SlideShare a Scribd company logo
A Secure and Service Oriented
Network Control Framework
for WiMAX Networks




      Khumanthem Jayanta Singh (110948008)
TABLE OF CONTENT
1) ABSTRACT

2) INTRODUCTION

3) LITERATURE SURVEY

4) PROBLEM STATEMENT

5) APPLICATION SCENARIOS

7) A SECURE AND SERVICE-ORIENTED
NETWORK CONTROL FRAMEWORK

8) FUTURE WORKS

9) CONCLUSION
Abstract
      WiMAX, Worldwide Interoperability for Microwave Access, is an
emerging wireless communication system that can provide broadband
access with large-scale coverage. In this article we propose a secure and
service-oriented network control framework for WiMAX net-works. In
the design of this framework we consider both the security requirements
of the communications and the requirements of potential WiMAX
applications that have not been fully addressed previously in the network
layer design.
The proposed framework consists of two basic components: a service-
aware control frame-work and a unified routing scheme. Besides the
design of the framework, we further study a number of key enabling
technologies that are important to a practical WiMAX network. Our
study can provide a guideline for the design of a more secure and
practical WiMAX network.


INTRODUCTION
       WiMAX (Worldwide Interoperability for Microwave Access) is an
emerging wireless communication system that is expected to provide
high data rate communications in metropolitan area networks (MANs)
[1]. In the past few years, the IEEE 802.16 working group has developed
a number of standards for WiMAX. The first standard was published in
2001, which aims to support the communications in the 1066 GHz
frequency band. In 2003 IEEE 802.16a was introduced to provide
additional physical layer specifications for the 211 GHz frequency band.
These two standards were further revised in 2004 (IEEE 802.16-2004).
Recently, IEEE 802.16e has also been approved as the official standard
for mobile applications. In the physical (PHY) layer, IEEE 802.16
supports four PHY specifications for the licensed bands. These four
specifications are Wireless-MAN-SC (single carrier), -SCa, -OFDM
(orthogonal frequency-division multiplexing), and -OFDMA (orthogonal
frequency- division multiple access).To support multiple subscribers,
IEEE 802.16 supports both time-division duplex (TDD) and frequency-
division duplex (FDD) operations. OFDM uses multiple sub-carriers but
the subcarriers are closely spaced to each other without causing
interference, removing guard bands between adjacent subcarriers. This is
possible because the frequencies (sub-carriers) are orthogonal; meaning
the peak of one sub-carrier coincides with the null of an adjacent
subcarrier. In an OFDM system, a very high rate data stream is divided
into multiple parallel low rate data streams. Each smaller data stream is
then mapped to individual data sub-carrier and modulated using some
Sorts of PSK (Phase Shift Keying) or QAM (Quadrature Amplitude
Modulation) OFDMA employs multiple closely spaced subcarriers, but
the sub-carriers are divided into groups of sub-carriers. Each group is
named a sub channel. The sub-carriers that form a sub-channel need not
be adjacent. In the downlink, a sub-channel may be intended for
different receivers. In the uplink, a transmitter may be assigned one or
more sub channels. Sub channelization defines sub-channels that can be
allocated to subscriber stations (SSs) depending on their channel
conditions and data requirements. Using sub channelization, within the
same time slot a
Mobile WiMAX Base Station (BS) can allocate more transmit power to
user devices (SSs) with lower SNR (Signal-to-Noise Ratio), and less
power to user devices with higher SNR. In the medium access control
(MAC) layer, IEEE 802.16 supports two modes: point-to-multipoint
(PMP) and mesh. The former organizes nodes into a cellular-like
structure consisting of a base station (BS) and subscriber stations (SSs).
The channels are divided into uplink (from SS to BS) and downlink
(from BS to SS), and both uplink and downlink channels are shared
among the SSs. PMP mode requires all SSs to be within the transmission
range and clear line of sight (LOS) of the BS. On the other hand, in
mesh mode an ad hoc network can be formed with all nodes acting as
relaying routers in addition to their sender and receiver roles, although
there may still be nodes that serve as BSs and provide backhaul
connectivity.

