Network entry process security in IEEE 802.16 mesh mode

IEEE 802.16 in its mesh mode relies on the Network Entry Process to authenticate and register new node joining the network. This process is fundamental to form the mesh network topology. However, few research activities have addressed the security of this process. In this paper, we show that the network entry process can fail under many attacks (Topological attacks, Selfish behavior and denial of service attacks), and then we give solutions in order to avoid these threats.

[1]  Yuguang Fang,et al.  Security of IEEE 802.16 in Mesh Mode , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[2]  Michel Barbeau WiMax/802.16 threat analysis , 2005, Q2SWinet '05.

[3]  Chin-Tser Huang,et al.  Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions , 2006, 2006 3rd International Symposium on Wireless Communication Systems.

[4]  Yi-Bing Lin,et al.  NCTUns simulation tool for WiMAX modeling , 2007, WICON '07.

[5]  David Johnston,et al.  Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.

[6]  Azzedine Boukerche,et al.  Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks , 2005 .

[7]  Chin-Tser Huang,et al.  Security issues in privacy and key management protocols of IEEE 802.16 , 2006, ACM-SE 44.