORCS
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless NetworksA Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networksiosrjce
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
Spectral Efficient IDMA System Using Multi User Detection
Spectral Efficient IDMA System Using Multi User DetectionSpectral Efficient IDMA System Using Multi User Detection
Spectral Efficient IDMA System Using Multi User DetectionIJSTA
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
 
4 g communication architecture
4 g communication  architecture4 g communication  architecture
4 g communication architectureIAEME Publication
 

What's hot (15)

EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
 
H010524049
H010524049H010524049
H010524049
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless NetworksA Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
A Secure QOS Distributed Routing Protocol for Hybrid Wireless Networks
 
Whitepaper WiFi Meshing
Whitepaper WiFi MeshingWhitepaper WiFi Meshing
Whitepaper WiFi Meshing
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
Spectral Efficient IDMA System Using Multi User Detection
Spectral Efficient IDMA System Using Multi User DetectionSpectral Efficient IDMA System Using Multi User Detection
Spectral Efficient IDMA System Using Multi User Detection
 
Sub1540
Sub1540Sub1540
Sub1540
 
Cs31622627
Cs31622627Cs31622627
Cs31622627
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
 
Do black holes exist
Do black holes existDo black holes exist
Do black holes exist
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
 
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5GNEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5G
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
 
4 g communication architecture
4 g communication  architecture4 g communication  architecture
4 g communication architecture
 

Viewers also liked

Automatic 3D view Generation from a Single 2D Image for both Indoor and Outdo...
Automatic 3D view Generation from a Single 2D Image for both Indoor and Outdo...Automatic 3D view Generation from a Single 2D Image for both Indoor and Outdo...
Automatic 3D view Generation from a Single 2D Image for both Indoor and Outdo...ijcsa
 
INTELLIGENT QUERY PROCESSING IN MALAYALAM
INTELLIGENT QUERY PROCESSING IN MALAYALAMINTELLIGENT QUERY PROCESSING IN MALAYALAM
INTELLIGENT QUERY PROCESSING IN MALAYALAMijcsa
 
Handling ambiguities and unknown words in named entity recognition using anap...
Handling ambiguities and unknown words in named entity recognition using anap...Handling ambiguities and unknown words in named entity recognition using anap...
Handling ambiguities and unknown words in named entity recognition using anap...ijcsa
 
INVESTIGATION OF NONLINEAR DYNAMICS IN THE BOOST CONVERTER: EFFECT OF CAPACIT...
INVESTIGATION OF NONLINEAR DYNAMICS IN THE BOOST CONVERTER: EFFECT OF CAPACIT...INVESTIGATION OF NONLINEAR DYNAMICS IN THE BOOST CONVERTER: EFFECT OF CAPACIT...
INVESTIGATION OF NONLINEAR DYNAMICS IN THE BOOST CONVERTER: EFFECT OF CAPACIT...ijcsa
 
tScene classification using pyramid histogram of
tScene classification using pyramid histogram oftScene classification using pyramid histogram of
tScene classification using pyramid histogram ofijcsa
 
Energy efficient sensor selection in visual sensor networks based on multi ob...
Energy efficient sensor selection in visual sensor networks based on multi ob...Energy efficient sensor selection in visual sensor networks based on multi ob...
Energy efficient sensor selection in visual sensor networks based on multi ob...ijcsa
 
Quantifying the impact of flood attack on
Quantifying the impact of flood attack onQuantifying the impact of flood attack on
Quantifying the impact of flood attack onijcsa
 
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND TO INC...
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND  TO INC...SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND  TO INC...
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND TO INC...ijcsa
 
Theta θ(g,x) and pi π(g,x) polynomials of hexagonal trapezoid system tb,a
Theta θ(g,x) and pi π(g,x) polynomials of hexagonal trapezoid system tb,aTheta θ(g,x) and pi π(g,x) polynomials of hexagonal trapezoid system tb,a
Theta θ(g,x) and pi π(g,x) polynomials of hexagonal trapezoid system tb,aijcsa
 
CONTENT AND USER CLICK BASED PAGE RANKING FOR IMPROVED WEB INFORMATION RETRIEVAL
CONTENT AND USER CLICK BASED PAGE RANKING FOR IMPROVED WEB INFORMATION RETRIEVALCONTENT AND USER CLICK BASED PAGE RANKING FOR IMPROVED WEB INFORMATION RETRIEVAL
CONTENT AND USER CLICK BASED PAGE RANKING FOR IMPROVED WEB INFORMATION RETRIEVALijcsa
 
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...ijcsa
 
Application of Taguchi Experiment Design for Decrease of Cogging Torque in P...
Application of Taguchi Experiment Design for  Decrease of Cogging Torque in P...Application of Taguchi Experiment Design for  Decrease of Cogging Torque in P...
Application of Taguchi Experiment Design for Decrease of Cogging Torque in P...ijcsa
 
