Novel Approaches to Enhance Mobile WiMAX Security

The IEEE 802.16 Working Group on Broadband Wireless Access Standards released IEEE 802.16-2004 which is a standardized technology for supporting broadband and wireless communication with fixed and nomadic access. After the IEEE 802.16-2004 standard, a new advanced and revised standard was released as the IEEE 802.16e-2005 amendment which is foundation of Mobile WiMAX network supporting handover and roaming capabilities. In the area of security aspects, compared to IEEE 802.16-2004, IEEE 802.16e, called Mobile WiMAX, adopts improved security architecture—PKMv2 which includes EAP authentication, AES-based authenticated encryption, and CMAC or HMAC message protection. However, there is no guarantee that PKMv2-based Mobile WiMAX network will not have security flaws. In this paper, we investigate the current Mobile WiMAX security architecture focusing mainly on pointing out new security vulnerabilities such as a disclosure of security context in network entry, a lack of secure communication in network domain, and a necessity of efficient handover supporting mutual authentication. Based on the investigation results, we propose a novel Mobile WiMAX security architecture, called RObust and Secure MobilE WiMAX (ROSMEX), to prevent the new security vulnerabilities.

[1]  Muhammad Ibrahim,et al.  Performance of WiMAX Security Algorithm (The Comparative Study of RSA Encryption Algorithm with ECC Encryption Algorithm) , 2009, 2009 International Conference on Computer Technology and Development.

[2]  Hyunsoo Yoon,et al.  Security Considerations for Handover Schemes in Mobile WiMAX Networks , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[3]  Masood Ahmad,et al.  A Review of Some Security Aspects of WiMAX and Converged Network , 2010, 2010 Second International Conference on Communication Software and Networks.

[4]  Michel Barbeau WiMax/802.16 threat analysis , 2005, Q2SWinet '05.

[5]  David Johnston,et al.  Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.

[6]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[7]  Mir Md. Saki Kowsar,et al.  WiMAX security analysis and enhancement , 2009, 2009 12th International Conference on Computers and Information Technology.

[8]  Ning Zhang,et al.  Analysis of mobile WiMAX security: Vulnerabilities and solutions , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[9]  M. Looi,et al.  A trivial denial of service attack on IEEE 802.11 direct sequence spread spectrum wireless LANs , 2004, 2004 Symposium on Wireless Telecommunications.

[10]  Yi Qu,et al.  Analysis on mobile WiMAX security , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).

[11]  Ender Yuksel,et al.  Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis , 2007 .

[12]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[13]  Mohammed Abdul Qadeer,et al.  Security concerns in WiMAX , 2009, 2009 First Asian Himalayas International Conference on Internet.

[14]  Ieee Microwave Theory,et al.  Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems — Amendment for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands , 2003 .

[15]  Ieee Microwave Theory,et al.  IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems Draft Amendment: Management Information Base Extensions , 2007 .