SlideShare a Scribd company logo
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 346
e-ISSN: 2349-9745
p-ISSN: 2393-8161
A Review on security issues in WiMAX
Ravinder Kumar1
, Veepin Kumar2
1
M. Tech. Scholar, 2
Asstt. Professor
1,2
Department of Computer Science & Engineering.
1.2
Om Institute of Technology and Management, Hisar.
Abstract – The IEEE 802.16 standard, commonly known as WiMAX, is the latest technology that
has promised to offer broadband wireless access over long distance. Since 2001, WiMAX has
evolved from 802.16 to 802.16d standard for fixed wireless access and to the new IEEE 802.16e
standard with mobility support. With the growing popularity of WiMAX the security risks have
increased many folds. In this paper we will give an overview of security architecture of WiMAX. We
propose some possible security improvements and solutions to eliminate the vulnerabilities. Finally,
we will have a look at improvement reported in multi hop WiMAX networks.
Keywords – WiMAX, IEEE 802.16, security, encryption, security concerns, authentication
I. INTRODUCTION
The IEEE 802.16 or WiMAX is an excellent successor to WiFi/IEEE 802.11. As WiMAX grows, the
security concerns over it also increase. We define security as protection of data being transmitted
over a wireless networks. It is important to understand the full range of problems that security
systems need to address. These needs are confidentiality, integrity and authentication (CIA), and are
defined as follows:
A. Confidentiality – Allowing only that the intended legitimate recipients to read encrypted
messages.
B. Integrity – is referred to as ensuring that another party has not altered messages after it has
been sent.
C. Authentication – This is making sure that parties sending messages or receiving messages
are who they say they are.
As WiMAX transitioned from Line of Sight (LOC) and Point to Multi Point (PMP) higher frequency
(10-66 GHz) to lower frequencies (2-11 GHz) and NLOS mobile systems the security issues
increased tremendously. Also, WiMAX uses radio channels which are open channels and hence pose
a very serious security problem for traffic confidentiality and integrity. For transmission, WiMAX
uses air as medium which exposes the PHY and MAX layers [1].
Virtual Private Networks (VPNs), Internet Protocol Security (IPSec), Intrusion Detection Systems
(IDS) and firewalls are just examples among various security mechanisms that have been proposed
to address security issues in wired networks.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 347
As already mentioned above, WiMAX uses radio and anyone with a properly positioned and
configured receiver can intercept messages, and if he has a properly configured transmitter, i.e. he
poses as a legitimate base station (BS) while actually being a rouge base station [2], he can write on
the wireless channel, capture frames, make new ones, modify existing frames from the users.
II. WiMAX SECURITY ARCHITECTURE
A. Data Link layer security – The IEEE 802.16 standard consists of well defined interfaces in the
protocol stack. The protocol contains MAC layer along with PHY layer. MAC layer includes
three sub layers as shown in the figure 1.
Figure 1: 802.16 Protocol Layering
The figure shows the three sub layers.
1) Service Specific Convergence Sub Layer (CS) – This is used for mapping higher level data
services to MAC layer service.
2) MAC Common Part Sub Layer (MAC-CPS) – MAC CPS defines:
 The rules and mechanisms for system access, bandwidth allocation, grant connection control
etc.
 Functions like uplink scheduling, bandwidth request etc.
 The communication between the MAC CPS and CS is handled by MAC SAP
3) Security Sub layer – The Security Sub Layer lies between MAC CPS and PHY. This layer is
responsible for the encryption and decryption of data travelling to and from the PHY layer.
This layer is used for authentication and secure key exchange [3].
B. Protocol Layer Security scheme – The IEEE 802.16e standard has better security features than
the IEEE 802.16d. Most of the concerns raised with the 802.16d have been addressed in 802.16e.
Security sub-layer is shown below in figure 2.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 348
Figure 2: WiMAX security sub layer
This sub layer performs three functions
1) Authentication – The following authentication protocols are supported by WiMAX”
RSA Authentication based on X.509 Certificates. The basic use of the X.509 certificates is the
determination of the identity of the base station (BS) by the subscriber station (SS). The certificate
consists of eleven elements [5].
There are two types of certificates:
 Manufacturer is used to identify the third party.
The subscriber station certificate is used by the BS to determine whether the SS is a legitimate one or
not.
While granting the AK, the BS verifies the certificate and uses the verified Public Key to encrypt an