Literature Survey
      According to the IEEE 802.16 standard [1], WiMAX technology
supports two operation modes: PMP and mesh. A WiMAX PMP net-
work aims at providing last-mile access to a broadband Internet service
Provider (ISP). An example of the network topology is illustrated in Fig.
1a, where the WiMAX network includes one BS and a number of SSs.
On the other hand, mesh mode implies the requirement of supporting
multihop ad hoc net-working by SSs. An example of a WiMAX mesh
network is illustrated in Fig. 1b. Notice that in this figure, we assume
that BS can provide access to the Internet; a relay station (RS) is a
special type of SS that can forward traffic flows to BSs or other RSs;
and a mobile station (MS)is an SS that can move in the network. The
Various Security schema discussed in [2] are WiMAX security supports
two quality encryptions standards, that of the DES3 and AES, which is
considered leading edge. The standard defines a dedicated security
processor on board the base station for starters. There are also minimum
encryption requirements for the traffic and for end to end authentication
the latter of which is adapted from the data-over-cable service interface
specification (DOCSIS) BPI+ security protocol. Basically, all traffic on
a WiMAX network must be encrypted using Counter Mode with Cipher
Block Chaining Message Authentication Code Protocol (CCMP) which
uses AES for transmission security and data integrity authentication. The
end-to-end authentication the PKM-EAP (Extensible Authentication
Protocol) methodology is used which relies on the TLS standard of
public key encryption. The author in [4] propose a novel routing
framework in the network layer, manycast routing. In this scheme the
customer does not need to specify the exact address of a server in the
network. Instead, it only needs to indicate the service it wants to access.
Moreover, in such a communication scenario, the client (i.e., the
customer) can communicate with a subset of all the servers in order to
achieve better reliability and/or security. In multicasting, if at least one
of the members in the group cannot satisfy the service requirement of
the application, the multicast request is said to be blocked. On the
contrary in many casting, destinations can join or leave the group,
depending on whether it satisfies the service requirement or not.


Problem statement
      The main motivation for creating this article i is that we need to
take into account both the security concerns and the requirements of
potential WiMAX applications. Any other previous Wimax framework
does not provide such security concerns and availability of wide range of
application for Wimax with heterogeneity of end user devices.

APPLICATION SCENARIOS
      Wimax can be used in the following application area. Internet
Access: Evidently, Internet access will still be the major demand in
WiMAX net-works, especially when they are newly deployed. To
support Internet access, a straightforward method is to provide a unicast
connection between SSs (including RSs and MSs) and the BS, which has
the link toward the Internet. Group Communications: Since WiMAX
net-works can cover a relatively large area, it is natural to imagine that
many group communications, such as videoconferences, will be
important applications in WiMAX networks. To support such
communication scenarios, multicast is the key technology. In a WiMAX
network, however, since all nodes are located inside, implementing such
group communication becomes possible. Metropolitan Area Distributed
Service: With the deployment of WiMAX networks, more and more
value-added services can be provided in a metropolitan area. To
efficiently support a large number of customers, distributed services can
be enabled. In other words, a customer can access the service from any
of the servers in the net-work in which these servers are distributed
to serve the entire metropolitan area. Content-Based Distribution: The
content-based routing scheme is a service-oriented communication
model [5]. In this scheme the sender of a message does not need to
explicitly specify its destination(s). The network layer will automatically
deliver the message to receivers that are interested in the content of the
message. In [5] the authors proposed to design an overlay network based
on broadcast service of the existing network. Quality Guaranteed
Applications: For many applications, it is desirable that the network
layer can provide a sufficient quality of service (QoS) guarantee, usually
in terms of bandwidth, data rate, delay, and delay jitter. However, wire-
less communications are naturally error-prone; thus, it is difficult to
provide such a guarantee in a wireless network. To address this issue, in
the literature multipath routing has been studied in many previous
works. Multihoming Applications: Multihoming [3] is a technology that
can provide services similar to those of multipath routing. The main
difference between these




Figure 1: WiMAX network architectures: a) PMP mode; b) mesh mode.
two schemes is that in multi-homing, one station has two or more IP
addresses and generally has the same number of interfaces. In this
manner, the station can have multiple paths to access the same resources.


A SECURE AND SERVICE-ORIENTED
NETWORK CONTROL FRAMEWORK
     In this section we elaborate on a novel control framework to
address the security requirements in WiMAX networks, and full the
demands of existing and future application scenarios dis-cussed above.