PORTFOLIO SELECTION BY THE MEANS OF CUCKOO OPTIMIZATION ALGORITHM
PORTFOLIO SELECTION BY THE MEANS OF CUCKOO OPTIMIZATION ALGORITHMPORTFOLIO SELECTION BY THE MEANS OF CUCKOO OPTIMIZATION ALGORITHM
PORTFOLIO SELECTION BY THE MEANS OF CUCKOO OPTIMIZATION ALGORITHMijcsa
 
K mer index of dna sequence based on hash
K mer index of dna sequence based on hashK mer index of dna sequence based on hash
K mer index of dna sequence based on hashijcsa
 
COUPLER, POWER DIVIDER AND CIRCULATOR IN V-BAND SUBSTRATE INTEGRATED WAVEGUID...
COUPLER, POWER DIVIDER AND CIRCULATOR IN V-BAND SUBSTRATE INTEGRATED WAVEGUID...COUPLER, POWER DIVIDER AND CIRCULATOR IN V-BAND SUBSTRATE INTEGRATED WAVEGUID...
COUPLER, POWER DIVIDER AND CIRCULATOR IN V-BAND SUBSTRATE INTEGRATED WAVEGUID...ijcsa
 
A COMPARATIVE PERFORMANCE STUDY OF OFDM SYSTEM WITH THE IMPLEMENTATION OF COM...
A COMPARATIVE PERFORMANCE STUDY OF OFDM SYSTEM WITH THE IMPLEMENTATION OF COM...A COMPARATIVE PERFORMANCE STUDY OF OFDM SYSTEM WITH THE IMPLEMENTATION OF COM...
A COMPARATIVE PERFORMANCE STUDY OF OFDM SYSTEM WITH THE IMPLEMENTATION OF COM...ijcsa
 
Data analysis by using machine
Data analysis by using machineData analysis by using machine
Data analysis by using machineijcsa
 
Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...ijcsa
 

Viewers also liked (20)

Automatic 3D view Generation from a Single 2D Image for both Indoor and Outdo...
Automatic 3D view Generation from a Single 2D Image for both Indoor and Outdo...Automatic 3D view Generation from a Single 2D Image for both Indoor and Outdo...
Automatic 3D view Generation from a Single 2D Image for both Indoor and Outdo...
 
INTELLIGENT QUERY PROCESSING IN MALAYALAM
INTELLIGENT QUERY PROCESSING IN MALAYALAMINTELLIGENT QUERY PROCESSING IN MALAYALAM
INTELLIGENT QUERY PROCESSING IN MALAYALAM
 
Handling ambiguities and unknown words in named entity recognition using anap...
Handling ambiguities and unknown words in named entity recognition using anap...Handling ambiguities and unknown words in named entity recognition using anap...
Handling ambiguities and unknown words in named entity recognition using anap...
 
INVESTIGATION OF NONLINEAR DYNAMICS IN THE BOOST CONVERTER: EFFECT OF CAPACIT...
INVESTIGATION OF NONLINEAR DYNAMICS IN THE BOOST CONVERTER: EFFECT OF CAPACIT...INVESTIGATION OF NONLINEAR DYNAMICS IN THE BOOST CONVERTER: EFFECT OF CAPACIT...
INVESTIGATION OF NONLINEAR DYNAMICS IN THE BOOST CONVERTER: EFFECT OF CAPACIT...
 
tScene classification using pyramid histogram of
tScene classification using pyramid histogram oftScene classification using pyramid histogram of
tScene classification using pyramid histogram of
 
Energy efficient sensor selection in visual sensor networks based on multi ob...
Energy efficient sensor selection in visual sensor networks based on multi ob...Energy efficient sensor selection in visual sensor networks based on multi ob...
Energy efficient sensor selection in visual sensor networks based on multi ob...
 
Quantifying the impact of flood attack on
Quantifying the impact of flood attack onQuantifying the impact of flood attack on
Quantifying the impact of flood attack on
 
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND TO INC...
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND  TO INC...SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND  TO INC...
SCHEDULING IN GRID TO MINIMIZE THE IMPOSED OVERHEAD ON THE SYSTEM AND TO INC...
 
Theta θ(g,x) and pi π(g,x) polynomials of hexagonal trapezoid system tb,a
Theta θ(g,x) and pi π(g,x) polynomials of hexagonal trapezoid system tb,aTheta θ(g,x) and pi π(g,x) polynomials of hexagonal trapezoid system tb,a
Theta θ(g,x) and pi π(g,x) polynomials of hexagonal trapezoid system tb,a
 
CONTENT AND USER CLICK BASED PAGE RANKING FOR IMPROVED WEB INFORMATION RETRIEVAL
CONTENT AND USER CLICK BASED PAGE RANKING FOR IMPROVED WEB INFORMATION RETRIEVALCONTENT AND USER CLICK BASED PAGE RANKING FOR IMPROVED WEB INFORMATION RETRIEVAL
CONTENT AND USER CLICK BASED PAGE RANKING FOR IMPROVED WEB INFORMATION RETRIEVAL
 
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...
 
Application of Taguchi Experiment Design for Decrease of Cogging Torque in P...
Application of Taguchi Experiment Design for  Decrease of Cogging Torque in P...Application of Taguchi Experiment Design for  Decrease of Cogging Torque in P...
Application of Taguchi Experiment Design for Decrease of Cogging Torque in P...
 