AK and send it to the SS. The process of RSA authentication is shown in figure 3. The message is
encrypted using the public key and the formula at the subscriber station. The cipher text so obtained
is then transmitted to the base station where the complimentary operations are performed to obtain
the plain text. It must be noted that the decryption is done with the help of the private key at the base
station.
Figure 3: RAS Authentication
 EAP (Extensible Authentication Protocol) – is a simple encapsulation that can run over not only
on PPP but on any link like the WiMAX. For the case of WiMAX the EAP runs from the Mobile
Station (MS) to the BS over the PKMv2. In the case that the authenticator is not in the BS, the
BS sends the protocol to the authenticator in the access service network. The EAP is carried,
from the authenticator to the authentication, over RADIUS. The EAP framework is shown in
figure 4.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 349
Figure 4: EAP Framework
 HMAC (Hashed Message Authentication Code) - The 802.16e standard added the option of
using CMAC in place of HMAC. The major advantage of HMAC is that the receiver can verify
the identity of the sender. This is possible because while sending the message, the sender creates
a HMAC of the message using a key known to the sender and receiver alone. When the message
is received, the receiver computes its own HMAC of the message with the same key and
compares it with the one received from the sender. If there is a match, the identity is verified.
2) Authorization – This process follows the authentication process. In this the SS request an AK
along with a SAID (Security Association ID). The authorization message includes the SS’s
X.509 certificate, encryption algorithms and cryptographic ID. After authorization the BS sends
back to the SS a public key, a lifetime key and a SAID.
3) Encryption – A Traffic Encryption Key (TEK) is used to encrypt the data traffic [4]. The TEK
encryption process is Shown in Figure 5
Figure 5: TEK Encryption Process
III. THREATS TO WiMAX
Many of the security threats found in WiMAX have been addressed. These are issues that were
found with the deployment of WiFi. This gives WiMAX an advantage. If all, or at least most of the
security issues can be addressed before WiMAX’s mainstream deployment, it will make it a more
accepted network than WiFi. This section of the paper will discuss the known security threats in
WiMAX. These include:
o Rogue base stations -
o DoS attacks -
o Man-in-the-middle attacks -
o Network manipulation with spoofed management frames -
o Threats in the physical layer -
 Rogue base stations – A Rogue Base Station is defined as an attacker station that imitates a
legitimate base station [6]. This kind of attack results in disruptions in service and allows
hackers to confuse subscribers. WiMAX uses time division multiple access, therefore the rogue
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 350
base station must transmit with a stronger strength at the same time the legitimate station
transmits. The authentication protocols used in WiMAX help mitigate this threat. WiMAX uses
the EAP protocol as its main protocol for authentication.
 DoS attacks – Dential of Service (DoS) attacks is defined as an attempt to make a computer
resource unavailable to its intended users [7]. Hackers usually use this type of attack on web
servers for banks, credit card payment gateways or DNS root servers. A DoS attack uses the IP
address to flood the user’s network and obstruct communication between the intended user and
the victim. This type of attack is not preventable; however steps can be taken to quickly resolve
the attack. Some firewalls have built-in protection from DoS attacks, that monitor the amounts
of packets received and the time frame they were received. It has been proposed hat a Shared
Authentication Information (SAI) protocol could be sued to offer a defence mechanism against
DoS attacks, without incurring overhead at the ASN gateway and base station. This proposal
uses the unused upper 64-bits of the 128-bits Cipher Based Message Authentication Code
(CMAC) to calculate a CMAC key [8]. This proposal could be the answer to prevention of DoS
threats.
 Man-in-the-middle attacks – Man-in-the-Middle attacks are forms of eavesdropping. The hacker
establishes separate connections between two victims and relays the messages between them [9].
The hacker intercepts the public key from one of the victims and sends his or her own public key
to the intended victim. When that victim responds the hacker then has that public key. The use
of the RF spectrum in WiMAX allows for vulnerabilities to the man-in-the-middle attack.
However, WiMAX uses a three-way handshake scheme that supports re-authentication
mechanisms for fast handovers to prevent man-in-the-middle attack [10]. If the base station is
constantly changed the public key changes making it almost impossible for hackers to eavesdrop
using public key.
 Network manipulation with spoofed management frames – The management frames in WiMAX
are similar to WiFi’s. When WiFi was first deployed vulnerabilities were found in the
management frames that allowed DoS attacks by disrupting the wireless session between two
nodes. WiMAX has cryptographic protections from spoofed identities, but that does not mean it
is safe. Replay DoS attacks still remain a threat to WiMAX, due to the lack of any mechanisms
to specifically detect and discard repeated packets [11].
 Threats in the physical layer – Blocking and rushing are the major threats located in the physical
layer. Blocking or jamming activates a strong frequency to lower the capacity of the channel
creating a DoS to all stations. This threat is detectable with a radio analyzer device. This device
does not prevent this threat, but it alerts the end user so that steps can be taken to immediately
recover. Rushing or scrambling is another type of jamming, but it only activates for short
periods of time and only affects certain frames. Jamming can be prevented using an increased
signal or using frequency hopping. Control or management messages are not in danger of
rushing or blocking. Scrambling the uplink slots is too difficult for hackers [12].
IV. CONCLUSIONS
WiMAX security has been discussed in this paper. The precautions taken with WiMAX were not
done for WiFi. IEEE 802.16 is an emerging standard for broadband wireless communications that is
receiving a lot of attention from service provider and hardware producers as an alternative to wired
broadband access or promising technology to offer broadband wireless access over long distance.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 351
In this paper, we describe different security vulnerabilities found in IEEE 802.16e, such as :
Unauthenticated messages which could constrict or interrupt the communication between mobile
station and base station which listens to the traffic, he can collect lots of information about both
instances; and lastly, shared keys in the multicast and broadcast services in Mobile WiMAX that can
cause group members to forge messages or even distribute own traffic keying material, thus
controlling the multicast and broadcast content.
REFERENCES
[1] LangWei-min, Zhong Jin-li, Li Jian Jun et.al., “Research on the Authentication Scheme of WiMAX” in Proc 4th
International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-4, 12-14 October
2008, Dalian, China PR.
[2] Michel Barbeau Carleton University, Ottawa, Ontario, Canada, “WiMAX/802.16 Threat analysis”, Published in:
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile
networks pp. 8 – 15, 2005
[3] Tao Han, Ning Zhang, Kaiming Liu, Bihua Tang et.al., “Analysis of Mobile WiMAX Security: Vulnerabilities and
Solutions”, in Proc 5th
IEEE International Conference on Mobile Ad Hoc and Sensor Networks, pp.828-833 2008.
September 29 – October 2, 2008, Atlanta, USA.
[4] Lang Wei-min, Wu Rung-shen, Wang, Jian-qiu, “A Simple Key Management Scheme Based on WiMAX” in Proc
International Symposium on Computer Science and Computational Technology, (Volume 1) pp. 3-6 20-22
December 2008, Shangai, China
[5] IEEE Standard for Local and Metropolitan Area Networks. Air Interface for Fixed and mobile Broadband Wireless
Access Systems, IEEE Std 802.16e. New York: IEEE Press, 2006.
[6] M. Barbeau, J. Hall and E. Kranakis, “ Detecting Impersonation Attacks in Future Wireless and Mobile Networks”,
Secure Mobile Ad-hoc Networks and Sensors, Published in: Proceeding MADNES'05 Proceedings of the First
international conference on Secure Mobile Ad-hoc Networks and Sensors, Ottawa, pp. 80-95, 2006.
[7] M. McDowell, “Understanding Denial of Service Attacks,” National Cyber Alert System, 1 Aug. Vol.2 No.2
(2010), Article ID:1866, 4 pages pp. 134-137 DOI:10.4236/cn.2010.22020 Received February 23, 2010; revised
April 20, 2010; accepted April 29, 2010
[8] K. Youngwook, L. Hyoung-kyu and B. Saewoong, “Shared Authentication Information for Preventing DDoS
Attacks in Mobile WiMAX Networks”, Proceedings of the 5th
consumer communications and networking
conference, Las Vegas, Published in: Consumer Communications and Networking Conference, 2008. CCNC 2008.
5th IEEE, pp.765-769 10-12 Jan 2008.
[9] N. Beacham, “ Man in the Middle (MITM) Attacks,” Technology and More, JOURNAL NAME: Communications
and Network, Vol.2 No.2, May 31, 2010.
[10]J. M. Hartley, “ WiFi and WiMAX Protocols of security,” December 2008.
http://softwarecommunity.intel.com/articales/eng/3708.htm
[11]R. Millman, “Security Experts See Vulnerabilities in WiMAX.” WiMAX.com, 17 oct 2006.
[12]M. Barbean, “ Threats: Threats to WiMAX,” http://www.freewimax info.com/ physical-layer.html
A Review on security issues in WiMAX
A Review on security issues in WiMAX

More Related Content

What's hot

1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp011ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
Hussein Elmenshawy
 
Wi-Fi Security with Wi-Fi P+
Wi-Fi Security with Wi-Fi P+Wi-Fi Security with Wi-Fi P+
Wi-Fi Security with Wi-Fi P+
Ajin Abraham
 
Link Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTLink Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoT
Prasant Misra
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
faisalmalik
 
802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
AirTight Networks
 
When WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksWhen WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS Attacks
AirTight Networks
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
kamran_share
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
Pradeep Kumar TS
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
UBT - Higher Education Institution
 
Automate programmable fabric in seconds with an open standards based solution
Automate programmable fabric in seconds with an open standards based solutionAutomate programmable fabric in seconds with an open standards based solution
Automate programmable fabric in seconds with an open standards based solution
Tony Antony
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
Netwax Lab
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
MD MONIRUZZAMAN
 
Vpn
VpnVpn
Wireless Security
Wireless SecurityWireless Security
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
stolentears
 
VPN Network
VPN NetworkVPN Network
VPN Network
Wani Zahoor
 
How to secure your industrial network using segmentation and segregation
How to secure your industrial network using segmentation and segregationHow to secure your industrial network using segmentation and segregation
How to secure your industrial network using segmentation and segregation
Westermo Network Technologies
 
Cryptography in GSM
Cryptography in GSMCryptography in GSM
Cryptography in GSM
Tharindu Weerasinghe
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
LJ PROJECTS
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-compliance
Nir Cohen
 

What's hot (20)

1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp011ip Tunneling And Vpn Technologies 101220042129 Phpapp01
1ip Tunneling And Vpn Technologies 101220042129 Phpapp01
 
Wi-Fi Security with Wi-Fi P+
Wi-Fi Security with Wi-Fi P+Wi-Fi Security with Wi-Fi P+
Wi-Fi Security with Wi-Fi P+
 
Link Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTLink Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoT
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
 
When WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksWhen WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS Attacks
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
Automate programmable fabric in seconds with an open standards based solution
Automate programmable fabric in seconds with an open standards based solutionAutomate programmable fabric in seconds with an open standards based solution
Automate programmable fabric in seconds with an open standards based solution
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
Vpn
VpnVpn
Vpn
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN Network
VPN NetworkVPN Network
VPN Network
 