Components
      In this framework there are two major components. Service-Aware
Control Scheme To efficiently
support different applications, the net-work layer control scheme shall
be aware of the availability of different services. In general, the service
can be either located in a single node in the network or distributed in
multiple locations in the network. To provide these services, the servers
must register the type and availability of service to the control frame-
work. Moreover, the availability information shall be updated
periodically or based on predefined events. Upon receiving these
messages, the control framework will also be responsible for distributing
such message to nodes in the network. Unified Routing Scheme With
the availability information of the service, a unified routing scheme shall
be designed such that all the application scenarios discussed in the last
section shall be supported. The packets of a certain flow will be
forwarded based on the service and security requirements.
ENABLING TECHNOLOGIES
     To deploy the proposed framework, a number of key technologies
must be addressed. In the rest of this section we address these issues.




Figure 2: The importance of the placement of BSs and RSs: a) a single
path; b) multiple paths.


PLACEMENT OF BSS AND RSS
      In our framework, the placement of BSs and RSs is very important
for a broadband wireless service provider to offer a secure
communication platform. For example, in Fig. 2a, if there is only one
path between one MS and a server, it is not possible to guarantee the
security of the communication since a single RS in the path can damage
the confidentiality and integrity of the information transmission, or
block the traffic flow and affect the availability of the service. On the
other hand, if there are two or more paths available, secure
communication channels are more likely to exist between the MS and
the server, as shown in Fig. 2b.One important issue related to the
placement of BSs and RSs is the cost. Apparently, with increasing
numbers of BSs and RSs of a service provider, security and availability
will increase while cost will also soar. In such a case, it becomes a trade-
o_ between security and cost. On the other hand, given the constraint of
cost, the placement of BSs and RSs can be formulated as an optimization
problem, which shall be further investigated.

SECURITY MANAGEMENT
      In the proposed framework the security management scheme is
very important to the system. Similar to [3], we consider the security
management scheme responsible for monitoring the operation of the
network and quickly identifying possible security attacks and threats.

KEY MANAGEMENT
      In addition to the MAC layer, key management is also important to
the network layer. To provide a secure communication channel between
the end user and the server, it is important to develop a key management
scheme to establish a unique key for each session. In such a scenario the
proposed framework can be directly utilized to improve the reliability
and security of the key distribution. For instance, an MS can send key
material through multiple paths to the server. Since each path may
contain only a portion of all the information, the probability of the key
material being intercepted by an adversary can be significantly reduced.
SECURE ROUTING
      In our scheme the routing algorithm takes into account the
following issues. Multiple-radio and multiple-channel: In the near
future, each node may be equipped with multiple radio interfaces.
Therefore, the routing scheme shall take this into account. Multiple
destinations. In our framework, an application can require multiple
destinations in the network. For example, there is no requirement for
selecting node disjoint paths in these schemes, which may not be
sufficient to defend against compromised RS nodes. Multipath routing:
As shown in the previous section, the multipath scheme is different from
existing methods. First, multipath routing may need to forward messages
to different destinations. Second, more paths may need to be set up.
Heterogeneity of user devices: In practice, the capabilities of user
devices (e.g., data rate) are highly heterogeneous. Several application
layer schemes and middleware schemes have been proposed recently.
However, it is appropriate for the network layer to consider such
differences because the capability information offend users can be
utilized to help choose the routing method used.

CONCLUSION
      WiMAX is a promising wireless communication technology for
wireless MANs. In this article we address the design issue in multihop
WiMAX networks. Specifically, we propose a secure and service-
oriented network control framework in which both security concerns and
the requirements of potential WiMAX applications are taken into
account. In the framework there are two major components: a service-
aware control framework and a unified routing scheme. We then
demonstrate how these schemes can pro-vide the required service from
the network layer perspective. In addition to the design of the
framework, we also study several enabling technologies for the
framework, including the deployment of BSs and key management, and
secure routing. We believe that our study can provide a guideline for the
design of a more secure and practical WiMAX network.

More Related Content

What's hot

Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...
IJCNCJournal
 
Wireless mesh network (2)
Wireless mesh network (2)Wireless mesh network (2)
Wireless mesh network (2)Jyoti Yadav
 
Wmn Tutorial
Wmn TutorialWmn Tutorial
Wmn Tutorialtritv
 
10 satishkumar final_paper--105--113
10 satishkumar final_paper--105--11310 satishkumar final_paper--105--113
10 satishkumar final_paper--105--113
Alexander Decker
 
Practical Wireless Mesh Networks and Their Applications
Practical Wireless Mesh Networks and Their ApplicationsPractical Wireless Mesh Networks and Their Applications
Practical Wireless Mesh Networks and Their Applications
Raluca Musaloiu-E.
 
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
IJECEIAES
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...
IOSR Journals
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
IOSR Journals
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
pijans
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
ijwmn
 
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : NotesWhat Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
Subhajit Sahu
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Network
sheenammiddha
 
A Survey on Network Layer Multicast Routing Protocols for Mobile Ad Hoc Netw...
A Survey on Network Layer Multicast Routing Protocols for  Mobile Ad Hoc Netw...A Survey on Network Layer Multicast Routing Protocols for  Mobile Ad Hoc Netw...
A Survey on Network Layer Multicast Routing Protocols for Mobile Ad Hoc Netw...
IOSR Journals
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
ijwmn
 
Reducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive thresholdReducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive threshold
ijistjournal
 
MobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH NetworksMobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH Networks
acapone
 
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkQuality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
TELKOMNIKA JOURNAL
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
Md. Mashiur Rahman
 
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
IDES Editor
 

What's hot (19)

Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...Interworking qos management subsystem into ims based architecture multi provi...
Interworking qos management subsystem into ims based architecture multi provi...
 
Wireless mesh network (2)
Wireless mesh network (2)Wireless mesh network (2)
Wireless mesh network (2)
 
Wmn Tutorial
Wmn TutorialWmn Tutorial
Wmn Tutorial
 
10 satishkumar final_paper--105--113
10 satishkumar final_paper--105--11310 satishkumar final_paper--105--113
10 satishkumar final_paper--105--113
 
Practical Wireless Mesh Networks and Their Applications
Practical Wireless Mesh Networks and Their ApplicationsPractical Wireless Mesh Networks and Their Applications
Practical Wireless Mesh Networks and Their Applications
 
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput
 
An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...An optimized link state routing protocol based on a cross layer design for wi...
An optimized link state routing protocol based on a cross layer design for wi...
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 nA bi scheduler algorithm for frame aggregation in ieee 802.11 n
A bi scheduler algorithm for frame aggregation in ieee 802.11 n
 
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : NotesWhat Is Wide Area Network (WAN): Live WAN Network Examples : Notes
What Is Wide Area Network (WAN): Live WAN Network Examples : Notes
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Network
 
A Survey on Network Layer Multicast Routing Protocols for Mobile Ad Hoc Netw...
A Survey on Network Layer Multicast Routing Protocols for  Mobile Ad Hoc Netw...A Survey on Network Layer Multicast Routing Protocols for  Mobile Ad Hoc Netw...
A Survey on Network Layer Multicast Routing Protocols for Mobile Ad Hoc Netw...
 
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKLINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORK
 
Reducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive thresholdReducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive threshold
 
MobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH NetworksMobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH Networks
 
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkQuality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
 

Similar to A secure and service oriented

A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for flooding
ijcsa
 
WiMAX Features, Characteristics and Application in Wireless Technology Computing
WiMAX Features, Characteristics and Application in Wireless Technology ComputingWiMAX Features, Characteristics and Application in Wireless Technology Computing
WiMAX Features, Characteristics and Application in Wireless Technology Computing
ijtsrd
 
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
CSCJournals
 
Cs31622627
Cs31622627Cs31622627
Cs31622627
IJERA Editor
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
IJERA Editor
 
Improving the Quality of Service in WiMax Using NS3
Improving the Quality of Service in WiMax Using NS3Improving the Quality of Service in WiMax Using NS3
Improving the Quality of Service in WiMax Using NS3
paperpublications3
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
caijjournal
 
Paper id 2720146
Paper id 2720146Paper id 2720146
Paper id 2720146
IJRAT
 
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSRESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
ijwmn
 
4G Mobile Communications
4G Mobile Communications4G Mobile Communications
4G Mobile Communications
Md. Mashiur Rahman
 
4G technology
4G technology4G technology
4G technology
Atul Kumar
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS ijwmn
 
Wireless Networks
Wireless NetworksWireless Networks
Thesis on Wimax
Thesis on WimaxThesis on Wimax

Similar to A secure and service oriented (20)

A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for flooding
 
WiMAX Features, Characteristics and Application in Wireless Technology Computing
WiMAX Features, Characteristics and Application in Wireless Technology ComputingWiMAX Features, Characteristics and Application in Wireless Technology Computing
WiMAX Features, Characteristics and Application in Wireless Technology Computing
 
IEEE802.16-Anoverview
IEEE802.16-AnoverviewIEEE802.16-Anoverview
IEEE802.16-Anoverview
 
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
 
Cs31622627
Cs31622627Cs31622627
Cs31622627
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
 
Improving the Quality of Service in WiMax Using NS3
Improving the Quality of Service in WiMax Using NS3Improving the Quality of Service in WiMax Using NS3
Improving the Quality of Service in WiMax Using NS3
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
WiMax Technology
WiMax TechnologyWiMax Technology
WiMax Technology
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
Paper id 2720146
Paper id 2720146Paper id 2720146
Paper id 2720146
 
27 122-1-pb
27 122-1-pb27 122-1-pb
27 122-1-pb
 
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSRESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
 
4G Mobile Communications
4G Mobile Communications4G Mobile Communications
4G Mobile Communications
 
4G technology
4G technology4G technology
4G technology
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
Thesis on Wimax
Thesis on WimaxThesis on Wimax
Thesis on Wimax
 
Wi max
Wi  maxWi  max
Wi max
 

Recently uploaded

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

A secure and service oriented

  • 1. A Secure and Service Oriented Network Control Framework for WiMAX Networks Khumanthem Jayanta Singh (110948008)
  • 2. TABLE OF CONTENT 1) ABSTRACT 2) INTRODUCTION 3) LITERATURE SURVEY 4) PROBLEM STATEMENT 5) APPLICATION SCENARIOS 7) A SECURE AND SERVICE-ORIENTED NETWORK CONTROL FRAMEWORK 8) FUTURE WORKS 9) CONCLUSION
  • 3. Abstract WiMAX, Worldwide Interoperability for Microwave Access, is an emerging wireless communication system that can provide broadband access with large-scale coverage. In this article we propose a secure and service-oriented network control framework for WiMAX net-works. In the design of this framework we consider both the security requirements of the communications and the requirements of potential WiMAX applications that have not been fully addressed previously in the network layer design. The proposed framework consists of two basic components: a service- aware control frame-work and a unified routing scheme. Besides the design of the framework, we further study a number of key enabling technologies that are important to a practical WiMAX network. Our study can provide a guideline for the design of a more secure and practical WiMAX network. INTRODUCTION WiMAX (Worldwide Interoperability for Microwave Access) is an emerging wireless communication system that is expected to provide high data rate communications in metropolitan area networks (MANs) [1]. In the past few years, the IEEE 802.16 working group has developed a number of standards for WiMAX. The first standard was published in 2001, which aims to support the communications in the 1066 GHz frequency band. In 2003 IEEE 802.16a was introduced to provide additional physical layer specifications for the 211 GHz frequency band. These two standards were further revised in 2004 (IEEE 802.16-2004).
  • 4. Recently, IEEE 802.16e has also been approved as the official standard for mobile applications. In the physical (PHY) layer, IEEE 802.16 supports four PHY specifications for the licensed bands. These four specifications are Wireless-MAN-SC (single carrier), -SCa, -OFDM (orthogonal frequency-division multiplexing), and -OFDMA (orthogonal frequency- division multiple access).To support multiple subscribers, IEEE 802.16 supports both time-division duplex (TDD) and frequency- division duplex (FDD) operations. OFDM uses multiple sub-carriers but the subcarriers are closely spaced to each other without causing interference, removing guard bands between adjacent subcarriers. This is possible because the frequencies (sub-carriers) are orthogonal; meaning the peak of one sub-carrier coincides with the null of an adjacent subcarrier. In an OFDM system, a very high rate data stream is divided into multiple parallel low rate data streams. Each smaller data stream is then mapped to individual data sub-carrier and modulated using some Sorts of PSK (Phase Shift Keying) or QAM (Quadrature Amplitude Modulation) OFDMA employs multiple closely spaced subcarriers, but the sub-carriers are divided into groups of sub-carriers. Each group is named a sub channel. The sub-carriers that form a sub-channel need not be adjacent. In the downlink, a sub-channel may be intended for different receivers. In the uplink, a transmitter may be assigned one or more sub channels. Sub channelization defines sub-channels that can be allocated to subscriber stations (SSs) depending on their channel conditions and data requirements. Using sub channelization, within the same time slot a Mobile WiMAX Base Station (BS) can allocate more transmit power to user devices (SSs) with lower SNR (Signal-to-Noise Ratio), and less power to user devices with higher SNR. In the medium access control (MAC) layer, IEEE 802.16 supports two modes: point-to-multipoint (PMP) and mesh. The former organizes nodes into a cellular-like structure consisting of a base station (BS) and subscriber stations (SSs). The channels are divided into uplink (from SS to BS) and downlink (from BS to SS), and both uplink and downlink channels are shared among the SSs. PMP mode requires all SSs to be within the transmission range and clear line of sight (LOS) of the BS. On the other hand, in
