Principles of Wireless Networks: A Unified Approach
Principles of Wireless Networks: A Unified Approach
802.11 Wireless Networks: The Definitive Guide
802.11 Wireless Networks: The Definitive Guide
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Overview of IEEE 802.16 Security
IEEE Security and Privacy
WiMax Operator's Manual: Building 802.16 Wireless Networks, Second Edition
WiMax Operator's Manual: Building 802.16 Wireless Networks, Second Edition
A framework for compositional verification of security protocols
Information and Computation
Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship
Secure roaming of key association scheme providing perfect forward secrecy in IEEE 802.16
CSNA '07 Proceedings of the IASTED International Conference on Communication Systems, Networks, and Applications
Formal analysis of the handover schemes in mobile WiMAX networks
WOCN'09 Proceedings of the Sixth international conference on Wireless and Optical Communications Networks
Towards efficient and secure rekeying for IEEE 802.16e WiMAX networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Security issues in mobile WiMAX (IEEE 802.16e)
MWS'09 Proceedings of the 2009 IEEE conference on Mobile WiMAX
Personal and Ubiquitous Computing
A hybrid user authentication protocol for mobile IPTV service
Multimedia Tools and Applications
Hi-index | 0.00 |
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified in the MAC layer to address the privacy issues across the fixed Broadband Wireless Access (BWA). Several articles have been published to address the flaws in IEEE 802.16 security after the IEEE standard 802.16-2001 was released. However, the IEEE standard 802.16-2004 revision does not settle all the discovered problems and additional flaws remain. This paper gives an overview of the IEEE 802.16 standard, focusing on the MAC layer and especially the security sublayer. We analyze the security flaws in the standard as well as in related works, and illustrate possible attacks to the authentication and key management protocols. Possible solutions are also proposed to prevent these attacks. Finally, we propose a security handover protocol that should be supported in the future 802.16e for mobility.