Attacks and Countermeasures on 802.16: Analysis and Assessment

The IEEE 802.16 technology, commonly referred to as WiMAX, gains momentum as an option for broadband wireless communication access. So far, several research works focus on the security of the 802.16 family of standards. In this context, the contribution of this paper is twofold. First, it provides a comprehensive taxonomy of attacks and countermeasures on 802.16. Each attack is classified based on several factors, e.g. its type, likelihood of occurrence, impact upon the system etc. and its potential is reviewed with reference to the standard. Possible countermeasures and remedies proposed for each category of attacks are also discussed to assess their effectiveness. Second, a full-scale assessment study of indicative attacks that belong to broader attack classes is conducted in an effort to better comprehend their impact on the 802.16 realm. As far as we are aware of, this is the first time an exhaustive and detailed survey of this kind is attempted.

[1]  Michel Barbeau WiMax/802.16 threat analysis , 2005, Q2SWinet '05.

[2]  Romano Fantacci,et al.  Security Analysis of IEEE 802.16 , 2007, 2007 IEEE International Conference on Communications.

[3]  V. K. Govindan,et al.  A Novel Initial Ranging Algorithm for mobile WiMAX (802.16e) , 2010 .

[4]  Michel Barbeau,et al.  Analysis of Threats to WiMax/802.16 Security , 2006 .

[5]  Chin-Tser Huang,et al.  Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions , 2006, 2006 3rd International Symposium on Wireless Communication Systems.

[6]  Yu Zhang,et al.  Collaborative attacks in WiMAX networks , 2009, Secur. Commun. Networks.

[7]  Deepinder P. Sidhu,et al.  Initialization vector attacks on the IPsec protocol suite , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).

[8]  Eduardo B. Fernandez,et al.  An Overview of WiMAX Security , 2018, WiMAX.

[9]  Muhammad Younus,et al.  Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.

[10]  Peng Xu,et al.  Notice of RetractionExperimental Research on a New Authentication Protocol for Wireless Communication Network Based on WiMAX , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[11]  Chin-Tser Huang,et al.  Responding to Security Issues in WiMAX Networks , 2008, IT Professional.

[12]  David Johnston,et al.  Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.

[13]  Lei Lu,et al.  A WPKI-Based Security Mechanism for IEEE 802.16e , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.

[14]  Naser Movahhedinia,et al.  Traffic analysis for WiMAX network under DDoS attack , 2010, 2010 Second Pacific-Asia Conference on Circuits, Communications and System.

[15]  Dong-Ho Cho,et al.  Performance Evaluation of Energy-Saving Mechanism Based on Probabilistic Sleep Interval Decision Algorithm in IEEE 802.16e , 2007, IEEE Transactions on Vehicular Technology.

[16]  Li Tu,et al.  An Improved Mutual Authentication Scheme in Multi-Hop WiMax Network , 2008, 2008 International Conference on Computer and Electrical Engineering.

[17]  E. Eren WiMAX Security Architecture - Analysis and Assessment , 2007, 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.

[18]  Chin-Tser Huang,et al.  Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR , 2008, 2008 IEEE International Symposium on Wireless Communication Systems.

[19]  Mohammed Abdul Qadeer,et al.  Security concerns in WiMAX , 2009, 2009 First Asian Himalayas International Conference on Internet.

[20]  Karen A. Scarfone,et al.  Guide to Securing WiMAX Wireless Communications , 2010 .

[21]  Patrick P. C. Lee,et al.  On the detection of signaling DoS attacks on 3G/WiMax wireless networks , 2009, Comput. Networks.

[22]  Mir Md. Saki Kowsar,et al.  WiMAX security analysis and enhancement , 2009, 2009 12th International Conference on Computers and Information Technology.

[23]  G. S. Vernam Cipher printing telegraph systems: For secret wire and radio telegraphic communications , 2022, Journal of the A.I.E.E..

[24]  Sunghyun Choi,et al.  Performance Analysis of Sleep Mode Operation in IEEE 802.16e Mobile Broadband Wireless Access Systems , 2006, 2006 IEEE 63rd Vehicular Technology Conference.

[25]  Raheem A. Beyah,et al.  Key challenges in securing WiMAX mesh networks , 2009, Secur. Commun. Networks.

[26]  Bok-Min Goi,et al.  Simulating denial of service attack using WiMAX experimental setup , 2011 .

[27]  Lars R. Knudsen,et al.  Block Ciphers: Analysis, Design and Applications , 1994 .

[28]  M.P. Sebastian,et al.  A Revised Secure Authentication Protocol for IEEE 802.16 (e) , 2010, 2010 International Conference on Advances in Computer Engineering.

[29]  Virtual Bridged,et al.  IEEE Standards for Local and Metropolitan Area Networks: Specification for 802.3 Full Duplex Operation , 1997, IEEE Std 802.3x-1997 and IEEE Std 802.3y-1997 (Supplement to ISO/IEC 8802-3: 1996/ANSI/IEEE Std 802.3, 1996 Edition).

[30]  Teemupekka Virtanen,et al.  Attacking Predictable IPsec ESP Initialization Vectors , 2002, ICICS.

[31]  Mihir Bellare,et al.  Entity Authentication and Key Distribution , 1993, CRYPTO.

[32]  Ning Zhang,et al.  Analysis of mobile WiMAX security: Vulnerabilities and solutions , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[33]  Li Gong,et al.  A security risk of depending on synchronized clocks , 1992, OPSR.

[34]  Chin-Laung Lei,et al.  A prevention approach to scrambling attacks in WiMAX networks , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.

[35]  F. Ibikunle,et al.  Security issues in mobile WiMAX (IEEE 802.16e) , 2009 .

[36]  Jing Chi A Novel Mechanism for Contention-based Initial Ranging in IEEE 802 . 16 e Networks , 2008 .

[37]  Sherali Zeadally,et al.  A Proposed Authentication Protocol for Mobile Users of WiMAX Networks , 2010, 2010 3rd International Conference on Human-Centric Computing.

[38]  Saewoong Bahk,et al.  Enhancing Security Using the Discarded Security Information in Mobile WiMAX Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[39]  Jong Hyuk Park,et al.  Novel Approaches to Enhance Mobile WiMAX Security , 2010, EURASIP J. Wirel. Commun. Netw..

[40]  Richard R. Brooks,et al.  Assessing the Effect of WiMAX System Parameter Settings on MAC-level Local DoS Vulnerability , 2012 .

[41]  Krishnun Sansurooah An assessment of threats of the Physical and MAC Address Layers in WiMAX/802.16 , 2006 .

[42]  M. Younus Javed,et al.  Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005 , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.

[43]  Zhengjun Cao How to Launch A Birthday Attack Against DES , 2008, IACR Cryptol. ePrint Arch..

[44]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[45]  Lars R. Knudsen,et al.  DES-X (or DESX) , 2005, Encyclopedia of Cryptography and Security.

[46]  Yong-Hoon Choi,et al.  Power Saving Mechanisms of IEEE 802.16e: Sleep Mode vs. Idle Mode , 2006, ISPA Workshops.

[47]  Yuguang Fang,et al.  Security of IEEE 802.16 in Mesh Mode , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[48]  Mohsen Guizani,et al.  Efficient rekeying algorithms for WiMAX networks , 2009, Secur. Commun. Networks.

[49]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[50]  Weijia Jia,et al.  Performance Improvement using Dynamic Contention Window Adjustment for Initial Ranging in IEEE 802.16 P2MP Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[51]  Yusun Chang,et al.  A Security Scheme for Centralized Scheduling in IEEE 802.16 Mesh Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[52]  Saewoong Bahk,et al.  Shared Authentication Information for Preventing DDoS attacks in Mobile WiMAX Networks , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.

[53]  Chin-Tser Huang,et al.  Secure Multicast in WiMAX , 2008, J. Networks.

[54]  Pang Liaojun,et al.  Key Management Protocol of the IEEE 802.16e , 2007 .

[55]  Toshiaki Tanaka,et al.  Security Vulnerabilities and Solutions in Mobile WiMAX , 2007 .

[56]  Mohamad Yusoff Alias,et al.  Potential denial of service attacks in IEEE802.16e-2005 networks , 2009, 2009 9th International Symposium on Communications and Information Technology.

[57]  Ieee Microwave Theory,et al.  IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems Draft Amendment: Management Information Base Extensions , 2007 .

[58]  Georgios Kambourakis,et al.  Revisiting WiMAX MBS security , 2010, Comput. Math. Appl..