SlideShare a Scribd company logo
1 of 21
Wimax Security
1
Presented By : Esmaeil Zarrinfar
zarrinfar@gmail.com
 What is Wimax?
 Wireless Network Standard
 Wimax History
 Wimax Architecture
 Wimax Security Architecture
 Security Sub Layer
 Security Mechanisms
 Wimax Security Issue
 Reference
Topic
2
Wireless
PAN
IEEE 802.15
Bluetooth
&
ZigBee
Wireless
Lan
IEEE 802.11
Wi-Fi
(Wireless Fidelity)
Wireless
MAN
IEEE 802.16
Wimax
( WorldWide
Interoperability For
Microwave Access )
Wireless Network Standard
‫بيسيم‬‫ات‬‫ز‬‫تجهي‬‫دهاي‬‫ر‬‫استاندا‬
3
 Also known Low Rate Wireless PAN
 Properties:
• Data Rate Maximum 250 Kbps
• Range 10 to 100 Meters
• Low Cost
• Low power consumption
• Frequency 2.4 GHz
• ZigBee Next Generation Of Bluetooth
4
Wireless PAN
 Also known WLAN or WiFi
 Properties:
• 802.11 Protocol kind : a,b,g,n,ac,ad,af,ah
• Data Rate Maximum 6.75 Gbps in 802.11ad
• Range indoor from 20 to 60 meters
• Range outdoor from 100 to 1000 meters
• High Cost
• Frequency 2.4 , 3.6 , 5 ,60 GHz
5
Wireless LAN
Wimax Standard History
 IEEE 802.16 (2001)
 Frequency 10 – 66 GHZ (Line-of-Sight)
 Base Wimax
 IEEE 802.16d (July 2004)
 Fixed Wimax
 Data Rate 70 Mbps
 IEEE 802.16e (2005)
 Mobile Wimax
 Data Rate 15 Mbps
 IEEE 802.16m (2011 )
 Also known as Wimax Release 2 or WirelessMAN-Advanced
 Mobile & Fix Wimax
 Data Rate 100 Mbps for Mobile and 1 Gbps for Fix
6
 Providing portable mobile broadband connectivity
across cities and countries through a variety of devices.
 Providing a wireless alternative to cable and Digital
Subscriber Line (DSL) for far broadband access.
 Providing data, telecommunications (VoIP) and
IPTV services Providing
 a source of Internet connectivity as part of a business
continuity plan.
7
Wimax Uses
‫وايمکس‬ ‫بردهاي‬‫ر‬‫کا‬
Wimax Architecture
 WiMax can provide two forms of wireless service: none-line-of-sight
and line-of-sight.
 WiMax system includes two main parts WiMax receiver and WiMax
tower.
 Wimax Receiver : Subscriber Station (SS) // ‫مشترک‬‫ايستگاه‬
 Wimax Tower : Base Station (BS) // ‫پايه‬ ‫ايستگاه‬8
 Two main layers: Medium Access Control (MAC) layer and Physical
layer (PHY).
 SAPs (Service Access Point) are interfacing points.
 Mac layer have three Sub Layer : Convergence , Common Part ,
Security ( Privacy )
Wimax Architecture
‫پروتکل‬ ‫ي‬‫معمار‬ ‫در‬ ‫موجود‬‫اليه‬ ‫دو‬‫به‬‫ابطه‬‫ر‬ ‫در‬‫توضيحات‬WiMAX
9
 Convergence Sub-layer (CS) maps higher level data services to MAC
layer service flows and connections.
 There are two type of CS :
 ATM CS which is designed for ATM network and service.
 Packet CS which supports Ethernet, point-to-point protocol (PPP), both IPv4 and
IPv6 internet protocols, and virtual local area network (VLAN).
 Common Part Sub-layer (CPS) defines the rules and mechanisms for
system access, bandwidth allocation and connection management,
uplink scheduling, bandwidth request and grant, connection control and
automatic repeat request (ARQ)
 Security Sub-layer lies between MAC CPS and PHY layer. This sub-layer is
responsible for encryption and decryption of data traveling to and from
the PHY layer, and it is also used for authentication and secure key
exchange.
Wimax Architecture
‫اليه‬ ‫در‬ ‫موجود‬‫يراليه‬‫ز‬ ‫سه‬‫به‬‫ابطه‬‫ر‬ ‫در‬‫توضيحات‬MAC‫پروتکل‬ ‫ي‬‫معمار‬WiMAX
10
 BS : Base Station
 SS : Sub Scriber Station
 X.509 : Digital certificate serving
 AK : Authorization Key
 SAID : Security Association ID
 TEK : Transport Encryption Key
 KEK : Key Encryption Keys
 HMAC : Hashed Message Authentication
Code
 AAA : Authentication , Authorization ,
Accounting
Terms
X.509
Certificate
11
 Three main features of security are:
 Authentication
 Authorization
 Traffic Encryption
 Authentication Technique:
 Privacy & Key Management Protocols (PKM)
 Rivest-Shamir-Adleman (RSA)
 Extensible Authentication Protocol (EAP)
 Authorization Technique:
 Security Associations (SA’s) are used to authorize user.
 Authorization include request for Authentication Key and SA-
Identity in exchange for subscriber’s certificate, encryption
algorithm and cryptographic ID.
 Traffic Encryption Technique:
