Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems, IEEE, 2006.
D. Johnston and J. Walker, Overview of IEEE 802.16 security, IEEE Security & Privacy Magazine, Vol. 2, No. 3, pp. 40–48, May–June 2004.
M. Barbeau, WiMax/802.16 threat analysis, Proceedings of the 1st ACM Interna- tional Workshop on Quality of Service & Security in Wireless and Mobile Networks, pp. 8–15, October 2005.
Ernst and Young, The necessity of rogue wireless device detection, White Paper, 2004.
CCITT Draft Recommendation X.509—The Directory Authentication Framework, version 7, 1987.
RSA Cryptography Standard, RSA Public Key Cryptography Standard #1 v. 2.0, RSA Laboratories, October 1998.
B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz, Extensible Authentication Protocol (EAP), The Internet Engineering Task Force—Request for Comments: 3748, June 2004.
C. Eklund, R. B. Marks, K. L. Stanwood and S. Wang, IEEE Standard 802.16: A technical overview of the WirelessMANTM air interface for broadband wireless access, IEEE Communications Magazine, Vol. 40, No. 6, pp. 98–107, June 2002.
S. Xu, M. M. Matthews, and C.-T. Huang, Security issues in privacy and key management protocols of IEEE 802.16, Proceedings of the 44th ACM Southeast Conference (ACMSE 2006), March 2006.
S. Xu and C.-T. Huang, Attacks on PKM protocols of IEEE 802.16 and its later versions, Proceedings of the 3rd International Symposium on Wireless Communication Systems (ISWCS 2006), September 2006.
Index
A
abstract test suite (ATS), WiMAX Forum system, 182–183
access methods, functionality and
performance testing, 178
access points (APs), WiMAX security threats, 234
active service flows, media access (MAC) layer, 50–51
adaptive antenna system (AAS) IEEE 802.16-2004 standard, 24–25
IEEE 802.16e-2005 standard, 2829 adaptive modulation, IEEE 802.16-2004
standard, 24
addressing nodes, mesh topology media access (MAC) layer, 51–52 network addressing, 164–165
adjacent channel leakage ratio (ACLR), transmitter measurements, 191–192
admission control, IEEE 802.16
quality-of-service standard, 67
operation simulation, 69–72
admitted service flows, media access (MAC) layer, 50
advanced encryption standard (AES) modes for, 223–226
WiMAX Forum certification, 182 advanced wireless services (AWS), WiMAX
performance evaluation, 81
advertisement, network topology acquisition, 109
antenna bandwidth, propagation
environments, 83–84 association procedure
handover operations, 117
levels of, 131–133
network topology acquisition, 111–114 authentication protocols
mesh networking security, 168–169 privacy key management version 1,
236–237
WiMAX security standards, 217–219 authorization keys (AKs)
mesh networking connections, 169
privacy key management (PKM) protocol, 220–221
privacy key management (PKM) protocol version 2 derivation, 242–244
vulnerabilities, 227
WiMAX security standards, 216–217 authorization security association, WiMAX
security system, 200–203
contents of, 216–217
automatic repeat request (ARQ), 182 MPDU retransmission scheme, 40–41
B
backbone hop-by-hop security, mesh networking, 169–170
bandwidth allocation scheme
handover model simulation and results, 141–143
IEEE 802.16 quality-of-service standard, admission control simulation, 69–72
media access (MAC) layer, 44–45 mesh topology, 52–53
bandwidth request header, MAC protocol data units, 211–213
base station (BS)
5th plugfest testing of, 187–189 handover operations
downlink targeting, 116–117
fast BS switching, 118, 120–121 macro diversity handover, 118–120 termination procedures, 117
media access (MAC) layer, point to multiple point (PMP) topology, 36–37, 212–213
mesh networking security, 169 mobility support functions, 104 network security properties, 198–199 network topology acquisition
advertisement, 109
neighbor BS scanning, 109–111 plugfest testing of, 184–187
transmitter power level controls, 189–190 basic channels, mesh networking
TDMA framing and transmission timing, 153–154
transmission scheduling, 154
251
basic service set (BSS), IEEE 802.11 standard, 7–8
best-effort (BE) service
IEEE 802.16 quality-of-service standard, 66
scheduling, 69
media access (MAC) layer, uplink scheduling, 44
mesh networking, broadcast channel, 158 power-saving mechanisms, 105–109
bit error rate (BER), receiver testing, 192 blocking probability, IEEE 802.16
quality-of-service standard, admission control simulation, 69–72
Bluetooth standard evolution of, 4–6
structure and properties, 12–14 broadband wireless access (BWA) systems
IEEE 802.11 standard and, 206 voice over Internet protocol (VoIP),
129–131
WiMAX performance evaluation, 80 broadcast channels, mesh networking,