How to secure your industrial network using segmentation and segregation
How to secure your industrial network using segmentation and segregationHow to secure your industrial network using segmentation and segregation
How to secure your industrial network using segmentation and segregation
 
Cryptography in GSM
Cryptography in GSMCryptography in GSM
Cryptography in GSM
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
 
Megaplex nerc-cip-compliance
Megaplex nerc-cip-complianceMegaplex nerc-cip-compliance
Megaplex nerc-cip-compliance
 

Similar to A Review on security issues in WiMAX

Mutual authentication between base and subscriber station can improve the sec...
Mutual authentication between base and subscriber station can improve the sec...Mutual authentication between base and subscriber station can improve the sec...
Mutual authentication between base and subscriber station can improve the sec...
CSCJournals
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Dr. Amarjeet Singh
 
A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for flooding
ijcsa
 
SECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAXSECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAX
IJNSA Journal
 
SECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAXSECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAX
IJNSA Journal
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
inventionjournals
 
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXSECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
IJNSA Journal
 
Analysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdfAnalysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdf
Perumalraja Rengaraju
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possible
IJNSA Journal
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
Mohammed Abdalhakam Taha
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
IJNSA Journal
 
7215nsa05
7215nsa057215nsa05
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
Jayanth Dwijesh H P
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
IRJET Journal
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
IJNSA Journal
 
A secure and service oriented
A secure and service orientedA secure and service oriented
A secure and service oriented
Jayanta Khumanthem
 
Diameter Penetration Test Lab
Diameter Penetration Test LabDiameter Penetration Test Lab
Diameter Penetration Test Lab
frcarlson
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
ronak56
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
daniahendric
 

Similar to A Review on security issues in WiMAX (20)

Mutual authentication between base and subscriber station can improve the sec...
Mutual authentication between base and subscriber station can improve the sec...Mutual authentication between base and subscriber station can improve the sec...
Mutual authentication between base and subscriber station can improve the sec...
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
 
A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for flooding
 
SECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAXSECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAX
 
SECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAXSECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAX
 
Security Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11iSecurity Analysis and Improvement for IEEE 802.11i
Security Analysis and Improvement for IEEE 802.11i
 
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXSECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
 
Analysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdfAnalysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdf
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possible
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
 
7215nsa05
7215nsa057215nsa05
7215nsa05
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
 
A secure and service oriented
A secure and service orientedA secure and service oriented
A secure and service oriented
 
Diameter Penetration Test Lab
Diameter Penetration Test LabDiameter Penetration Test Lab
Diameter Penetration Test Lab
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
Editor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
Editor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
Editor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
Editor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
Editor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
Editor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
Editor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
Editor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
Editor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
Editor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
Editor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
Editor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
Editor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
Editor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
Editor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
Editor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Recently uploaded

Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
ramrag33
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 

Recently uploaded (20)

Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 

A Review on security issues in WiMAX

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 346 e-ISSN: 2349-9745 p-ISSN: 2393-8161 A Review on security issues in WiMAX Ravinder Kumar1 , Veepin Kumar2 1 M. Tech. Scholar, 2 Asstt. Professor 1,2 Department of Computer Science & Engineering. 1.2 Om Institute of Technology and Management, Hisar. Abstract – The IEEE 802.16 standard, commonly known as WiMAX, is the latest technology that has promised to offer broadband wireless access over long distance. Since 2001, WiMAX has evolved from 802.16 to 802.16d standard for fixed wireless access and to the new IEEE 802.16e standard with mobility support. With the growing popularity of WiMAX the security risks have increased many folds. In this paper we will give an overview of security architecture of WiMAX. We propose some possible security improvements and solutions to eliminate the vulnerabilities. Finally, we will have a look at improvement reported in multi hop WiMAX networks. Keywords – WiMAX, IEEE 802.16, security, encryption, security concerns, authentication I. INTRODUCTION The IEEE 802.16 or WiMAX is an excellent successor to WiFi/IEEE 802.11. As WiMAX grows, the security concerns over it also increase. We define security as protection of data being transmitted over a wireless networks. It is important to understand the full range of problems that security systems need to address. These needs are confidentiality, integrity and authentication (CIA), and are defined as follows: A. Confidentiality – Allowing only that the intended legitimate recipients to read encrypted messages. B. Integrity – is referred to as ensuring that another party has not altered messages after it has been sent. C. Authentication – This is making sure that parties sending messages or receiving messages are who they say they are. As WiMAX transitioned from Line of Sight (LOC) and Point to Multi Point (PMP) higher frequency (10-66 GHz) to lower frequencies (2-11 GHz) and NLOS mobile systems the security issues increased tremendously. Also, WiMAX uses radio channels which are open channels and hence pose a very serious security problem for traffic confidentiality and integrity. For transmission, WiMAX uses air as medium which exposes the PHY and MAX layers [1]. Virtual Private Networks (VPNs), Internet Protocol Security (IPSec), Intrusion Detection Systems (IDS) and firewalls are just examples among various security mechanisms that have been proposed to address security issues in wired networks.
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 347 As already mentioned above, WiMAX uses radio and anyone with a properly positioned and configured receiver can intercept messages, and if he has a properly configured transmitter, i.e. he poses as a legitimate base station (BS) while actually being a rouge base station [2], he can write on the wireless channel, capture frames, make new ones, modify existing frames from the users. II. WiMAX SECURITY ARCHITECTURE A. Data Link layer security – The IEEE 802.16 standard consists of well defined interfaces in the protocol stack. The protocol contains MAC layer along with PHY layer. MAC layer includes three sub layers as shown in the figure 1. Figure 1: 802.16 Protocol Layering The figure shows the three sub layers. 1) Service Specific Convergence Sub Layer (CS) – This is used for mapping higher level data services to MAC layer service. 2) MAC Common Part Sub Layer (MAC-CPS) – MAC CPS defines:  The rules and mechanisms for system access, bandwidth allocation, grant connection control etc.  Functions like uplink scheduling, bandwidth request etc.  The communication between the MAC CPS and CS is handled by MAC SAP 3) Security Sub layer – The Security Sub Layer lies between MAC CPS and PHY. This layer is responsible for the encryption and decryption of data travelling to and from the PHY layer. This layer is used for authentication and secure key exchange [3]. B. Protocol Layer Security scheme – The IEEE 802.16e standard has better security features than the IEEE 802.16d. Most of the concerns raised with the 802.16d have been addressed in 802.16e. Security sub-layer is shown below in figure 2.
