Wimax standards and Security The Wimax



Download 2,02 Mb.
bet169/186
Sana29.05.2022
Hajmi2,02 Mb.
#619147
1   ...   165   166   167   168   169   170   171   172   ...   186
Bog'liq
CRC - WiMAX.Standards.and.Security

FIGURE 12.2
MAC protocol data unit structure. (a) Transport connection MPDU. (b) Management connection MPDU.

Identity theft is a severe threat to unlicensed services supported by WiMAX [5,6]. A fake device can use the hardware address of another registered device by intercepting management messages over the air. Once succeeded, an attacker can turn a BS into a rogue BS. A rogue BS can imitate a legitimate BS by confusing the associated SSs. Those SSs try to acquire WiMAX services from the rogue BS, resulting in degraded service or even service termination. The Wireless-fidelity (Wi-Fi) network employs carrier sense multiple access (CSMA), and thus identity theft has become one of the top security threats. The reason is that the attacker can easily capture the identity of a legitimate access point (AP) by listening to the CSMA process, which readily reveals information on the AP identity. The attacker can then construct a message by using the legitimate AP’s identity, wait until the medium is idle, and distribute


the malicious message.
In WiMAX, time division multiple access (TDMA) is adopted. To steal the identity, the attacker must transmit while the legitimate BS is transmitting, and the signal of the attacker must arrive at the targeted SSs with high enough strength to subside the signal of the legitimate BS in the background. Since the transmission is divided into time slots, the attacker has to interpret the time slot allocated to the legitimate BS successfully and detect the BS sig- nal strength correctly, both of which make identity theft more difficult and challenging. Besides, mutual authentication has been introduced into the lat- est WiMAX standard, further reducing the likelihood of identity theft. In the following sections, we will elaborate the PKM protocols, the security manage- ment mechanism to effectively overcome identity theft and eavesdropping in WiMAX.







    1. Download 2,02 Mb.

      Do'stlaringiz bilan baham:
1   ...   165   166   167   168   169   170   171   172   ...   186




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish