2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed 2008
DOI: 10.1109/snpd.2008.104
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
1

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(31 citation statements)
references
References 4 publications
0
30
1
Order By: Relevance
“…This is different from previous work and attacks analyzed by [2], [4], [6], [11] due to the inconspicuous nature of such an attack. In this scenario, attackers act as client subscribers and ignore parameter values they are assigned by choosing values that degrade the QoS of other SS's.…”
Section: Experimental Design 31 Problem Definitioncontrasting
confidence: 96%
“…This is different from previous work and attacks analyzed by [2], [4], [6], [11] due to the inconspicuous nature of such an attack. In this scenario, attackers act as client subscribers and ignore parameter values they are assigned by choosing values that degrade the QoS of other SS's.…”
Section: Experimental Design 31 Problem Definitioncontrasting
confidence: 96%
“…In this section, we will focus on the security threats that apply to WiMAX networks [Andrews et al 2007;Barbeau 2005;Naseer et al 2008;Xu et al 2006]. These security threats can be divided into two categories: PHY layer threats and MAC layer threats.…”
Section: A13 Further Discussion On Wimax Securitymentioning
confidence: 99%
“…Unfortunately, when WiMAX network operators choose not to use EAP-based mutual authentication, the subscriber stations are vulnerable to MITM attacks of various kinds [Barbeau 2005;Naseer et al 2008;Xu et al 2006]. Without mutual authentication, the base station will be able to verify the subscriber identity, yet the subscriber has to trust that the base station is authentic.…”
Section: Mac Layer Threatsmentioning
confidence: 99%
“…In [4], the security issues on Privacy and Key Management (PKM), such as replay attack and interleaving attack, were discussed and some solutions were proposed. Moreover, the vulnerabilities leading to DoS attacks in IEEE 802.16e were discussed in [5] polynomial-based key generation for IEEE 802.16m networks was given in [7]. Its key purpose is to enhance the multi-hop relay security authentication among relay stations and base stations in IEEE 802.16m.…”
Section: Related Workmentioning
confidence: 99%
“…The security sublayer provides subscribers with privacy, authentication or confidentiality across the wireless network. However, many security vulnerabilities, such as interleaving This [3][4][5]. The security sublayer in IEEE 802.16m is amended to address the found security vulnerabilities and satisfy the new security requirements in the IMT-advanced environments.…”
Section: Introductionmentioning
confidence: 99%