WIMAX SECURITY ANALYSIS AND ENHANCEMENT

  • Mir Md. Saki Kowsar CUET
  • Muhammad Sakibur Rahman CUET
Keywords: WiMAX; Key Generation; Man-in-the-Middle; Sealing Function

Abstract

The importance of IEEE 802.16, Worldwide Interoperability for Microwave Access (WiMAX) is growing and will
compete with technologies such as 3G. The acceptance and adoption of technologies also depend on security.
Therefore, this article shows security vulnerabilities found in WiMAX and gives possible solutions to eliminate them.
We find the initial network procedure is not effectively secured that makes man-in-the-middle attack possible.
Focusing on this attack, we propose Diffie-Hellman (DH) key exchange protocol to enhance the security level during
network initialization. We modify DH key exchange protocol to fit it into mobile WiMAX network as well as to
eliminate existing weakness in original DH key exchange protocol. Finally we found that the proposed algorithm
shows 2.5 times better performance in comparison with existing systems.

Downloads

Download data is not yet available.

References

1. Johnston D., Walker J.: Overview of IEEE
802.16 Security, IEEE Computer Society, 2004.
2. Xu, S., Matthews, M. & Huang, C. (2006).
Security Issues in Privacy and Key Management
Protocols of IEEE802.16, retrieved on 1st May,
2006.
3. Eklund, C., Marks,R.B., Stanwood, K.L., &
Wang, S.(2002) IEEE Standard 802.16: A
Technical Overview of the WirelessMAN™ Air
Interface for Broadband Wireless Access, retrieved
on 1st May, 2006.
4. Datta A., He C., Mitchell J.C., Roy A.,
Sundararajan M.: 802.16e Notes, Electrical
Engineering and Computer Science Departments,
Stanford University, CA, USA, 2005.
Yuksel E.: Analysis of the PKMv2 Protocol in
IEEE 802.16e-2005 Using Static Analysis
Informatics and Mathematical Modeling,
Technical University Denmark, DTU, 2007.
5. Andreas Deininger, Shinsaku Kiyomoto, Jun
Kurihara, Toshiaki Tanaka: Security
Vulnerabilities and Solutions in Mobile WiMAX,
IJCSNS International Journal of Computer Science
and Network Security, VOL.7 No.11, November
2007.
6. Krawczyk H., Ballare M., Canetti R.: HMAC:
Key-Hashing for Message Authentication, RFC
2104.
7. Whitfield Diffie and Martin E. Hellman: New
Directions in Cryptography, Invented Paper.
8. Charles P. Pfleeger, “Security in Computing”
VOL No. 2
9. Tao Han, Ning Zhang, Kaiming Liu, Bihua
Tang, Yuan'an Liu: Analysis of Mobile WiMAX
Security: Vulnerabilities and Solutions, IEEE
Xplore.
Published
2019-11-28
How to Cite
Mir Md. Saki Kowsar, & Muhammad Sakibur Rahman. (2019). WIMAX SECURITY ANALYSIS AND ENHANCEMENT. MIST INTERNATIONAL JOURNAL OF SCIENCE AND TECHNOLOGY, 2(1). https://doi.org/10.47981/j.mijst.02(01)2010.75(%p)