[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2523514.2523586acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
tutorial

Addressing security challenges in WiMAX environment

Published: 26 November 2013 Publication History

Abstract

The primary motivation for this research is to focus on issues of WiMAX security problems and analyzes of vulnerabilities on IEEE 802.16, which is a new and promised topic in telecommunication and wireless networks. Mobile WiMAX system based on the IEEE 802.16e-2005 amendment has more improved security features than previous IEEE 802.16d-based WiMAX network system. WiMAX authentication is achieved by using public key interchange protocol privacy key management and it is supported by RSA cryptography exchange and RSA based authentication applies X.509 certificate together with RSA encryption. In this tutorial we identify potential security requirements for future WiMAX environment and propose promising security technologies to address these requirements through the integration of specific security algorithms into WiMAX environment to enhance security. We expect this call for interest to motivate planning for evolution of 802.16e against security challenges.

References

[1]
IEEE, IEEE Std 802.16-2004, IEEE standard for WiMAX 802.16-2004, published 1st October 2004, http://ieeexplore.ieee.org/iel5/9349/29691/01350465.pdf?tp=&arnumber=1350465&isnumber=29691
[2]
IEEE, IEEE Std 802.16e-2005 and IEEE Std 802.16-2004/Cor 1-2005 (Amendment and Corrigendum to IEEE Std 802.16-2004), IEEE standard for 802.16e-2005, published 28th February 2006, http://ieeexplore.ieee.org/iel5/10676/33683/01603394.pdf?tp=&arnumber=1603394&isnumber=33683
[3]
Jamshed Hasan, Security Issues of IEEE 802.16 (WiMAX), School of Computer and Information Science, Edith Cowan University, Australia, 2006.
[4]
IEEE standards regarding the 802.16 technology, http://ieeexplore.ieee.org/xpl/standards.jsp?findtitle=802.16&letter=802.16&imageField.x=0&imageField.y=0&opentree=on.
[5]
Ram Dantu, Gabriel Clothier, Anuj Atri, EAP methods for wireless networks, Computer Standards & Interfaces 29 (2007) 289--301.
[6]
Arkoudi-Vafea Aikaterini, Security of IEEE 802.16, Royal Institute of Technology 2006 http://people.dsv.su.se/~x04-aia/Final%20Document.pdf
[7]
Housley, et. al., RFC 3280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, The Internet Society, April 2002, http://tools.ietf.org/html/rfc3280
[8]
Fuqiang Liu, Lei Lu, A WPKI-based Security Mechanism for IEEE 802.16e, IEEE Communications Society, Wuhan University, China 2006
[9]
Yi Yang; Rui Li. 2009. Toward WiMAX Security. International Conference on Computational Intelligence and Software Engineering, 1--5.
[10]
Hasan S. S., Qadeer M. A. 2005. Security Concerns in WiMAX. First Asian Himalayas International Conference on Internet.
[11]
Lang Wei-min; Zhong Jing-li; Li Jian-jun; Qi Xiang-yu. 2008. Research on the Authentication Scheme of WiMAX. 4th International Conference on Wireless Communications, Networking and Mobile Computing, 1--4.
[12]
Fuqiang Liu, Lei Lu, A WPKI-based Security Mechanism for IEEE 802.16e, IEEE Communications Society, Wuhan University, China 2006

Cited By

View all
  • (2016)Deployment of Hash Function to Enhance Message Integrity in Wireless Body Area Network (WBAN)International Journal of Communications, Network and System Sciences10.4236/ijcns.2016.91204709:12(613-621)Online publication date: 2016
  • (2016)Extension of Kerberos with X.509 and Integration of Elliptic Curve Cryptography in AuthenticationInternational Journal of Communications, Network and System Sciences10.4236/ijcns.2016.91204609:12(603-612)Online publication date: 2016
  • (2015)Reactive Data Security Approach and Review of Data Security Techniques in Wireless NetworksInternational Journal of Communications, Network and System Sciences10.4236/ijcns.2015.81305108:13(567-577)Online publication date: 2015
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
November 2013
483 pages
ISBN:9781450324984
DOI:10.1145/2523514
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

  • Macquarie U., Austarlia
  • MNIT: Malaviya National Institute of Technology
  • Aksaray Univ.: Aksaray University
  • SFedU: Southern Federal University

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 November 2013

Check for updates

Author Tags

  1. 802.16
  2. WiMAX
  3. cryptography
  4. wireless networks

Qualifiers

  • Tutorial

Conference

SIN '13
Sponsor:
  • MNIT
  • Aksaray Univ.
  • SFedU

Acceptance Rates

Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Deployment of Hash Function to Enhance Message Integrity in Wireless Body Area Network (WBAN)International Journal of Communications, Network and System Sciences10.4236/ijcns.2016.91204709:12(613-621)Online publication date: 2016
  • (2016)Extension of Kerberos with X.509 and Integration of Elliptic Curve Cryptography in AuthenticationInternational Journal of Communications, Network and System Sciences10.4236/ijcns.2016.91204609:12(603-612)Online publication date: 2016
  • (2015)Reactive Data Security Approach and Review of Data Security Techniques in Wireless NetworksInternational Journal of Communications, Network and System Sciences10.4236/ijcns.2015.81305108:13(567-577)Online publication date: 2015
  • (2015)Review of the Security Issues in Vehicular Ad Hoc Networks (VANET)International Journal of Communications, Network and System Sciences10.4236/ijcns.2015.81305008:13(552-566)Online publication date: 2015
  • (2015)Dissemination of Information Communication Technologies: Mobile Government Practices in Developing StatesInternational Journal of Communications, Network and System Sciences10.4236/ijcns.2015.81304908:13(543-551)Online publication date: 2015
  • (2015)Collision Avoidance in Mobile Wireless Ad-Hoc Networks with Enhanced MACAW Protocol SuiteInternational Journal of Communications, Network and System Sciences10.4236/ijcns.2015.81304808:13(533-542)Online publication date: 2015
  • (2015)Security and Optimization Challenges of Green Data CentersInternational Journal of Communications, Network and System Sciences10.4236/ijcns.2015.81204408:12(492-500)Online publication date: 2015
  • (2015)Comparative Analysis of Wireless Security Protocols: WEP vs WPAInternational Journal of Communications, Network and System Sciences10.4236/ijcns.2015.81204308:12(483-491)Online publication date: 2015
  • (2015)Fault Tolerance Mechanisms in Distributed SystemsInternational Journal of Communications, Network and System Sciences10.4236/ijcns.2015.81204208:12(471-482)Online publication date: 2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media