  • 5. mesh mode an ad hoc network can be formed with all nodes acting as relaying routers in addition to their sender and receiver roles, although there may still be nodes that serve as BSs and provide backhaul connectivity. Literature Survey According to the IEEE 802.16 standard [1], WiMAX technology supports two operation modes: PMP and mesh. A WiMAX PMP net- work aims at providing last-mile access to a broadband Internet service Provider (ISP). An example of the network topology is illustrated in Fig. 1a, where the WiMAX network includes one BS and a number of SSs. On the other hand, mesh mode implies the requirement of supporting multihop ad hoc net-working by SSs. An example of a WiMAX mesh network is illustrated in Fig. 1b. Notice that in this figure, we assume that BS can provide access to the Internet; a relay station (RS) is a special type of SS that can forward traffic flows to BSs or other RSs; and a mobile station (MS)is an SS that can move in the network. The Various Security schema discussed in [2] are WiMAX security supports two quality encryptions standards, that of the DES3 and AES, which is considered leading edge. The standard defines a dedicated security processor on board the base station for starters. There are also minimum encryption requirements for the traffic and for end to end authentication the latter of which is adapted from the data-over-cable service interface specification (DOCSIS) BPI+ security protocol. Basically, all traffic on a WiMAX network must be encrypted using Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) which uses AES for transmission security and data integrity authentication. The end-to-end authentication the PKM-EAP (Extensible Authentication Protocol) methodology is used which relies on the TLS standard of public key encryption. The author in [4] propose a novel routing framework in the network layer, manycast routing. In this scheme the customer does not need to specify the exact address of a server in the network. Instead, it only needs to indicate the service it wants to access.
  • 6. Moreover, in such a communication scenario, the client (i.e., the customer) can communicate with a subset of all the servers in order to achieve better reliability and/or security. In multicasting, if at least one of the members in the group cannot satisfy the service requirement of the application, the multicast request is said to be blocked. On the contrary in many casting, destinations can join or leave the group, depending on whether it satisfies the service requirement or not. Problem statement The main motivation for creating this article i is that we need to take into account both the security concerns and the requirements of potential WiMAX applications. Any other previous Wimax framework does not provide such security concerns and availability of wide range of application for Wimax with heterogeneity of end user devices. APPLICATION SCENARIOS Wimax can be used in the following application area. Internet Access: Evidently, Internet access will still be the major demand in WiMAX net-works, especially when they are newly deployed. To support Internet access, a straightforward method is to provide a unicast connection between SSs (including RSs and MSs) and the BS, which has the link toward the Internet. Group Communications: Since WiMAX net-works can cover a relatively large area, it is natural to imagine that many group communications, such as videoconferences, will be important applications in WiMAX networks. To support such communication scenarios, multicast is the key technology. In a WiMAX network, however, since all nodes are located inside, implementing such group communication becomes possible. Metropolitan Area Distributed Service: With the deployment of WiMAX networks, more and more value-added services can be provided in a metropolitan area. To efficiently support a large number of customers, distributed services can
  • 7. be enabled. In other words, a customer can access the service from any of the servers in the net-work in which these servers are distributed to serve the entire metropolitan area. Content-Based Distribution: The content-based routing scheme is a service-oriented communication model [5]. In this scheme the sender of a message does not need to explicitly specify its destination(s). The network layer will automatically deliver the message to receivers that are interested in the content of the message. In [5] the authors proposed to design an overlay network based on broadcast service of the existing network. Quality Guaranteed Applications: For many applications, it is desirable that the network layer can provide a sufficient quality of service (QoS) guarantee, usually in terms of bandwidth, data rate, delay, and delay jitter. However, wire- less communications are naturally error-prone; thus, it is difficult to provide such a guarantee in a wireless network. To address this issue, in the literature multipath routing has been studied in many previous works. Multihoming Applications: Multihoming [3] is a technology that can provide services similar to those of multipath routing. The main difference between these Figure 1: WiMAX network architectures: a) PMP mode; b) mesh mode.