 All the traffic between Subscriber Station (SS) and Base Station
(BS) is encrypted with Traffic Encryption Key.
Wimax Security Architecture
12
Wimax Security Steps
Step 1: Authentication And Authorization
Base Station (BS)
SubScriber Station (SS)
Message1: ( X.509 Manufacturer Certificate)
Message2: ( X.509 Certificate , Security Capabilities , SAID)
Message3: (Authorization SA ,AK )
‫تباط‬‫ر‬‫ا‬ ‫ل‬‫او‬ ‫گام‬:‫پايه‬‫ايستگاه‬‫به‬‫مشترک‬‫ايستگاه‬‫از‬ ‫تباط‬‫ر‬‫ا‬ ‫خواست‬‫ر‬‫د‬
13
Wimax Security Steps
Step 2: Key Exchange
Base Station (BS)
SubScriber Station (SS)
Message1: (SAID, HMAC (1))
Message2: (SAID, HMAC (2))
Message3: (SAID, OldTEK, NewTEK, HMAC (3))
‫تباط‬‫ر‬‫ا‬ ‫دوم‬ ‫گام‬:‫پايه‬‫ايستگاه‬ ‫و‬‫مشترک‬‫ايستگاه‬‫مابين‬‫کليد‬ ‫تبادل‬
AAA Server
14
Wimax Security Steps
Step 3: Traffic Encryption
Base Station (BS) SubScriber Station (SS)
Data Encrypted With TEK
Data Encrypted With TEK
 Data stream is encrypted with the TEK when travelling to or from BS.
 The data stream can be encrypted using:
 DES
 AES
 TEK is shared during Key Exchange process and is encrypted using KEK. It can be encrypted using:
 3 DES
 RSA
 AES
‫تباط‬‫ر‬‫ا‬ ‫سوم‬ ‫گام‬:‫ي‬‫مزگذار‬‫ر‬‫از‬ ‫استفاده‬‫با‬‫ايستگاه‬ ‫دو‬ ‫بين‬ ‫داده‬ ‫تبادل‬TEK
15
 WiMax/802.16 is vulnerable to physical layer attacks
such as jamming and scrambling.
 Jamming is reducing the channel capacity.
 Scrambling is a sort of jamming, but for short
intervals of time and targeted to specific frames or
parts of frames.
 Intercept the radio signals in air.
Wimax Security Issue
In PHY Layer
‫وايمکس‬ ‫امنيتي‬ ‫مشکالت‬:‫فيزيکي‬ ‫اليه‬ ‫در‬
(1‫دائمي‬‫يت‬‫ز‬‫ا‬‫ر‬‫پا‬ ‫سال‬‫ر‬‫ا‬
(2‫موقت‬‫يت‬‫ز‬‫ا‬‫ر‬‫پا‬ ‫سال‬‫ر‬‫ا‬
(3‫سيگنال‬ ‫قطع‬
16
 The attacker will be attack the link during authentication or
key exchange process.
Wimax Security Issue
In MAC Layer
Base Station (BS) SubScriber Station (SS)
MAN-IN-Middle
Original Connection
New Connection
17
 Authentication of the SS (Man-in-the-Middle and Forgery)
 SS authenticates itself through its certificate, however, the BS does
not .
 Rogue BS could place himself between SS and real BS and try to force
SS to authenticate itself and initiate a session by transferring an AK
(forgery attack).
 The attacker can generate his own Authorization Reply Message
containing a self-generated AK and thus gain control over the
communication of the attacked SS.
Wimax Security Issue
In MAC Layer
‫هويت‬‫از‬‫ر‬‫اح‬ ‫هنگام‬ ‫در‬‫وايمکس‬ ‫در‬‫امنيتي‬‫مشکالت‬
18
 Key Exchange Phase-Attacks
 Attacker can act as a false BS for subscriber and issue self
generated keys to take over communication
 Attacker can act as false subscriber to request to renew the keys
again.
Wimax Security Issue
In MAC Layer
‫کليد‬ ‫تبادل‬ ‫هنگام‬ ‫در‬‫وايمکس‬ ‫در‬‫امنيتي‬‫مشکالت‬
19
 Replay and DoS Attack against SS
 The SS send Authentication Information Messages to transmit all
relevant information to the BS.
 The BS responds to the last message with an Authorization Reply
Message.
 The BS can fall victim to a replay attack by which the attacker
intercepts an Authorization Request Message from an authorized SS
and stores it.
 He will not be able to derive the AK from the Authorization Response
Message (since he does not possess the associated private key), he can
repeatedly send the message to the BS, burdening the BS with the
effect that this declines the real/authentic SS. This is a Denial-of-
Service-Attack against the SS.
Wimax Security Issue
‫سرويس‬‫انکار‬ ‫حمالت‬ ‫نوع‬ ‫در‬‫وايمکس‬ ‫در‬‫امنيتي‬‫مشکالت‬20
 Tao Han, Ning Zhang, Kaiming Liu, Bihua Tang, and Yuan'an Liu. Analysis of mobile wimax security:
Vulnerabilities and solutions. 5th IEEE International Conference on Mobile Adhoc and Sensor Systems, Sep
2008.
 Evren Eren, "WiMAX Security Architecture - Analysis and Assessment" IEEE International Workshop on
Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications Dortmund,
Germany 6-8 September 2007.
 Mahmoud Nasreldin, Heba Aslan, Magdy El-Hennawy, Adel El-Hennaey, "WiMAX Security", Proceedings of
the 22nd International Conference on Advanced Information Networking and Applications, pp. 1335-1340,
2008.
Reference
21

