Key challenges in securing WiMAX mesh networks

Worldwide interoperability for microwave access (WiMAX), designed by the IEEE 802.16 standards group, is one of the most promising broadband wireless technologies with respect to delivering high-speed connectivity in the last mile. A mesh network configuration was added for improved coverage and throughput. We describe security concerns for WiMAX mesh mode such as malicious sponsor nodes and privacy. We also seek to reduce the processing load as a result of the use of link encryption. We introduce two different types of attacks as a result of different types of malicious sponsor nodes. The first type of attack occurs when the malicious sponsor node has not actually joined the current mesh network but solicits new nodes to join the mesh network through it. The second type of attack occurs when the malicious node is a member of the mesh network and selectively drops data from its child nodes. To prevent the first attack, we propose a new security protocol that adds to the standard control messages a pair of secret authorization keys (AK). To handle the second attack, we propose a reputation-based scheme that is specific to WiMAX mesh networks. We conduct a numerical analysis and simulations to highlight the strengths of the proposed schemes. The proposed reputation-based scheme uses the MSH-NCFG control message that is used in the WiMAX standard to send reputation information about nodes in the mesh network. Nodes that are joining the mesh network receive and process MSH-NCFG messages and decide which sponsor node through which to join the network. We conduct a numerical analysis to determine the amount of time for reputation information to propagate through the mesh network, thus allowing joining nodes to avoid malicious sponsor nodes. The simulation results show that the proposed scheme can reduce the overall data drop rate in WiMAX mesh networks in the presence of the aforementioned attacks from malicious sponsor nodes. Copyright © 2009 John Wiley & Sons, Ltd.

[1]  Fan Yang,et al.  An improved security scheme in WMAN based on IEEE standard 802.16 , 2005, Proceedings. 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005..

[2]  Pin-Han Ho,et al.  Authentication Authorization and Accounting (AAA) Schemes in WiMAX , 2006, 2006 IEEE International Conference on Electro/Information Technology.

[3]  Yuguang Fang,et al.  Security of IEEE 802.16 in Mesh Mode , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[4]  Jean-Yves Le Boudec,et al.  Distributed Reputation Systems for Internet-based Peer-to-Peer Systems and Mobile Ad-Hoc Networks , 2005 .

[5]  David Johnston,et al.  Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.

[6]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[7]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[8]  Yusun Chang,et al.  A Security Scheme for Centralized Scheduling in IEEE 802.16 Mesh Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[9]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[10]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[11]  Chin-Tser Huang,et al.  Security issues in privacy and key management protocols of IEEE 802.16 , 2006, ACM-SE 44.

[12]  S.A. Khan,et al.  An Augmented Security Protocol for WirelessMAN Mesh Networks , 2006, 2006 International Symposium on Communications and Information Technologies.