Wimax standards and Security The Wimax



Download 2,02 Mb.
bet156/186
Sana29.05.2022
Hajmi2,02 Mb.
#619147
1   ...   152   153   154   155   156   157   158   159   ...   186
Bog'liq
CRC - WiMAX.Standards.and.Security

Security Features

WiMAX security has two goals, one is to provide privacy across the wire- less network and the other is to provide access control to the network. Privacy is accomplished by encrypting connections between the subscriber station and the base station. The base station protects against unauthorized access by enforcing encryption of service flows across the network. A privacy and key management (PKM) protocol is used by the base station to control the distribution of keying data to subscriber stations. This allows the sub- scriber and base stations to synchronize keying data. Digital-certificate-based subscriber station authentication is included in the PKM to provide access control [5].



      1. Security Associations

A security association (SA) is the set of security information a base station and one or more of its client subscriber stations share to support secure commu- nication across a WiMAX network. WiMAX uses two different types of SAs, data and authorization [5,7].
There are three different types of data SAs: primary, static, and dynamic. Primary SAs are established by the subscriber stations during their initial- ization process. The base station provides the static SAs. Dynamic SAs are established and eliminated as needed for service flows. Both static and dynamic SAs can be shared among multiple subscriber stations [5].


TABLE 11.4
Contents of Data SAs
16-bit SA identifier (SAID)
Encryption cipher to protect the data exchanged over the connection
Two TEKs: one for current operation and another for when the current key expires Two 2-bit key identifiers, one for each TEK
TEK lifetime. The minimum value is 30 min and the maximum value is 7 days. The default is half a day
Initialization vector for each TEK
Data SA type indicator (primary, static, dynamic)
Table 11.4 shows the contents of a data SA. The SA identifier (SAID) is used to uniquely identify the data SA. The encryption cipher defines what method of encryption will be used to encrypt data. Initially, the IEEE 802.16 standard defined the use of the data encryption standard (DES) in cipher block chaining (CBC) mode. Later, in the IEEE 802.16e revision, more modes were defined. Section 11.3.4 covers data encryption in detail.
Traffic encryption keys (TEKs) are used to encrypt data transmissions between the base stations and subscriber stations. The data SA defines two TEKs, one for current operations and a second to be used when the current one expires. Two TEK identifiers are included, one for each key. A TEK life- time is also included to indicate when the TEK expires. The default lifetime is half a day, but it can vary from 30 min to 7 days.
DES in CBC mode requires an initialization vector to operate. Therefore, one for each TEK is included in the data SA. Both initialization vectors are 64 bits in length to accommodate the 64-bit block size used in DES encryption. The data SA type is also included to indicate whether it is a primary, static,
or dynamic data SA.
Data SAs protect transport connections between one or more subscriber sta- tions and a base station. Subscriber stations typically have one SAfor their sec- ondary management channel and either one SAfor both uplink and downlink transport connections or separate SAs for uplink and downlink connections. For multicasting, each group requires an SA to be shared among its members; therefore the standard lets many connection IDs share a single SA [7].
Authorization SAs are shared between a base station and a subscriber sta- tion. They are used by the base station to configure data SAs for the subscriber station [7].
Table 11.5 shows the contents of an authorization SA. An X.509 certifi- cate is included, which allows the base station to identify the subscriber station. Section 11.3.2.2 goes into detail about X.509 certificates and how they are used.
The 160-bit authorization key (AK) is included to allow the base station and subscriber station to authenticate each other during TEK exchanges. Section 11.3.3.2 describes the TEK exchange process. A 4-bit AK identifier is used to distinguish among different AKs. An AK lifetime is also included



Download 2,02 Mb.

Do'stlaringiz bilan baham:
1   ...   152   153   154   155   156   157   158   159   ...   186




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish