Key Management Protocol in WIMAX Revisited

Without physical boundaries, a wireless network faces many more vulnerabilities than a wired network does. Compared to Wi-Fi, security has been included in the design of WiMAX systems at the very start. IEEE802.16 standard (WiMAX) provides a security sublayer in the MAC layer to address the privacy issues across the fixed BWA (Broadband Wireless Access). After the launch of this new standard, a number of security issues were reported in several articles. Ever since the beginning, work has been in progress for the neutralization of these identified threats.

[1]  Wang Jian-qiu,et al.  A Simple Key Management Scheme Based on WiMAX , 2008 .

[2]  Cjf Cas Cremers Scyther : semantics and verification of security protocols , 2006 .

[3]  Chin-Tser Huang,et al.  Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions , 2006, 2006 3rd International Symposium on Wireless Communication Systems.

[4]  M. Younus Javed,et al.  Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005 , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.

[5]  Cas J. F. Cremers,et al.  The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.

[6]  Wei-min Lang,et al.  A Simple Key Management Scheme Based on WiMAX , 2008, 2008 International Symposium on Computer Science and Computational Technology.

[7]  David Johnston,et al.  Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.