PORTFOLIO SELECTION BY THE MEANS OF CUCKOO OPTIMIZATION ALGORITHM
PORTFOLIO SELECTION BY THE MEANS OF CUCKOO OPTIMIZATION ALGORITHMPORTFOLIO SELECTION BY THE MEANS OF CUCKOO OPTIMIZATION ALGORITHM
PORTFOLIO SELECTION BY THE MEANS OF CUCKOO OPTIMIZATION ALGORITHM
 
K mer index of dna sequence based on hash
K mer index of dna sequence based on hashK mer index of dna sequence based on hash
K mer index of dna sequence based on hash
 
COUPLER, POWER DIVIDER AND CIRCULATOR IN V-BAND SUBSTRATE INTEGRATED WAVEGUID...
COUPLER, POWER DIVIDER AND CIRCULATOR IN V-BAND SUBSTRATE INTEGRATED WAVEGUID...COUPLER, POWER DIVIDER AND CIRCULATOR IN V-BAND SUBSTRATE INTEGRATED WAVEGUID...
COUPLER, POWER DIVIDER AND CIRCULATOR IN V-BAND SUBSTRATE INTEGRATED WAVEGUID...
 
A COMPARATIVE PERFORMANCE STUDY OF OFDM SYSTEM WITH THE IMPLEMENTATION OF COM...
A COMPARATIVE PERFORMANCE STUDY OF OFDM SYSTEM WITH THE IMPLEMENTATION OF COM...A COMPARATIVE PERFORMANCE STUDY OF OFDM SYSTEM WITH THE IMPLEMENTATION OF COM...
A COMPARATIVE PERFORMANCE STUDY OF OFDM SYSTEM WITH THE IMPLEMENTATION OF COM...
 
Data analysis by using machine
Data analysis by using machineData analysis by using machine
Data analysis by using machine
 
Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...Automatic rectification of perspective distortion from a single image using p...
Automatic rectification of perspective distortion from a single image using p...
 
Jester S
Jester SJester S
Jester S
 
Narcissus
NarcissusNarcissus
Narcissus
 

Similar to A countermeasure for flooding

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
 
Ct3210321037
Ct3210321037Ct3210321037
Ct3210321037IJMER
 
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAX
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAXEMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAX
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAXcscpconf
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos incaijjournal
 
A Brief Review on Wireless Networks
A Brief Review on Wireless NetworksA Brief Review on Wireless Networks
A Brief Review on Wireless NetworksIRJET Journal
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSijistjournal
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSpharmaindexing
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSijistjournal
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSijwmn
 
Paper id 2720146
Paper id 2720146Paper id 2720146
Paper id 2720146IJRAT
 
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...IJMER
 

Similar to A countermeasure for flooding (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...
 
Ct3210321037
Ct3210321037Ct3210321037
Ct3210321037
 
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAX
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAXEMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAX
EMERGING BROADBAND WIRELESS TECHNOLOGIES: WIFI AND WIMAX
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
WiMax Technology
WiMax TechnologyWiMax Technology
WiMax Technology
 
A Brief Review on Wireless Networks
A Brief Review on Wireless NetworksA Brief Review on Wireless Networks
A Brief Review on Wireless Networks
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
Ft2510561062
Ft2510561062Ft2510561062
Ft2510561062
 
4G technology
4G technology4G technology
4G technology
 
4G Mobile Communications
4G Mobile Communications4G Mobile Communications
4G Mobile Communications
 
wireless
wirelesswireless
wireless
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
 
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONSBER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
BER PERFORMANCE ANALYSIS FOR WIMAX PHY LAYER UNDER DIFFERENT CHANNEL CONDITIONS
 
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKSTHE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
THE UWB SOLUTION FOR MULTIMEDIA TRAFFIC IN WIRELESS SENSOR NETWORKS
 
Paper id 2720146
Paper id 2720146Paper id 2720146
Paper id 2720146
 
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...
 
7.chapter
7.chapter7.chapter
7.chapter
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

A countermeasure for flooding

  • 1. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 A COUNTERMEASURE FOR FLOODING ATTACK IN MOBILE WiMAX NETWORKS Deva Priya and Pradeep Kumar Department of CSE, Sri Krishna College of Technology, Coimbatore, Tamil Nadu, India. ABSTRACT Worldwide Interoperability for Microwave Access (WiMAX) is a new communication technology that conduits the fissure between fixed and mobile access and offers the same Quality of Service (QoS) to both types of users. Generally, WiMAX is more vulnerable to the inside and outside attacks due to the absence of any clear line of defense. The Mobile Subscriber Stations (MSSs) selected to transfer the packets to the Base Station (BS) are vulnerable to Denial of Service (DoS) attacks like flooding. Recent research has discovered that DoS attacks can easily be launched by injecting malevolent management frames into the WiMAX network based on the Privacy and Key Management- ReSPonse (PKM-RSP) and Automatic Repeat ReQuest (ARQ)-Reset messages. In this paper, an algorithm is proposed to mitigate the flooding attacks and enhance the security level in the network. KEYWORDS WiMAX, Threats, Flooding attack, Authentication, Flood count. 1.INTRODUCTION WiMAX, Worldwide Interoperability for Microwave Access is a telecommunications technology that offers transmission of wireless data via a number of transmission methods. The WiMAX technology offers around 72 Mbps without any need for cables. It is based on IEEE 802.16 standard, usually known as Broadband Wireless Access (BWA) networks. WiMAX Forum was formed to encourage compliance and interoperability of the WiMAX IEEE 802.16 standard. It offers last mile broadband access as a substitute to conventional cable and DSL lines. Existing technologies such as Digital Subscriber Line (DSL), cable and fixed wireless are overwhelmed by expensive installs, problems with loop lengths, upstream upgrade issues, line-of-sight restrictions and poor scalability. WiMAX is the next stage to broadband as well as a wireless world, extending broadband wireless access to new locations and over longer distances. It considerably reduces the cost of bringing broadband to new areas. It offers greater range and bandwidth than the other available or forthcoming broadband wireless technologies such as Wireless Fidelity (WiFi) and Ultra-wideband (UWB) family of standards. It provides a wireless alternative to wired backhaul and last mile deployments that use Data over Cable Service Interface Specification (DOGS1S) Cable modems, DSL, T-carrier and E-carrier (Tx/Ex) systems and Optical Carrier Level (OC-x) technologies. New organizations as well as individuals adopt broadband, whereas those already using broadband depend and demand better services with added benefits. To support this DOI:10.5121/ijcsa.2014.4508 99
  • 2. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 exceptional new demand, WiMAX has emerged as a feasible solution because of its inherent features that hold great promises for the future of wireless communications. There has been a lot of excitement about WiMAX and the impact that this standard based wireless network technology has on the broadband access market. This hype has generated great expectations and the industry has responded with exceptional aggression and commitment towards taking broadband to the next level with WiMAX. 802.16-2004 or 802.16d referred as fixed WiMAX was developed by a third party. This standard lacks mobility. Some amendments were made to 802.16d and it was referred as 802.16e. 802.16e introduced mobility and is known as mobile WiMAX. Figure 1 shows the WiMAX architecture. 100 Figure 1. WiMAX Architecture The general initiative of metropolitan area wireless networking as envisioned by 802.16 begins with fixed wireless. A backbone of Base Stations (BSs) is connected to a public network and each BS carries hundreds of fixed Mobile Subscriber Stations (MSSs) which can be both public hot spots and fire-walled enterprise networks. Later in the development cycle of 802.16e, WiMAX encourages mobile wireless technology specifically wireless transmissions directly to mobile end users. This is similar in function to the General Packet Radio Service (GPRS) and the one time Radio Transmission Technology (RTT) offered by mobile phone companies. The Time Division Duplexing (TDD) and Frequency Division Duplexing (FDD) are the two types of duplexing mechanism followed by IEEE 802.16. Downlink-MAP (DL-MAP) and Uplink-MAP (UL-MAP) are used to describe the contents of Downlink (DL) and Uplink (UL) respectively and also the timing in both transmissions [1]. In TDD, the MSSs are provided with time slots for transmission and the BSs with the DL schedules. In FDD, both UL and UL are simultaneous processes. The privacy issues are dealt by the Privacy Sublayer (PS) in the Medium Access Control (MAC) layer. The PS is based on two main components, an encapsulation protocol for providing packet data encryption and Privacy and Key Management (PKM) protocol for providing secure distribution of the keying material and authorized access to connection between BS and SS.