TDMA framing and transmission timing, 153–154
C
cancellation, handover operations, 116 carrier sense multiple access (CSMA),
WiMAX security, 234
carrier to interference noise ratio (CINR), network topology acquisition, neighbor BS scanning, 109–111
CBC message authentication code (CCM), advanced encryption standard, 223–226
cell reselection, handover operations, 115–116 cellular networks
competing technologies, 15–16
cost issues, 15
design issues, 15
evolution of, 8–11
IEEE 802.16e standard for, 209 throughput performance, 15–16 WiMAX standardization for, 209
centralized scheduling
media access (MAC) layer, mesh topology, 53–54
mesh networking, 149–150
data channels, 158–161
quality-of-service convergence sublayer, 165–167
certification profiles, interoperability and certification testing, 180–183
certification program abstract test suite, 183
WiMAX systems, 179–183, 206–207
channel quality information channel identifier (CQICH_ID), mobile subscriber stations, 140–141
channel utilization
IEEE 802.16 quality-of-service standard, scheduling simulation, 72–74
mesh logical channels, transmission scheduling, 154–161
code division multiple access (CDMA) cellular networks, 8–11
handover operations, association levels, 132–133
predicted handover scheme, 138–141 common part sublayer, MAC architecture,
25–27
complementary error function, propagation environments, 85–87
conformance testing defined, 176
WiMAX systems, 177–178 connection identifiers (CID)
IEEE 802.16 PMP, 26–27
media access (MAC) layer
bandwidth allocation requests and grants, 44–45
mesh topology, 51–52
point to multiple point (PMP) topology, 36–37, 213
service flows, 50–51
mesh networking connections, 162–164 network security properties, 198–199
connection maintenance, media access (MAC) layer, 47–49
constellation error, transmitter testing for, 190
contention resolution, media access (MAC) layer, request transmission, 46–47
control subframes, mesh networking, TDMA framing and transmission timing, 152–154
convergence sublayer
MAC architecture, 25–26
mesh networking, 149–150 quality-of-service (QoS) levels,
165–167
coordinated distributed scheduling messages, mesh networking, distributed election scheduling broadcast channels, 154–157
cumulative distribution function (CDF), propagation environments, 87–90
cyclic redundancy check (CRC), MAC layer threats, 233–234
D
data channels, mesh networking
quality-of-service convergence sublayer, 165–167
TDMA framing and transmission timing, 153–154
transmission scheduling, 158–161 data encryption standard (DES)
privacy key management version 1, 238–240
WiMAX security system protocols for, 222–223
security associations and, 216–217 data rates, WiMAX system performance,
90–92
data security association, WiMAX security system, 200–203
contents of, 216–217
decentralized scheduling, mesh networking, 149–150
decision and initiation, handover operations, 116
demand assigned multiple access (DAMA), media access (MAC) layer, bandwidth allocation requests, 44–45
device under test (DUT) configuration adjacent channel leakage ratio
measurements, 191–192
receiver testing, 192
transmitter power level controls, 189–190 transmitter spectral flatness, 190 transmitter spectral mask, 191
direct-sequence spread spectrum (DSSS) waveform, IEEE 802.11 standard, 6–8
discontinuous reception, mobility support functions and, 104
disruption time (DT)
handover model simulation and results, 141–143
handover procedures, 130–131 distributed election scheduling broadcast
channels, mesh transmission scheduling, 154–157
distributed scheduling
media access (MAC) layer, mesh topology, 52–53
mesh networking, data channels, 158–161
DOCSIS BPI+ protocol, WiMAX security and, 197–198
downlink channel descriptor (DCD), network topology advertisement, 109
downlink map (DL-MAP), media access (MAC) layer, point to multiple point (PMP) topology, 213
downlink scheduling scheme, IEEE 802.16 quality-of-service standard, simulation, 72–74
downlink targeting, handover
synchronization, 116–117 DREG-CMD message, paging operation,
121–124
DREG-REQ, paging operation, 121–124 drops, in handover operations, 117–118 duplex techniques, MAC PDU transmission,
39–40
dynamic security associations, WiMAX system, 215–216
E
educational broadband services (EBS), WiMAX performance evaluation, 80
emergency systems
IEEE 802.16e standard for, 209 WiMAX standardization for, 209
encapsulation technology, privacy sublayers, 27–28
enter network code, paging operation, 124 error vector magnitude (EVM), transmitter constellation error, 190
ETSI HIPERLAN standard, structure and properties, 11–12
experimental data, WiMAX system performance, 92
extended real-time polling service (ErtPS),
