Introducing identity management in WiMAX to enable secure and personalized services

The increasing popularity of broadband Internet and the widespread penetration of full-featured mobile devices have signaled WiMAX importance. IEEE 802.16 standard has focused on security from the beginning, being security support a fundamental aspect in wireless communication. We have found some limitations concerning authentication and authorization mechanisms at user level. To overcome those limitations we consider necessary to provide a proper identity management support for WiMAX for enhancing users' experience whereas delivering services in a secure fashion. In this article we analyze several weaknesses and vulnerabilities in WiMAX security and propose the introduction of identity management in WiMAX for a better provision of secure personalized services.

[1]  Yi Qu,et al.  Analysis on mobile WiMAX security , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).

[2]  Taejoon Park,et al.  A Survey of Security Threats on 4G Networks , 2007, 2007 IEEE Globecom Workshops.

[3]  Celeste Campo,et al.  PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .

[4]  Ranga Reddy,et al.  Distributed Trust Relationship and Polynomial Key Generation for IEEE 802.16m Networks , 2009, 2009 IEEE Mobile WiMAX Symposium.

[5]  Chin-Tser Huang,et al.  Responding to Security Issues in WiMAX Networks , 2008, IT Professional.

[6]  David Johnston,et al.  Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.

[7]  Michel Barbeau WiMax/802.16 threat analysis , 2005, Q2SWinet '05.

[8]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[9]  WalkerJesse,et al.  Overview of IEEE 802.16 Security , 2004, S&P 2004.