  • 3. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 101 The two main goals of WiMAX are • To provide maximum security to the wireless networks • To provide the network with access control In [2], various requirements that a WiMAX protocol should satisfy to provide high security are discussed. Following features are to be considered for ensuring security in a network. Confidentiality When sensitive data is transferred through the WiMAX network, it should ensure that the data is available only to authorized users. If this confidentiality is not maintained, security of the standard is not guaranteed. Authenticity Mutual authentication should be provided to ensure authenticity. This mutual authentication mechanism should ensure that the data sent by the user is received without any modification. It should not be possible for intruders to insert false information into the original data. The data should be accessible only by authenticated users. Integrity The standard must ensure that the shared key should not be tampered or altered by the intruder. The data should not be tampered while in transit by an intruder. This property is as important as authentication. Access Control The standard should ensure that only authorized users should access the network by connecting to it and receive desired services. 1.1.How WiMAX Works? The backhaul of the WiMAX is based on the typical connection to the public wireless networks by using optical fibre, microwave link, cable or any other high speed connectivity. In few cases such as mesh networks, Point-to-Multipoint (PMP) connectivity is also used as a backhaul. Ideally, it uses Point-to-Point (P2P) antennas as a backhaul to join subscriber sites to each other and to BSs across long distances. A WiMAX BS serves MSSs using Non-Line-of-Sight (NLOS) or Line-of-Sight (LOS) PMP connectivity which is referred to as the last mile communication. Ideally, WiMAX uses NLOS PMP antennas to connect residential or business subscribers to the BS. A WiMAX Customer Premises Equipment (CPE) typically serves a building using wired or wireless Local Area Network (LAN).
  • 4. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 1.2.Layered Architecture The WiMAX/802.16 is a layered architecture consisting of two main layers: • Physical (PHY)layer • Medium Access Control (MAC) layer Both the layers are vulnerable to attacks of their own kind. In the transmitted as equal length sequenced frames. This layer is subjected to attacks like jamming and scrambling. The MAC layer is connection oriented with two types of connections: • Management connections • Data transport connection This layer experiences attacks like Man 2 shows the layers of IEEE 802.16 protocol. The important part of this layered architecture is the sublayer system. The standard defines the Services Access points (SAPs consists of three sublayers they are • Convergence Sublayer (CS) • Common Part Sublayer (CPS) • Privacy Sublayer (PS) Fig Convergence Sublayer (CS) The service specific CS maps higher level data services to connections. There are two types of CSs: • Asynchronous Transfer Mode (ATM) PHY layer the bits are ayer connections Man-In-The-Middle (MITM), DoS and eavesdropping. Figure ublayer SAPs). The MAC layer Figure2. WiMAX Layered Architecture the MAC layer service flows and CS which is designed for ATM network 102 avesdropping. ).
  • 5. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 • Service packet CS is designed to support Ethernet, P2P, both IPv4 and IPv6 internet 103 protocols and Virtual Local Area Network (VLAN) [3]. Common Part Sublayer (CPS) The CPS is the core of the standard. The CPS defines the rules and mechanisms for system access, connection management and bandwidth allocation. Functions like UL scheduling, bandwidth request and grant, Automatic Repeat Request (ARQ) and connection control are also defined here. Communications between the CS and the MAC CPS are done by MAC Service Access Point (MAC SAP). Privacy Sublayer There are two main protocols in this sublayer: • Encapsulation protocol for encrypting packet data across the fixed BWA. • PKM for providing secure distribution of keying data from the BS to the MSS [4]. 2.THREATS IN WiMAX Some of the common threats in WiMAX are discussed below. Jamming Radio Frequency (RF) jamming is seen in all wireless networks. This attack is due to the overwhelmed interference of the RF signal into the spectrum range used by the system. This denies the service of the wireless nodes that are in the range of the RF signals. This jamming attack is a DoS attack. Scrambling Scrambling is due to the interference of the RF signal during the transmission of the management signals. As this attack is seen for a short period of time, it is difficult to detect when compared to jamming attack. It leads to overall degradation of the system. Man-In-The-Middle (MITM) MITM attacks occur when an adversary deceives a MSS to appear as a legitimate BS while simultaneously deceiving a BS to appear as a legitimate MSS. This allows an adversary to eavesdrop and corrupt data communications. Denial of Service (DoS) Attack It is the most harmful and dangerous attack which can be launched on any layer of BWA network. When authorized users are not provided requested services within a defined maximum waiting time, it means that a DoS violation has occurred. DoS attacks target availability by preventing communication between network devices or by preventing a single device from sending or receiving traffic, where availability ensures that authorized users can access the data, services and network resources from anywhere anytime. This type of attack will invoke unnecessary state transitions.
  • 6. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 104 Eavesdropping Eavesdropping occurs when an adversary uses a WiMAX traffic analyzer within the range of a BS and/or SS/MS. The adversary may monitor management message traffic to identify encryption ciphers, determine the footprint of the network or conduct traffic analysis regarding specific WiMAX nodes. Flooding Attack Flooding attacks occur when a network or service becomes heavy with packets, initiating incomplete connection requests that it can no longer process genuine connection requests. In data flooding attack, the attacker gets into the network and sets up paths between all the nodes in the network. Once the paths are established, the attacker injects an immense amount of useless data packets into the network which are directed to all the other nodes in the network. These immense unwanted data packets congest the network. Any node that