More Related Content

What's hot

wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkA. Shamel
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitecturePeriyanayagiS
 
Evolution of Core Networks
Evolution of Core NetworksEvolution of Core Networks
Evolution of Core NetworksSarp Köksal
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile ComputingKABILESH RAMAR
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networksArunChokkalingam
 
Gsm system and radio frequency
Gsm system and radio frequency Gsm system and radio frequency
Gsm system and radio frequency Maulik Patel
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manetflowerjaan
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 

What's hot (20)

wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
WLAN
WLANWLAN
WLAN
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
Evolution of Core Networks
Evolution of Core NetworksEvolution of Core Networks
Evolution of Core Networks
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
SS7
SS7SS7
SS7
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile Computing
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Ngn
NgnNgn
Ngn
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 
It2402 mobile communication unit2
It2402 mobile communication unit2It2402 mobile communication unit2
It2402 mobile communication unit2
 
Gsm system and radio frequency
Gsm system and radio frequency Gsm system and radio frequency
Gsm system and radio frequency
 
It2402 mobile communication unit1
It2402 mobile communication unit1It2402 mobile communication unit1
It2402 mobile communication unit1
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 

Viewers also liked

Viewers also liked (14)

WiMAX Network Security
WiMAX Network SecurityWiMAX Network Security
WiMAX Network Security
 
160712 canonlifesci
160712 canonlifesci160712 canonlifesci
160712 canonlifesci
 
Linkdinwimax
LinkdinwimaxLinkdinwimax
Linkdinwimax
 
Wimax 4
Wimax 4Wimax 4
Wimax 4
 
Wi max
Wi maxWi max
Wi max
 
Wimax 802.16d
Wimax 802.16dWimax 802.16d
Wimax 802.16d
 
Gi fi technology
Gi fi technologyGi fi technology
Gi fi technology
 
Master peluqueria estetica
Master peluqueria esteticaMaster peluqueria estetica
Master peluqueria estetica
 
Wi MAX Technology
Wi MAX TechnologyWi MAX Technology
Wi MAX Technology
 
Wi max by pankaj jangid
Wi max by pankaj jangidWi max by pankaj jangid
Wi max by pankaj jangid
 
Wimax
WimaxWimax
Wimax
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
 
Wi max
Wi maxWi max
Wi max
 
Wi-max Technology PPT
Wi-max Technology PPTWi-max Technology PPT
Wi-max Technology PPT
 

Similar to Wimax security

SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXSECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXIJNSA Journal
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
A Review on security issues in WiMAX
A Review on security issues in WiMAXA Review on security issues in WiMAX
A Review on security issues in WiMAXEditor IJMTER
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxAmanuelZewdie4
 
Mutual authentication between base and subscriber station can improve the sec...
Mutual authentication between base and subscriber station can improve the sec...Mutual authentication between base and subscriber station can improve the sec...
Mutual authentication between base and subscriber station can improve the sec...CSCJournals
 
Analysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdfAnalysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdfPerumalraja Rengaraju
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
 
OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOL
OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOLOVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOL
OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOLZachariah Pabi
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDilum Bandara
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
4 wifi security
4 wifi security4 wifi security
4 wifi securityal-sari7
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALASaikiran Panjala
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN HackingJohn Rhoton
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008ClubHack
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 

Similar to Wimax security (20)

SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXSECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
A Review on security issues in WiMAX
A Review on security issues in WiMAXA Review on security issues in WiMAX
A Review on security issues in WiMAX
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
Mutual authentication between base and subscriber station can improve the sec...
Mutual authentication between base and subscriber station can improve the sec...Mutual authentication between base and subscriber station can improve the sec...
Mutual authentication between base and subscriber station can improve the sec...
 
Analysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdfAnalysis on Mobile WiMAX Security.pdf
Analysis on Mobile WiMAX Security.pdf
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOL
OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOLOVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOL
OVERVIEW OF PKM AUTHENTICATION MECHANISM IN WiMAX SECURITY PROTOCOL
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Comprehensive Guide On Network Security
Comprehensive Guide On Network SecurityComprehensive Guide On Network Security
Comprehensive Guide On Network Security
 
Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN Hacking
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 

Recently uploaded

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 

Recently uploaded (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Wimax security