IEEE 802.16e-2005 standard, 29 extended service set (ESS), IEEE 802.11
standard, 7–8
extensible authentication protocol (EAP) message systems in, 218
WiMAX security system, 203, 219
F
fading characteristics, propagation environments, 84–85
fast base station switching (FBSS), handover operations overview, 118–119
fast Fourier transform (FFT), handover model simulation and results, 141–143
5th plugfest architecture, WiMAX system testing, 187–189
fixed broadband access, propagation environments, 83–84
fixed WiMAX systems, performance evaluation, 78–79
forward error correction, receiver testing, 192 frequency bands
IEEE 802.16 standards for, 207
WiMAX performance evaluation, 79–81 frequency division duplex (FDD)
MAC PDU transmission, 39–40
WiMAX system performance, data rates, 90–92
Friis’ power transmission formula, propagation environments, 82–83
G
Gaussian distribution model, propagation environments, 85–87
generic MAC header (GMH), protocol data units, 210–212
generic packet convergence sublayer (GPCS), IEEE 802.16g standard, 31
Global System for Mobile communications (GSM), cellular networks, 8–11
grant mechanisms, IEEE 802.16
quality-of-service standard, 67 guard channel method (GCM), handover
procedures, 130–131
H
handover (HO) function
base station downlink synchronization, 116–117
base station termination, 117 cancellation operations, 116
cell reselection, 115–116
decision and initiation operations, 116 drops during, 117–118
fast BS switching, 120–121 IEEE 802.16e-2005 standard, 29
legacy procedures, 131–133 mobility support and, 104
macro diversity, 118–120
mobility support operations, 114–115 network entry/reentry, 118
network topology acquisition, 109–114 ranging operations, 117
scanning and association results, 117 simulation model and results, 141–143
harmonics, transmitter measurements with, 192
hashed message authentication code (HMAC)
creation of, 217–218
mesh networking connections, 163–164 security authentication, 169
privacy key management version 1, 237–238
WiMAX security system, 203 authentication protocols, 217–218
authorization keys, 217
high-speed downlink packet access (HSDPA) standard, cellular networks, 10–11
HIPERLAN WLAN technology standard, evolution of, 11–12
HiperMAN standard, development of, 207
I
identifiers, mesh networking connections, 162–164
idle mode
network reentry from, 125–126 paging operation timer, 121–124
IEEE 802.11 standard
broadband wireless access and, 206 complementary technologies, 16–17
network backbone, 208–209 structure and properties, 6–8
IEEE 802.15 standard, complementary technologies, 17
IEEE 802.16-2001 standard, development of, 230
IEEE 802.16-2004 standard
adaptive antenna system (AAS), 24 adaptive modulation, 24
evolution of, 22–28
interoperability and certification testing, 179–183
MAC layer, 25–28
nonline-of-sight (NLOS) operation, 230–231
physical layer specifications, 23–24 space time coding, 24–25
IEEE 802.16a standard, evolution of, 22–23 IEEE 802.16b standard, evolution of, 22 IEEE 802.16c standard, evolution of, 21–22 IEEE 802.16d standard, media access (MAC)
layer, point to multiple point (PMP) topology, 37–38
IEEE 802.16e-2005 standard evolution of, 28–30
handover procedures, 130–131
legacy procedures, 131–133 mobility support
handover mechanisms, 109–121
location update, 124–126 network reentry from idle model,
126–127
overview, 104
paging operations, 121–124
power-saving mechanisms, 105–109 IEEE 802.16f standard, evolution of, 30 IEEE 802.16g standard, evolution of, 30–31 IEEE 802.16h standard, evolution of, 32 IEEE 802.16i standard, evolution of, 30 IEEE 802.16j standard, 33
IEEE 802.16k standard, evolution of, 31–32 IEEE 802.16 standard
evolution of, 20, 206
fixed and mobile standards, 78–79 frequency bands, 79–81
mesh topology, 26–27
networking applications, 162–167 network security issues, 168–171 overview, 147–150
physical layer specifications, 150–151 time division multiple access, 150–162
overview of, 21–22
proprietary solutions vs., 20–21 WiMAX security and, 197–198
IEEE 802.16 Task Group E, competing technologies, 14–15
IEEE 802.20 standard
competing technologies, 14–15 structure and properties, 8
IEEE 802.22 standard, wireless regional area network (WRAN), 14
IEEE 802 standards
structure and properties, 4–8 implementation extra information for testing
(IXIT) protocol, abstract test suite, 182–183
in-building penetration, propagation environments, 87–88
independent basic service set (IBSS), IEEE
802.11 standard, 7–8
industrial, scientific, and medical (ISM) band,
IEEE 802.11 standard, 6–8 interoperability testing, WiMAX systems,
179–183
Do'stlaringiz bilan baham: |