serves as destination will be mounted with useless and unwanted data. Blackhole Attack In the blackhole attack, the intruder takes hold of a particular routing node and makes it to drop all its packets. If the attacker drops only selective packets and keeps forwarding the rest of the packets, then the attack is called as grayhole attack. Black hole attack results in extensive use of time and energy by the selected node in the WiMAX network. In [5], a confidence level based prediction mechanism to predict the prevalence of black hole attack is proposed which eliminates the vindictive nodes. Wormhole attack In wormhole attack, an attacker receives packets at one point in the network, tunnels them to another point in the network, and then replays them into the network from that point. Routing can be disrupted when routing control message are tunneled. This tunnel between two colluding attackers is known as a wormhole. The wormhole attack is particularly dangerous in ad hoc networks, in which the nodes that hear a packet transmission directly from some node consider themselves to be in range of that node. 3.AUTHENTICATION IN WIMAX As explained in [6], the authentication method supported by the MSS is determined by the encapsulation protocol. The encapsulation protocol consists of data encryption algorithm, the data authentication algorithm and Traffic Encryption Key (TEK) encryption algorithm. The authentication and authorization by the MSS is defined by the PKM protocols. It also describes the periodic re-authorization, reception and renewal of key material. IEEE 802.6 supports two versions of PKM protocols: MSS authentication is provided by PKMv1 and mutual authentication by PKMv2. The Security Association (SA) is a set of security parameters of the connection.
  • 7. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 105 3.1.Vulnerabilities Analysis The various vulnerabilities in IEEE 802.16 are discussed in [7]. Unauthenticated Messages Most of the messages in IEEE 802.16 are integrity protected by either a Hash based Message Authentication Code (HMAC) or Cipher based Message Authentication Code (CMAC). In WiMAX security architecture there is no common key authentication used to secure the broadcast messages. There are certain messages which do not contain any common key, where these messages will become a threat. Unencrypted Management Communication In WiMAX management messages are still sent in the clear. The consequential risk is outlined in this section. When a MSS performs initial network entry, it negotiates communication parameters and settings with the BS. Here, a lot of information like security negotiation parameters, configuration settings, power settings, mobility parameters, vendor information and capabilities of the MSSs are exchanged. Currently the complete management message exchange in the network entry process is unencrypted and the above mentioned information can be accessed just by listening on the channel. 3.2.Shared Key in Multicast and Broadcast Service The multicast and broadcast service offers the possibility to distribute data to multiple MS with one single message. This saves cost and bandwidth. Broadcasted messages in IEEE 802.16e are encrypted symmetrically with a shared key. Every member in the group knows the key and can decrypt the traffic. Message authentication is based on the same shared key. 4.RELATED WORK In [8], various threats to wireless networks are discussed. It proposes a solution to eliminate the threats by using a strong encryption technique with intrusion prevention system. The PHYlayer is more vulnerable to threats than the MAC layer As described in [9], WiMAX uses mutual authentication to protect from forgery attacks, but the authorization process is still vulnerable because there is no way to ensure integrity of the messages. Anyone with a properly placed radio receiver can catch an authorization message, modify and retransmit it. There is no digest used to prove that the message is not modified. To overcome these attacks, PKM is used. In [10], key space vulnerability due to insufficient key size is discussed. To protect the keying materials from attack, a solution is proposed that increases the number of bits for both the keys. Network performance can be degraded if the attacker sends spoofed messages to the BS and make it believe that the MSS has weaker security algorithm. [11].
  • 8. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 The threats that arise from WiMAX authentication scheme are discussed in [12]. WiMAX supports unilateral device level authentication which can be implemented in a similar way as WiFi MAC filtering based on the hardware device address. Therefore, address sniffing and spoofing makes a MSS masquerade attack possible. In addition, the lack of mutual authentication makes a MITM attack from a rogue BS possible. However, a successful MITM attack is difficult because of the Time Division Multiple Access (TDMA) model in WiMAX. The attacker and the legitimate BS must transmit at the same time using a much higher power level to “hide” the legitimate signal. Various attacks in the authentication phase and the key material exchange phase are discussed. The process in the authentication phase can be interrupted by an intruder by obtaining the authorization reply message and sending false request message to the BS. This overloads the BS and it does not respond to the messages from the MSS. This is called as replay/DoS attack. In the data encryption phase, the MSS requests the key material (TEKs). The MSS periodically sends key request messages referring to one of its valid Security Association Identifiers (SAIDs). An attacker captures the TEK messages and replays them to gain information needed to decrypt the data traffic. This attack can be mitigated by increasing the length of the sequence number so that a satisfactory