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 348 Figure 2: WiMAX security sub layer This sub layer performs three functions 1) Authentication – The following authentication protocols are supported by WiMAX” RSA Authentication based on X.509 Certificates. The basic use of the X.509 certificates is the determination of the identity of the base station (BS) by the subscriber station (SS). The certificate consists of eleven elements [5]. There are two types of certificates:  Manufacturer is used to identify the third party. The subscriber station certificate is used by the BS to determine whether the SS is a legitimate one or not. While granting the AK, the BS verifies the certificate and uses the verified Public Key to encrypt an AK and send it to the SS. The process of RSA authentication is shown in figure 3. The message is encrypted using the public key and the formula at the subscriber station. The cipher text so obtained is then transmitted to the base station where the complimentary operations are performed to obtain the plain text. It must be noted that the decryption is done with the help of the private key at the base station. Figure 3: RAS Authentication  EAP (Extensible Authentication Protocol) – is a simple encapsulation that can run over not only on PPP but on any link like the WiMAX. For the case of WiMAX the EAP runs from the Mobile Station (MS) to the BS over the PKMv2. In the case that the authenticator is not in the BS, the BS sends the protocol to the authenticator in the access service network. The EAP is carried, from the authenticator to the authentication, over RADIUS. The EAP framework is shown in figure 4.
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 349 Figure 4: EAP Framework  HMAC (Hashed Message Authentication Code) - The 802.16e standard added the option of using CMAC in place of HMAC. The major advantage of HMAC is that the receiver can verify the identity of the sender. This is possible because while sending the message, the sender creates a HMAC of the message using a key known to the sender and receiver alone. When the message is received, the receiver computes its own HMAC of the message with the same key and compares it with the one received from the sender. If there is a match, the identity is verified. 2) Authorization – This process follows the authentication process. In this the SS request an AK along with a SAID (Security Association ID). The authorization message includes the SS’s X.509 certificate, encryption algorithms and cryptographic ID. After authorization the BS sends back to the SS a public key, a lifetime key and a SAID. 3) Encryption – A Traffic Encryption Key (TEK) is used to encrypt the data traffic [4]. The TEK encryption process is Shown in Figure 5 Figure 5: TEK Encryption Process III. THREATS TO WiMAX Many of the security threats found in WiMAX have been addressed. These are issues that were found with the deployment of WiFi. This gives WiMAX an advantage. If all, or at least most of the security issues can be addressed before WiMAX’s mainstream deployment, it will make it a more accepted network than WiFi. This section of the paper will discuss the known security threats in WiMAX. These include: o Rogue base stations - o DoS attacks - o Man-in-the-middle attacks - o Network manipulation with spoofed management frames - o Threats in the physical layer -  Rogue base stations – A Rogue Base Station is defined as an attacker station that imitates a legitimate base station [6]. This kind of attack results in disruptions in service and allows hackers to confuse subscribers. WiMAX uses time division multiple access, therefore the rogue
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 350 base station must transmit with a stronger strength at the same time the legitimate station transmits. The authentication protocols used in WiMAX help mitigate this threat. WiMAX uses the EAP protocol as its main protocol for authentication.  DoS attacks – Dential of Service (DoS) attacks is defined as an attempt to make a computer resource unavailable to its intended users [7]. Hackers usually use this type of attack on web servers for banks, credit card payment gateways or DNS root servers. A DoS attack uses the IP address to flood the user’s network and obstruct communication between the intended user and the victim. This type of attack is not preventable; however steps can be taken to quickly resolve the attack. Some firewalls have built-in protection from DoS attacks, that monitor the amounts of packets received and the time frame they were received. It has been proposed hat a Shared Authentication Information (SAI) protocol could be sued to offer a defence mechanism against DoS attacks, without incurring overhead at the ASN gateway and base station. This proposal uses the unused upper 64-bits of the 128-bits Cipher Based Message Authentication Code (CMAC) to calculate a CMAC key [8]. This proposal could be the answer to prevention of DoS threats.  Man-in-the-middle attacks – Man-in-the-Middle attacks are forms of eavesdropping. The hacker establishes separate connections between two victims and relays the messages between them [9]. The hacker intercepts the public key from one of the victims and sends his or her own public key to the intended victim. When that victim responds the hacker then has that public key. The use of the RF spectrum in WiMAX allows for vulnerabilities to the man-in-the-middle attack. However, WiMAX uses a three-way handshake scheme that supports re-authentication mechanisms for fast handovers to prevent man-in-the-middle attack [10]. If the base station is constantly changed the public key changes making it almost impossible for hackers to eavesdrop using public key.  