  • 1. Wimax Security 1 Presented By : Esmaeil Zarrinfar zarrinfar@gmail.com
  • 2.  What is Wimax?  Wireless Network Standard  Wimax History  Wimax Architecture  Wimax Security Architecture  Security Sub Layer  Security Mechanisms  Wimax Security Issue  Reference Topic 2
  • 3. Wireless PAN IEEE 802.15 Bluetooth & ZigBee Wireless Lan IEEE 802.11 Wi-Fi (Wireless Fidelity) Wireless MAN IEEE 802.16 Wimax ( WorldWide Interoperability For Microwave Access ) Wireless Network Standard ‫بيسيم‬‫ات‬‫ز‬‫تجهي‬‫دهاي‬‫ر‬‫استاندا‬ 3
  • 4.  Also known Low Rate Wireless PAN  Properties: • Data Rate Maximum 250 Kbps • Range 10 to 100 Meters • Low Cost • Low power consumption • Frequency 2.4 GHz • ZigBee Next Generation Of Bluetooth 4 Wireless PAN
  • 5.  Also known WLAN or WiFi  Properties: • 802.11 Protocol kind : a,b,g,n,ac,ad,af,ah • Data Rate Maximum 6.75 Gbps in 802.11ad • Range indoor from 20 to 60 meters • Range outdoor from 100 to 1000 meters • High Cost • Frequency 2.4 , 3.6 , 5 ,60 GHz 5 Wireless LAN
  • 6. Wimax Standard History  IEEE 802.16 (2001)  Frequency 10 – 66 GHZ (Line-of-Sight)  Base Wimax  IEEE 802.16d (July 2004)  Fixed Wimax  Data Rate 70 Mbps  IEEE 802.16e (2005)  Mobile Wimax  Data Rate 15 Mbps  IEEE 802.16m (2011 )  Also known as Wimax Release 2 or WirelessMAN-Advanced  Mobile & Fix Wimax  Data Rate 100 Mbps for Mobile and 1 Gbps for Fix 6
  • 7.  Providing portable mobile broadband connectivity across cities and countries through a variety of devices.  Providing a wireless alternative to cable and Digital Subscriber Line (DSL) for far broadband access.  Providing data, telecommunications (VoIP) and IPTV services Providing  a source of Internet connectivity as part of a business continuity plan. 7 Wimax Uses ‫وايمکس‬ ‫بردهاي‬‫ر‬‫کا‬
  • 8. Wimax Architecture  WiMax can provide two forms of wireless service: none-line-of-sight and line-of-sight.  WiMax system includes two main parts WiMax receiver and WiMax tower.  Wimax Receiver : Subscriber Station (SS) // ‫مشترک‬‫ايستگاه‬  Wimax Tower : Base Station (BS) // ‫پايه‬ ‫ايستگاه‬8
  • 9.  Two main layers: Medium Access Control (MAC) layer and Physical layer (PHY).  SAPs (Service Access Point) are interfacing points.  Mac layer have three Sub Layer : Convergence , Common Part , Security ( Privacy ) Wimax Architecture ‫پروتکل‬ ‫ي‬‫معمار‬ ‫در‬ ‫موجود‬‫اليه‬ ‫دو‬‫به‬‫ابطه‬‫ر‬ ‫در‬‫توضيحات‬WiMAX 9
  • 10.  Convergence Sub-layer (CS) maps higher level data services to MAC layer service flows and connections.  There are two type of CS :  ATM CS which is designed for ATM network and service.  Packet CS which supports Ethernet, point-to-point protocol (PPP), both IPv4 and IPv6 internet protocols, and virtual local area network (VLAN).  Common Part Sub-layer (CPS) defines the rules and mechanisms for system access, bandwidth allocation and connection management, uplink scheduling, bandwidth request and grant, connection control and automatic repeat request (ARQ)  Security Sub-layer lies between MAC CPS and PHY layer. This sub-layer is responsible for encryption and decryption of data traveling to and from the PHY layer, and it is also used for authentication and secure key exchange. Wimax Architecture ‫اليه‬ ‫در‬ ‫موجود‬‫يراليه‬‫ز‬ ‫سه‬‫به‬‫ابطه‬‫ر‬ ‫در‬‫توضيحات‬MAC‫پروتکل‬ ‫ي‬‫معمار‬WiMAX 10
  • 11.  BS : Base Station  SS : Sub Scriber Station  X.509 : Digital certificate serving  AK : Authorization Key  SAID : Security Association ID  TEK : Transport Encryption Key  KEK : Key Encryption Keys  HMAC : Hashed Message Authentication Code  AAA : Authentication , Authorization , Accounting Terms X.509 Certificate 11
  • 12.  Three main features of security are:  Authentication  Authorization  Traffic Encryption  Authentication Technique:  Privacy & Key Management Protocols (PKM)  Rivest-Shamir-Adleman (RSA)  Extensible Authentication Protocol (EAP)  Authorization Technique:  Security Associations (SA’s) are used to authorize user.  Authorization include request for Authentication Key and SA- Identity in exchange for subscriber’s certificate, encryption algorithm and cryptographic ID.  Traffic Encryption Technique:  All the traffic between Subscriber Station (SS) and Base Station (BS) is encrypted with Traffic Encryption Key. Wimax Security Architecture 12