amount of TEK sequence numbers can be generated and transmitted within the longest validity duration of the Authentication Key (AK). In [13], the Rogue BS or Relay Station (RS) attack is discussed. It is one of the most common attacks on wireless authentication protocols. A malicious node impersonates a legitimate BS or RS node with fake credentials and tries to convince a joining RS or MSS to connect with it. Alternately, an attacker may try to compromise a legitimate BS or RS to get control over it. IEEE 802.16j uses PKMv2 to counter possible rogue BS attack by using mutual authentication. However, there is an implicit assumption in PKMv2 that BS is always trustworthy. PKMv2 does not provide any protection to detect and counter the attack from a compromised BS. Moreover, the distributed security mode in Mobile Multihop Relay (MMR) WiMAX networks also makes rogue RS attack possible. This is because the authentication procedure between RS nodes is not performed by a centralized server but is based on the trust between nodes. If one node is compromised, its trust with other nodes is also compromised. In [14], a cross-layered mechanism is proposed which provides a secured transfer of data as well as avoids retransmission. This work proposes a novel energy-conserved, fault-tolerant, intrusion-less 106 clustering mechanism that ensures security at the group heads in a region. 5.FLOODING ATTACK By flooding a server or host with connections that cannot be completed, the flooding attack eventually fills the host’s memory buffer. Once this buffer is full no further connections can be made and results in a DoS attack. The malicious node steams excessive amount of false packets into the network that clog the network and deplete the available network bandwidth for communication among other nodes in the network.
  • 9. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 Figure 3. Flooding attack A legitimated user will not be able to use the network resources for valid communication. The goal of flooding attack is to exhaust the network resources like bandwidth and to consume a node’s resources like computational and battery power or to disrupt the routing operation to caus severe degradation in network performance. Due to limited availability of resource constraints, resource consumption owing to flooding reduces the throughput of the network [15]. Flooding is possible in almost all on routing Secure Routing Protocol ( Authenticated Routing Ad hoc Network ( on-demand routing protocols, even in the secure on SRP), Secure Ad hoc On-Demand Distance Vector ( ARAN), Ariadne etc. cause e on-demand SAODV), Depending on the type of packets used to flood the network, flooding attack can be categorized into different categories. In Route REQuest ( addresses which do not exist in the networks as destination addresses creates a bulk of RREQ messages with maximum Time addresses. The whole network will be filled with RREQ packets sent by the attacker. As these destination addresses are invalid, no node and the reverse routes in the routing table of time and gets exhausted soon (Figure 3). RREQ) flooding attack, the attacker selects IP addresses. Then it successively Time-To-Live (TTL) value for these void IP sends Route REPly (RREP) packets for these RREQs the intermediate nodes will be occupied for longer A threshold can be set and the node sending more requests (above threshold) interval can be declared as vindictive. 5.1. Flood Count (FC) based solution for Flooding attack within a certain time As stated earlier, a threshold can be set to restrict a node from sending more number of packets in a particular time interval. The destination and more than one intermediate node. The reason is given below. proposed algorithm is applicable for a topology with a source, a 107 .
  • 10. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 In Figure 4, let ‘S’ be the source and ‘D’ be the destination respectively. Let ‘i’ be an intermediate node with respect to which the observations are made. Let the total number of nodes in any network be ‘n’.Within a short time period say, ‘t’, node ‘i’ can receive packets from source ‘S’ and ‘n there are 6 intermediate nodes. To be more clear, any intermediate node can be involved ‘n times in forwarding the packets to ‘i’. For example, a packet originating from ‘S’ can reach ‘i’ through ‘d’. 1. S - a - d - i - D 2. S - c - b - d - i - D 3. S - a - b - c - d - i - D 4. S - a - e - d - i - D 5. S - c - f - d - i - D From the above listed paths, it is understood that, any intermediate no atmost ‘n - 3’ times in forwarding packets to another intermediate node or the destinati nodes preceding the node ‘d’ may be any one of the nodes d’). The algorithm is given in Figure 5. figure, - 3’ The above discussion was made to make a correct choice of the limit say, FLOOD_COUNT. For each node, HOP_COUNT and FLOOD_COUNT are computed and stored dynamically. If node ‘i’ comprehends a node with HOP_COUNT = 0, then it identifies it as the source and sets the FLOOD_COUNT to ‘n - 3’ for that node (Figure. 4). When a source ‘S’ transmits a packet, its node gets ‘1’. This is done so as to ensure that no node acts as a source more than once in time ‘t’. initialize( ) begin Figure 4. Example , termediate - 3’ (leave S, D, i) intermediate nodes. In the node say ‘d’, may be involved - a, b, c, e, f, S (other than the ‘D, i and FLOOD_COUNT is set to ‘n -3’, while intermediate 108 de destination. The
  • 11. International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 109 Source sends RREQ to all the neighbours for each intermediate node ‘i’ HOP_COUNT = 0 FLOOD_COUNT = 0 end for end Algorithm Flood ( ) begin initialize( ) for each intermediate node ‘i’ if ( ‘i’ generates and sends a packet and is the Source) Set FLOOD_COUNT [i] += n - 3 else if (‘i’ forwards a packet and is an intermediate node) Set FLOOD_COUNT [i] += 1 HOP_COUNT [i] +=1 end if if ( FLOOD_COUNT [i] (n - 3) and ‘i’ is an intermediate node ||FLOOD_COUNT [i] = (n - 3) and ‘i’ is the source node S) Flooding has not occurred. else if ( FLOOD_COUNT [i] (n - 3)) Flooding has occurred. ‘i’ is a malicious node. end if end for Choose the path with the least total FLOOD_COUNT Send packets along the chosen path. end