Network manipulation with spoofed management frames – The management frames in WiMAX are similar to WiFi’s. When WiFi was first deployed vulnerabilities were found in the management frames that allowed DoS attacks by disrupting the wireless session between two nodes. WiMAX has cryptographic protections from spoofed identities, but that does not mean it is safe. Replay DoS attacks still remain a threat to WiMAX, due to the lack of any mechanisms to specifically detect and discard repeated packets [11].  Threats in the physical layer – Blocking and rushing are the major threats located in the physical layer. Blocking or jamming activates a strong frequency to lower the capacity of the channel creating a DoS to all stations. This threat is detectable with a radio analyzer device. This device does not prevent this threat, but it alerts the end user so that steps can be taken to immediately recover. Rushing or scrambling is another type of jamming, but it only activates for short periods of time and only affects certain frames. Jamming can be prevented using an increased signal or using frequency hopping. Control or management messages are not in danger of rushing or blocking. Scrambling the uplink slots is too difficult for hackers [12]. IV. CONCLUSIONS WiMAX security has been discussed in this paper. The precautions taken with WiMAX were not done for WiFi. IEEE 802.16 is an emerging standard for broadband wireless communications that is receiving a lot of attention from service provider and hardware producers as an alternative to wired broadband access or promising technology to offer broadband wireless access over long distance.
  • 6. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 351 In this paper, we describe different security vulnerabilities found in IEEE 802.16e, such as : Unauthenticated messages which could constrict or interrupt the communication between mobile station and base station which listens to the traffic, he can collect lots of information about both instances; and lastly, shared keys in the multicast and broadcast services in Mobile WiMAX that can cause group members to forge messages or even distribute own traffic keying material, thus controlling the multicast and broadcast content. REFERENCES [1] LangWei-min, Zhong Jin-li, Li Jian Jun et.al., “Research on the Authentication Scheme of WiMAX” in Proc 4th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-4, 12-14 October 2008, Dalian, China PR. [2] Michel Barbeau Carleton University, Ottawa, Ontario, Canada, “WiMAX/802.16 Threat analysis”, Published in: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks pp. 8 – 15, 2005 [3] Tao Han, Ning Zhang, Kaiming Liu, Bihua Tang et.al., “Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions”, in Proc 5th IEEE International Conference on Mobile Ad Hoc and Sensor Networks, pp.828-833 2008. September 29 – October 2, 2008, Atlanta, USA. [4] Lang Wei-min, Wu Rung-shen, Wang, Jian-qiu, “A Simple Key Management Scheme Based on WiMAX” in Proc International Symposium on Computer Science and Computational Technology, (Volume 1) pp. 3-6 20-22 December 2008, Shangai, China [5] IEEE Standard for Local and Metropolitan Area Networks. Air Interface for Fixed and mobile Broadband Wireless Access Systems, IEEE Std 802.16e. New York: IEEE Press, 2006. [6] M. Barbeau, J. Hall and E. Kranakis, “ Detecting Impersonation Attacks in Future Wireless and Mobile Networks”, Secure Mobile Ad-hoc Networks and Sensors, Published in: Proceeding MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors, Ottawa, pp. 80-95, 2006. [7] M. McDowell, “Understanding Denial of Service Attacks,” National Cyber Alert System, 1 Aug. Vol.2 No.2 (2010), Article ID:1866, 4 pages pp. 134-137 DOI:10.4236/cn.2010.22020 Received February 23, 2010; revised April 20, 2010; accepted April 29, 2010 [8] K. Youngwook, L. Hyoung-kyu and B. Saewoong, “Shared Authentication Information for Preventing DDoS Attacks in Mobile WiMAX Networks”, Proceedings of the 5th consumer communications and networking conference, Las Vegas, Published in: Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE, pp.765-769 10-12 Jan 2008. [9] N. Beacham, “ Man in the Middle (MITM) Attacks,” Technology and More, JOURNAL NAME: Communications and Network, Vol.2 No.2, May 31, 2010. [10]J. M. Hartley, “ WiFi and WiMAX Protocols of security,” December 2008. http://softwarecommunity.intel.com/articales/eng/3708.htm [11]R. Millman, “Security Experts See Vulnerabilities in WiMAX.” WiMAX.com, 17 oct 2006. [12]M. Barbean, “ Threats: Threats to WiMAX,” http://www.freewimax info.com/ physical-layer.html