Proceedings of the 44th Annual Southeast Regional Conference 2006
DOI: 10.1145/1185448.1185474
|View full text |Cite
|
Sign up to set email alerts
|

Security issues in privacy and key management protocols of IEEE 802.16

Abstract: Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified in the MAC layer to address the privacy issues across the fixed Broadband Wireless Access (BWA). Several articles have been published to address the flaws in IEEE 802.16 security after the IEEE standard 802.16-2001 was released. However, the IEEE standard 802.16-2004 revision does not settle all the discovered problems and additional… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
42
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 72 publications
(42 citation statements)
references
References 3 publications
(7 reference statements)
0
42
0
Order By: Relevance
“…In this section, we will focus on the security threats that apply to WiMAX networks [Andrews et al 2007;Barbeau 2005;Naseer et al 2008;Xu et al 2006]. These security threats can be divided into two categories: PHY layer threats and MAC layer threats.…”
Section: A13 Further Discussion On Wimax Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we will focus on the security threats that apply to WiMAX networks [Andrews et al 2007;Barbeau 2005;Naseer et al 2008;Xu et al 2006]. These security threats can be divided into two categories: PHY layer threats and MAC layer threats.…”
Section: A13 Further Discussion On Wimax Securitymentioning
confidence: 99%
“…Unfortunately, when WiMAX network operators choose not to use EAP-based mutual authentication, the subscriber stations are vulnerable to MITM attacks of various kinds [Barbeau 2005;Naseer et al 2008;Xu et al 2006]. Without mutual authentication, the base station will be able to verify the subscriber identity, yet the subscriber has to trust that the base station is authentic.…”
Section: Mac Layer Threatsmentioning
confidence: 99%
“…2 given below describes the initial network entry procedure. A mobile station which is just powered on must perform initial network entry process [5]. The steps for initial network entry process are given below: Step 1: When it is powered on, it firsts scans the downlink channel to determine whether it is currently in the coverage of base station.…”
Section: Wimax Network Entry Processmentioning
confidence: 99%
“…After establishing a shared secret (the AK) between the MS and the BS, PKMv2 uses it to secure subsequent exchanges of TEKs between the two parties. Several issues of Key management are listed in [5].…”
Section: B Privacy Key Management Versionmentioning
confidence: 99%
“…WiMAX equipment's are cheap and the WiMAX Forum is working to build cost effective and enhanced performance network with an upgrade for the growing demand of broadband services which is named WiMAX 2 and based on IEEE 802.16m standard [5]. WiMAX is frequently focused on two most important areas of concern namely location management and handover management [4].…”
Section: Introductionmentioning
confidence: 99%