  • 12. International Journal on Computational Sciences Applications (IJCSA) Vol.4, No.5, October 2014 110 Figure 5. Flood Count based Algorithm for Flooding attack Initially, FLOODCOUNT = 1, forintermediatenode n − 3, forS Finally, ≤ n − 3, forintermediatenodes FLOODCOUNT = = n − 3, forS − 3, !#$%'(')* +,* If there is only one intermediate node, then the FLOOD_COUNT will become ‘0’. There are chances for the ‘S’ to be the malicious node. A scenario with a single intermediate node is very rare and hence can be ignored.The TOTAL_FLOOD COUNT for a path with ‘n’ nodes is given by, / TOTALFLOODCOUNT =.FLOODCOUNT 012 6.PERFORMANCE ANALYSIS This section describes the parameters (Table 1) and performance metrics used in the simulations. The system was simulated using ns2. The performance of the network degrades when the network is flooded with RREQs. In the Flood Count (FC) based prediction technique, the malicious nodes are eliminated thus avoiding further floods, thus yielding better results (Figure 6 to 8). Table 1. Simulation parameters PARAMETER VALUE Number of nodes 50 Packet size 1000 Data rate 100 Mbps Traffic Type CBR Mobility model Random way-point Queuing policy Drop Tail Queue Length 50 Simulation Duration / Start time / Stop time 250 ms / 20 ms / 100 ms Modulation Scheme OFDM_QPSK Frame Duration 0.020 ms The Flood Count (FC) based algorithm yields better results. The PDR of the network is improved after applying the FC algorithm as shown in the figure (Figure 6).
  • 13. International Journal on Computational Sciences Applications (IJCSA) Vol.4, No.5, October 2014 111 Figure 6. Packet Delivery Ratio Figure 7. Control Overhead Control overhead is the ratio of total number of control packets transmitted and the number of data packets expected to be received. The control overhead involved in overcoming the flooding attack is tolerable (Figure 7). Similarly, the throughput of the system does not deteriorate after the application of FC algorithm as shown in Figure 8. Figure 8. Throughput 7.CONCLUSION This work mainly focusses on flooding attacks in mobile WiMAX. It is obvious that the prediction mechanism yields better results in terms of throughput, control overhead and Packet
  • 14. International Journal on Computational Sciences Applications (IJCSA) Vol.4, No.5, October 2014 Delivery Ratio (PDR) when paths without malicious nodes are selected for transmission. In the future, this prediction method can be employed in other multicasting protocols with some modifications. 112 REFERENCES [1] Thamilarasu, Geethapriya, Sumita Mishra, and Ramalingam Sridhar, “A cross-layer approach to detect jamming attacks in wireless ad hoc networks”, In Proceedings of the Military Communications Conference, MILCOM 2006, pp. 1-7, 2006. [2] Wei-min, Lang, Wu Run-Sheng, and Wang Jian-qiu, “A Simple Key Management Scheme based on WiMAX”, In Proceedings of the International Symposium on Computer Science and Computational Technology, ISCSCT'08, vol. 1, pp. 3-6, 2008. [3] Aslan, Mahmoud NasreldinHeba, Magdy El-Hennawy, and Adel El-Hennawy, “WiMAX security”, 2008. [4] Sakib, AKM Nazmus, and Mir Md Saki Kowsar, “Shared key vulnerability in IEEE 802.16e: Analysis solution”, In Proceedings of the 13th International Conference on Computer and Information Technology (ICCIT), pp. 600-605, 2010. [5] Barbeau, Michel, “WiMAX/802.16 threat analysis”, In Proceedings of the 1st ACM International workshop on Quality of Service Security in Wireless and Mobile Networks, pp. 8-15, 2005. [6] Priya, M. Deva, M. L. Valarmathi, S. Aishwarya, and K. Jaya Bharathi, “A Countermeasure for Black Hole Attack in Mobile WiMAX Networks”, International Journal of Advanced Research in Computer Engineering Technology (IJARCET), Vol. 2, No. 3, pp-0964, 2013. [7] Saeed, Nuha, and MahfuzaMunira, “WiMAX security analysis”, PhD diss., Department of Electrical and Electronic Engineering, 2011. [8] Hasan, Jamshed, “Security Issues of IEEE 802.16 (WiMAX)”, In Proceedings of the Australian Information Security Management Conference, pp. 71, 2006. [9] Liu, Fuqiang, and Lei Lu, “A WPKI-based Security Mechanism for IEEE 802.16e”, In Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2006, pp. 1-4, 2006. [10] Sikkens, Bart, “Security issues and proposed solutions concerning authentication and authorization for WiMAX (IEEE 802.16e)”, In Proceedings of the 8th Conference on IT Enschede University of Twente, 2008. [11] Maccari, Leonardo, Matteo Paoli, and Romano Fantacci, “Security analysis of IEEE 802.16.” In Proceedings of the International Conference on Communications, ICC'07, pp. 1160-1165, 2007. [12] Deininger, Andreas, ShinsakuKiyomoto, Jun Kurihara, and Toshiaki Tanaka, “Security vulnerabilities and solutions in mobile WiMAX”, International Journal of Computer Science and Network Security, Vol. 7, No. 11,pp. 7-15, 2007. [13] Huang, Jie, and Chin-Tser Huang, “Secure Mutual Authentication Protocols for Mobile Multi-hop Relay WiMAX Networks against Rogue Base/Relay Stations”, In Proceedings of the International Conference on Communications (ICC), pp. 1-5, 2011. [14] Priya, M. Deva, J. Sengathir, and M. L. Valarmathi, “ARPE: An Attack-Resilient and Power Efficient Multihop WiMAX Network”, International Journal on Computer Science and Engineering, 2010. [15] Refaei, M. Tamer, Vivek Srivastava, Luiz DaSilva, and Mohamed Eltoweissy, “A reputation-based mechanism for isolating selfish nodes in ad hoc networks”, In Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 2005, pp. 3-11, 2005.