  • 13. Wimax Security Steps Step 1: Authentication And Authorization Base Station (BS) SubScriber Station (SS) Message1: ( X.509 Manufacturer Certificate) Message2: ( X.509 Certificate , Security Capabilities , SAID) Message3: (Authorization SA ,AK ) ‫تباط‬‫ر‬‫ا‬ ‫ل‬‫او‬ ‫گام‬:‫پايه‬‫ايستگاه‬‫به‬‫مشترک‬‫ايستگاه‬‫از‬ ‫تباط‬‫ر‬‫ا‬ ‫خواست‬‫ر‬‫د‬ 13
  • 14. Wimax Security Steps Step 2: Key Exchange Base Station (BS) SubScriber Station (SS) Message1: (SAID, HMAC (1)) Message2: (SAID, HMAC (2)) Message3: (SAID, OldTEK, NewTEK, HMAC (3)) ‫تباط‬‫ر‬‫ا‬ ‫دوم‬ ‫گام‬:‫پايه‬‫ايستگاه‬ ‫و‬‫مشترک‬‫ايستگاه‬‫مابين‬‫کليد‬ ‫تبادل‬ AAA Server 14
  • 15. Wimax Security Steps Step 3: Traffic Encryption Base Station (BS) SubScriber Station (SS) Data Encrypted With TEK Data Encrypted With TEK  Data stream is encrypted with the TEK when travelling to or from BS.  The data stream can be encrypted using:  DES  AES  TEK is shared during Key Exchange process and is encrypted using KEK. It can be encrypted using:  3 DES  RSA  AES ‫تباط‬‫ر‬‫ا‬ ‫سوم‬ ‫گام‬:‫ي‬‫مزگذار‬‫ر‬‫از‬ ‫استفاده‬‫با‬‫ايستگاه‬ ‫دو‬ ‫بين‬ ‫داده‬ ‫تبادل‬TEK 15
  • 16.  WiMax/802.16 is vulnerable to physical layer attacks such as jamming and scrambling.  Jamming is reducing the channel capacity.  Scrambling is a sort of jamming, but for short intervals of time and targeted to specific frames or parts of frames.  Intercept the radio signals in air. Wimax Security Issue In PHY Layer ‫وايمکس‬ ‫امنيتي‬ ‫مشکالت‬:‫فيزيکي‬ ‫اليه‬ ‫در‬ (1‫دائمي‬‫يت‬‫ز‬‫ا‬‫ر‬‫پا‬ ‫سال‬‫ر‬‫ا‬ (2‫موقت‬‫يت‬‫ز‬‫ا‬‫ر‬‫پا‬ ‫سال‬‫ر‬‫ا‬ (3‫سيگنال‬ ‫قطع‬ 16
  • 17.  The attacker will be attack the link during authentication or key exchange process. Wimax Security Issue In MAC Layer Base Station (BS) SubScriber Station (SS) MAN-IN-Middle Original Connection New Connection 17
  • 18.  Authentication of the SS (Man-in-the-Middle and Forgery)  SS authenticates itself through its certificate, however, the BS does not .  Rogue BS could place himself between SS and real BS and try to force SS to authenticate itself and initiate a session by transferring an AK (forgery attack).  The attacker can generate his own Authorization Reply Message containing a self-generated AK and thus gain control over the communication of the attacked SS. Wimax Security Issue In MAC Layer ‫هويت‬‫از‬‫ر‬‫اح‬ ‫هنگام‬ ‫در‬‫وايمکس‬ ‫در‬‫امنيتي‬‫مشکالت‬ 18
  • 19.  Key Exchange Phase-Attacks  Attacker can act as a false BS for subscriber and issue self generated keys to take over communication  Attacker can act as false subscriber to request to renew the keys again. Wimax Security Issue In MAC Layer ‫کليد‬ ‫تبادل‬ ‫هنگام‬ ‫در‬‫وايمکس‬ ‫در‬‫امنيتي‬‫مشکالت‬ 19
  • 20.  Replay and DoS Attack against SS  The SS send Authentication Information Messages to transmit all relevant information to the BS.  The BS responds to the last message with an Authorization Reply Message.  The BS can fall victim to a replay attack by which the attacker intercepts an Authorization Request Message from an authorized SS and stores it.  He will not be able to derive the AK from the Authorization Response Message (since he does not possess the associated private key), he can repeatedly send the message to the BS, burdening the BS with the effect that this declines the real/authentic SS. This is a Denial-of- Service-Attack against the SS. Wimax Security Issue ‫سرويس‬‫انکار‬ ‫حمالت‬ ‫نوع‬ ‫در‬‫وايمکس‬ ‫در‬‫امنيتي‬‫مشکالت‬20
  • 21.  Tao Han, Ning Zhang, Kaiming Liu, Bihua Tang, and Yuan'an Liu. Analysis of mobile wimax security: Vulnerabilities and solutions. 5th IEEE International Conference on Mobile Adhoc and Sensor Systems, Sep 2008.  Evren Eren, "WiMAX Security Architecture - Analysis and Assessment" IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications Dortmund, Germany 6-8 September 2007.  Mahmoud Nasreldin, Heba Aslan, Magdy El-Hennawy, Adel El-Hennaey, "WiMAX Security", Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, pp. 1335-1340, 2008. Reference 21