Improving Security in the IEEE 802.16 Standards

The IEEE 802.16 standard was proposed to provide Broadband Wireless Access for fixed and nomadic subscribers. However, Shon et al [9] identified three vulnerabilities in the existing 802.16 standards. The vulnerabilities are 1) important messages sent during the initial network entry process are not secured in the existing 802.16 standard, 2) there are some Access Network vulnerabilities (the IEEE 802.16 standard does not cover the security of intra-Access Service Network (intra-ASN) and ASN-to-Connectivity Service Network (ASN-to-CSN) communications) and 3) the Hand Over (HO) optimization flags are able to allow malicious users to cause critical security vulnerabilities during the handover process. Shon et al [9] then proposed countermeasures for the above-mentioned vulnerabilities. In this paper, we review Shon et al's countermeasures to initial network entry and Access Network vulnerabilities and show that their proposed countermeasures are ineffective in preventing attacks to initial network entry and access network communications. We then proposed improved countermeasures that are able to protect against initial network entry and access network communications vulnerabilities.

[1]  Mohammed Abdul Qadeer,et al.  Security concerns in WiMAX , 2009, 2009 First Asian Himalayas International Conference on Internet.

[2]  Jong Hyuk Park,et al.  Novel Approaches to Enhance Mobile WiMAX Security , 2010, EURASIP J. Wirel. Commun. Netw..

[3]  David Johnston,et al.  Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.

[4]  Masood Ahmad,et al.  A Review of Some Security Aspects of WiMAX and Converged Network , 2010, 2010 Second International Conference on Communication Software and Networks.

[5]  Yi Qu,et al.  Analysis on mobile WiMAX security , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).

[6]  Ender Yuksel,et al.  Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis , 2007 .

[7]  Mir Md. Saki Kowsar,et al.  WiMAX security analysis and enhancement , 2009, 2009 12th International Conference on Computers and Information Technology.

[8]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[9]  Michel Barbeau WiMax/802.16 threat analysis , 2005, Q2SWinet '05.