WIMAX SECURITY ANALYSIS AND ENHANCEMENT
Abstract
The importance of IEEE 802.16, Worldwide Interoperability for Microwave Access (WiMAX) is growing and will
compete with technologies such as 3G. The acceptance and adoption of technologies also depend on security.
Therefore, this article shows security vulnerabilities found in WiMAX and gives possible solutions to eliminate them.
We find the initial network procedure is not effectively secured that makes man-in-the-middle attack possible.
Focusing on this attack, we propose Diffie-Hellman (DH) key exchange protocol to enhance the security level during
network initialization. We modify DH key exchange protocol to fit it into mobile WiMAX network as well as to
eliminate existing weakness in original DH key exchange protocol. Finally we found that the proposed algorithm
shows 2.5 times better performance in comparison with existing systems.
Downloads
References
802.16 Security, IEEE Computer Society, 2004.
2. Xu, S., Matthews, M. & Huang, C. (2006).
Security Issues in Privacy and Key Management
Protocols of IEEE802.16, retrieved on 1st May,
2006.
3. Eklund, C., Marks,R.B., Stanwood, K.L., &
Wang, S.(2002) IEEE Standard 802.16: A
Technical Overview of the WirelessMAN™ Air
Interface for Broadband Wireless Access, retrieved
on 1st May, 2006.
4. Datta A., He C., Mitchell J.C., Roy A.,
Sundararajan M.: 802.16e Notes, Electrical
Engineering and Computer Science Departments,
Stanford University, CA, USA, 2005.
Yuksel E.: Analysis of the PKMv2 Protocol in
IEEE 802.16e-2005 Using Static Analysis
Informatics and Mathematical Modeling,
Technical University Denmark, DTU, 2007.
5. Andreas Deininger, Shinsaku Kiyomoto, Jun
Kurihara, Toshiaki Tanaka: Security
Vulnerabilities and Solutions in Mobile WiMAX,
IJCSNS International Journal of Computer Science
and Network Security, VOL.7 No.11, November
2007.
6. Krawczyk H., Ballare M., Canetti R.: HMAC:
Key-Hashing for Message Authentication, RFC
2104.
7. Whitfield Diffie and Martin E. Hellman: New
Directions in Cryptography, Invented Paper.
8. Charles P. Pfleeger, “Security in Computing”
VOL No. 2
9. Tao Han, Ning Zhang, Kaiming Liu, Bihua
Tang, Yuan'an Liu: Analysis of Mobile WiMAX
Security: Vulnerabilities and Solutions, IEEE
Xplore.
MIJST follows the open access policy.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. This allows anyone to copy, share, distribute, and modify the work for non-commercial purposes, where the original work and source should be properly credited.