  • 8. two schemes is that in multi-homing, one station has two or more IP addresses and generally has the same number of interfaces. In this manner, the station can have multiple paths to access the same resources. A SECURE AND SERVICE-ORIENTED NETWORK CONTROL FRAMEWORK In this section we elaborate on a novel control framework to address the security requirements in WiMAX networks, and full the demands of existing and future application scenarios dis-cussed above. Components In this framework there are two major components. Service-Aware Control Scheme To efficiently support different applications, the net-work layer control scheme shall be aware of the availability of different services. In general, the service can be either located in a single node in the network or distributed in multiple locations in the network. To provide these services, the servers must register the type and availability of service to the control frame- work. Moreover, the availability information shall be updated periodically or based on predefined events. Upon receiving these messages, the control framework will also be responsible for distributing such message to nodes in the network. Unified Routing Scheme With the availability information of the service, a unified routing scheme shall be designed such that all the application scenarios discussed in the last section shall be supported. The packets of a certain flow will be forwarded based on the service and security requirements.
  • 9. ENABLING TECHNOLOGIES To deploy the proposed framework, a number of key technologies must be addressed. In the rest of this section we address these issues. Figure 2: The importance of the placement of BSs and RSs: a) a single path; b) multiple paths. PLACEMENT OF BSS AND RSS In our framework, the placement of BSs and RSs is very important for a broadband wireless service provider to offer a secure communication platform. For example, in Fig. 2a, if there is only one path between one MS and a server, it is not possible to guarantee the security of the communication since a single RS in the path can damage
  • 10. the confidentiality and integrity of the information transmission, or block the traffic flow and affect the availability of the service. On the other hand, if there are two or more paths available, secure communication channels are more likely to exist between the MS and the server, as shown in Fig. 2b.One important issue related to the placement of BSs and RSs is the cost. Apparently, with increasing numbers of BSs and RSs of a service provider, security and availability will increase while cost will also soar. In such a case, it becomes a trade- o_ between security and cost. On the other hand, given the constraint of cost, the placement of BSs and RSs can be formulated as an optimization problem, which shall be further investigated. SECURITY MANAGEMENT In the proposed framework the security management scheme is very important to the system. Similar to [3], we consider the security management scheme responsible for monitoring the operation of the network and quickly identifying possible security attacks and threats. KEY MANAGEMENT In addition to the MAC layer, key management is also important to the network layer. To provide a secure communication channel between the end user and the server, it is important to develop a key management scheme to establish a unique key for each session. In such a scenario the proposed framework can be directly utilized to improve the reliability and security of the key distribution. For instance, an MS can send key material through multiple paths to the server. Since each path may contain only a portion of all the information, the probability of the key material being intercepted by an adversary can be significantly reduced.
  • 11. SECURE ROUTING In our scheme the routing algorithm takes into account the following issues. Multiple-radio and multiple-channel: In the near future, each node may be equipped with multiple radio interfaces. Therefore, the routing scheme shall take this into account. Multiple destinations. In our framework, an application can require multiple destinations in the network. For example, there is no requirement for selecting node disjoint paths in these schemes, which may not be sufficient to defend against compromised RS nodes. Multipath routing: As shown in the previous section, the multipath scheme is different from existing methods. First, multipath routing may need to forward messages to different destinations. Second, more paths may need to be set up. Heterogeneity of user devices: In practice, the capabilities of user devices (e.g., data rate) are highly heterogeneous. Several application layer schemes and middleware schemes have been proposed recently. However, it is appropriate for the network layer to consider such differences because the capability information offend users can be utilized to help choose the routing method used. CONCLUSION WiMAX is a promising wireless communication technology for wireless MANs. In this article we address the design issue in multihop WiMAX networks. Specifically, we propose a secure and service- oriented network control framework in which both security concerns and the requirements of potential WiMAX applications are taken into account. In the framework there are two major components: a service- aware control framework and a unified routing scheme. We then demonstrate how these schemes can pro-vide the required service from the network layer perspective. In addition to the design of the framework, we also study several enabling technologies for the framework, including the deployment of BSs and key management, and
  • 12. secure routing. We believe that our study can provide a guideline for the design of a more secure and practical WiMAX network.