Wimax standards and Security The Wimax



Download 2,02 Mb.
bet144/186
Sana29.05.2022
Hajmi2,02 Mb.
#619147
1   ...   140   141   142   143   144   145   146   147   ...   186
Bog'liq
CRC - WiMAX.Standards.and.Security

Part II
Security

10


An Overview of WiMAX Security
Eduardo B. Fernandez and Michael VanHilst
CONTENTS

    1. Introduction 197

    2. Network Aspects 198

    3. WiMAX Security 199

    4. Conclusions 203

References 204



10.1 Introduction

+
The IEEE 802.16 protocol is also called WiMAX, which stands for worldwide interoperability of microwave access. It addresses high-bandwidth wide-area access between a service provider base station (BS) and multiple subscriber stations (SSs), often referred to as the “last mile’’ in reference to neighbor- hood connections between subscribers’ homes and a phone or cable company office. In fact, important parts of the protocol are based on the DOCSIS BPI (data over cable service interface specifications: baseline privacy plus inter- face specification) [3] protocol used in cable modems. The original 802.16 standard covers line-of-sight connections in the 10–66 GHz range, supporting speeds up to 280 Mbps over distances up to 50 km (30 mi.). 802.16a cov- ers nonline-of-sight connections in the 2–11 GHz range, supporting speeds up to 75 Mbps over distances of 5–8 km (3–5 mi.). 802.16a also adds features for mesh networks, while the 802.16e standard adds support for mobility (i.e., station handoff) [4].
As a wireless protocol, WiMAX has an additional set of security threats
not faced in cable systems. Because the DOCSIS protocol was developed for cable modems, not wireless systems, the original 802.16 standard does not provide enough security for the intended purpose. The standard threats for wireless systems still apply to WiMAX systems, in particular all the attacks to the higher levels [5,6]. Later extensions correct some of the weaknesses.


197

We present here an overview of the security aspects of this standard. We use unified modeling language (UML) class and sequence diagrams to describe architectural aspects. These are conceptual diagrams, intended to define the information in each unit and do not reflect implementation details. The reader is referred to Ref. 9 or similar textbooks for introductions to UML. The idea is to present a high-level overview that can be read before getting into the details of the standard or more advanced discussions.


Section 10.2 discusses the networking aspects of this protocol and Section 10.3 presents an overview of its basic security aspects. We end with some conclusions and ideas for future work.







    1. Download 2,02 Mb.

      Do'stlaringiz bilan baham:
1   ...   140   141   142   143   144   145   146   147   ...   186




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish