The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still facing a lot of challenging situations. This paper shows different security vulnerabilities found in IEEE 802.16e and gives possible...
The current mobile wireless standard 802.16e can provide data confidentiality, integrity and mutual authentication in wireless metropolitan area networks (WMANs). However, secure communication can only be provided after successful authentication and a robust security network association is established. In this paper, we propose our solution to patch the current 802.16e standard and address all vulnerable...
The tremendous growth in mobile and wireless communications comes with more pervasive applications. Current mobile device platform does not allow a local or remote user to attest the target platform. The limitation of using existing software-based protection alone can be easily affected by malicious codes and it cannot assure its own integrity. In this paper, we explore a new approach of anonymity...
This paper presents a study of security advances and challenges associated with emergent 4G wireless technologies. The paper makes a number of contributions to the field. First, it studies the security standards evolution across different generations of wireless standards. Second, the security-related standards, architecture and design for the LTE and WiMAX technologies are analyzed. Third, security...
The future for WiMAX-based mobile wireless access is so bright. With the increasing popularity of WiMAX, it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. On the other side the trend is towards converged network in which the same networking infrastructure is used for both...
IEEE 802.16 m is now under consideration by the ITU to become the IMT-Advanced standard. However, handover authentication is a critical issue in this area. In this letter, we propose a fast handover authentication mechanism based on ticket for IEEE 802.16 m. The credential ticket of Mobile Station (MS) is issued by the access Base Station (BS) using a multi-BS group key during the initial authentication...
The importance of IEEE 802.16, worldwide interoperability for microwave access (WiMAX) is growing and will compete with technologies such as 3G. The acceptance and adoption of technologies also depend on security. Therefore, this article shows security vulnerabilities found in WiMAX and gives possible solutions to eliminate them. We find the initial network procedure is not effectively secured that...
IEEE 802.16, known as WiMax, is at the top of communication technology drive because it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. A lot of security concerns are needed to secure a wireless network. By keeping in mind the importance of security, the WiMax working groups...
Leveraging the Defense Information Systems Agency's (DISA) experience on the Tactical Services Provider (TSP) Joint Capability Technology Demonstration (JCTD), this paper analyzes the security weaknesses and vulnerabilities of mobile Worldwide Interoperability for Microwave Access (WiMAX) in the TSP architecture and explains DISA's approach to deploying an integrated, multi-layer Information Assurance...
Unlike a conventional wired network, a wireless network system is susceptible to attacks from malicious parties without the need to physically be present near the network entities or its equipments. With a large coverage area serving up to 50 km in distance, the IEEE802.16 broadband wireless access (BWA) standard was designed from the ground up with security features built-in to circumvent security...
IEEE 802.16 specifications for the mesh mode require the handing over Mesh Client (MC) to process the network entry procedure and to authenticate with the mesh Base Station (BS) in order to issue its request and to be scheduled for data transmission. Besides, the mesh BS does not reserve resources for serving the active connections belonging to the handing over nodes. In this paper, we aim at optimizing...
Security in wireless networks has traditionally been considered to be an issue to be addressed at the higher layers of the network. However, with the emergence of ad hoc and other less centralized networking architectures, there has been an increase in interest in the potential of the wireless physical layer to provide communications security. Information theory provides a natural framework for the...
Mobile relay stations (RSs) provide broadband wireless access (BWA) networks with additional mobility, which extends network coverage and advances dynamic networking and ubiquitous computing. However, there are many unresolved security vulnerabilities in the current IEEE 802.16 standard, such as BS/RS spoofing. Additional measures are needed to ensure that each component in the network is a trusted...
The main aim of the paper is to define a security and mobility architecture for users to roam along isolated wireless networks. Due to the mobility of the users as well as the networks some of the key issues like security and mobility management are not addressed properly due to non availability of infrastructure to handle authentications, mobility management in the access networks. To provide services...
This paper is mainly focusing on the dynamic authentication data management for the heterogeneous interworking authentication among WiMAX and 3GPP. The 3GPP AAA server in HPLMN performs the authentication for the 3GPP/WiMAX UE by using the authentication vectors (AV) obtained from HSS. Moreover, when the 3GPP/WiMAX UE leaves and reenters the same PLMN (HPLMN or VPLMN) within its avaliable period of...
An overview of the EAP-based handover procedures of the IEEE 802.16e standard is introduced and their security vulnerabilities are analyzed. Possible solutions for secure handover in IEEE 802.16e networks that guarantee a backward and forward secrecy are described and formally verified using Scyther, a specialized model checker for security protocols. These solutions showed a few drawbacks in the...
With the rapid development of wireless communication, mobile users are able to manually switch their network interfaces to different types of networks. The IEEE 802.21 Draft Standard was proposed to integrate the Media Independent Handover (MIHs) between the wireless network interfaces, such as WiFi, WiMAX, 3 GPP, and 3GPP2. However, it may not hold the seamless roaming character and does not provide...
With advent of access technologies such as WiFi and WiMax, access mechanisms are on the verge of providing continuous access anytime, anywhere and most importantly anyhow. The IEEE 802.16e amendment to the IEEE 802.16 standard adds mobility to the original standard and thus makes WiMax an attractive solution to provide high bit rate mobile wireless services over a broader range of coverage. However,...
In mobile WiMAX (M-WiMAX), while generating cipher-based message authentication code (CMAC) for security, some bits of it are truncated and also while deriving a key hierarchy, some part of keying material is discarded. In this paper, we exploit these discarded information to enhance the security in M-WiMAX, and consider two cases of discarded information. Firstly, we propose to use the truncated...
Mobile WiMAX is the next generation of broadband wireless network. It allows users to roam over the network under vehicular speeds. However, when a mobile station changes from one base station to another, it should be authenticated again. This may lead to delay in communication, especially for real-time applications, such as VoIP and Pay-TV systems. In this paper, we propose two efficient schemes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.