Wimax standards and Security The Wimax


Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems



Download 2,02 Mb.
bet183/186
Sana29.05.2022
Hajmi2,02 Mb.
#619147
1   ...   178   179   180   181   182   183   184   185   186
Bog'liq
CRC - WiMAX.Standards.and.Security

Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems, IEEE, 2006.

  • D. Johnston and J. Walker, Overview of IEEE 802.16 security, IEEE Security & Privacy Magazine, Vol. 2, No. 3, pp. 40–48, May–June 2004.

  • M. Barbeau, WiMax/802.16 threat analysis, Proceedings of the 1st ACM Interna- tional Workshop on Quality of Service & Security in Wireless and Mobile Networks, pp. 8–15, October 2005.

  • Ernst and Young, The necessity of rogue wireless device detection, White Paper, 2004.

  • CCITT Draft Recommendation X.509—The Directory Authentication Framework, version 7, 1987.

  • RSA Cryptography Standard, RSA Public Key Cryptography Standard #1 v. 2.0, RSA Laboratories, October 1998.

  • B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz, Extensible Authentication Protocol (EAP), The Internet Engineering Task Force—Request for Comments: 3748, June 2004.

  • C. Eklund, R. B. Marks, K. L. Stanwood and S. Wang, IEEE Standard 802.16: A technical overview of the WirelessMANTM air interface for broadband wireless access, IEEE Communications Magazine, Vol. 40, No. 6, pp. 98–107, June 2002.

  • S. Xu, M. M. Matthews, and C.-T. Huang, Security issues in privacy and key management protocols of IEEE 802.16, Proceedings of the 44th ACM Southeast Conference (ACMSE 2006), March 2006.

  • S. Xu and C.-T. Huang, Attacks on PKM protocols of IEEE 802.16 and its later versions, Proceedings of the 3rd International Symposium on Wireless Communication Systems (ISWCS 2006), September 2006.


    Index



    A
    abstract test suite (ATS), WiMAX Forum system, 182–183
    access methods, functionality and
    performance testing, 178
    access points (APs), WiMAX security threats, 234
    active service flows, media access (MAC) layer, 50–51
    adaptive antenna system (AAS) IEEE 802.16-2004 standard, 24–25
    IEEE 802.16e-2005 standard, 2829 adaptive modulation, IEEE 802.16-2004
    standard, 24
    addressing nodes, mesh topology media access (MAC) layer, 51–52 network addressing, 164–165
    adjacent channel leakage ratio (ACLR), transmitter measurements, 191–192
    admission control, IEEE 802.16
    quality-of-service standard, 67
    operation simulation, 69–72
    admitted service flows, media access (MAC) layer, 50
    advanced encryption standard (AES) modes for, 223–226
    WiMAX Forum certification, 182 advanced wireless services (AWS), WiMAX
    performance evaluation, 81
    advertisement, network topology acquisition, 109
    antenna bandwidth, propagation
    environments, 83–84 association procedure
    handover operations, 117
    levels of, 131–133
    network topology acquisition, 111–114 authentication protocols
    mesh networking security, 168–169 privacy key management version 1,
    236–237
    WiMAX security standards, 217–219 authorization keys (AKs)
    mesh networking connections, 169
    privacy key management (PKM) protocol, 220–221
    privacy key management (PKM) protocol version 2 derivation, 242–244
    vulnerabilities, 227
    WiMAX security standards, 216–217 authorization security association, WiMAX
    security system, 200–203
    contents of, 216–217
    automatic repeat request (ARQ), 182 MPDU retransmission scheme, 40–41
    B
    backbone hop-by-hop security, mesh networking, 169–170
    bandwidth allocation scheme
    handover model simulation and results, 141–143
    IEEE 802.16 quality-of-service standard, admission control simulation, 69–72
    media access (MAC) layer, 44–45 mesh topology, 52–53
    bandwidth request header, MAC protocol data units, 211–213
    base station (BS)
    5th plugfest testing of, 187–189 handover operations
    downlink targeting, 116–117
    fast BS switching, 118, 120–121 macro diversity handover, 118–120 termination procedures, 117
    media access (MAC) layer, point to multiple point (PMP) topology, 36–37, 212–213
    mesh networking security, 169 mobility support functions, 104 network security properties, 198–199 network topology acquisition
    advertisement, 109
    neighbor BS scanning, 109–111 plugfest testing of, 184–187
    transmitter power level controls, 189–190 basic channels, mesh networking
    TDMA framing and transmission timing, 153–154
    transmission scheduling, 154


    251




    basic service set (BSS), IEEE 802.11 standard, 7–8
    best-effort (BE) service
    IEEE 802.16 quality-of-service standard, 66
    scheduling, 69
    media access (MAC) layer, uplink scheduling, 44
    mesh networking, broadcast channel, 158 power-saving mechanisms, 105–109
    bit error rate (BER), receiver testing, 192 blocking probability, IEEE 802.16
    quality-of-service standard, admission control simulation, 69–72
    Bluetooth standard evolution of, 4–6
    structure and properties, 12–14 broadband wireless access (BWA) systems
    IEEE 802.11 standard and, 206 voice over Internet protocol (VoIP),
    129–131
    WiMAX performance evaluation, 80 broadcast channels, mesh networking,
    TDMA framing and transmission timing, 153–154


    C
    cancellation, handover operations, 116 carrier sense multiple access (CSMA),
    WiMAX security, 234
    carrier to interference noise ratio (CINR), network topology acquisition, neighbor BS scanning, 109–111
    CBC message authentication code (CCM), advanced encryption standard, 223–226
    cell reselection, handover operations, 115–116 cellular networks
    competing technologies, 15–16
    cost issues, 15
    design issues, 15
    evolution of, 8–11
    IEEE 802.16e standard for, 209 throughput performance, 15–16 WiMAX standardization for, 209
    centralized scheduling
    media access (MAC) layer, mesh topology, 53–54
    mesh networking, 149–150
    data channels, 158–161
    quality-of-service convergence sublayer, 165–167
    certification profiles, interoperability and certification testing, 180–183
    certification program abstract test suite, 183
    WiMAX systems, 179–183, 206–207
    channel quality information channel identifier (CQICH_ID), mobile subscriber stations, 140–141
    channel utilization
    IEEE 802.16 quality-of-service standard, scheduling simulation, 72–74
    mesh logical channels, transmission scheduling, 154–161
    code division multiple access (CDMA) cellular networks, 8–11
    handover operations, association levels, 132–133
    predicted handover scheme, 138–141 common part sublayer, MAC architecture,
    25–27
    complementary error function, propagation environments, 85–87
    conformance testing defined, 176
    WiMAX systems, 177–178 connection identifiers (CID)
    IEEE 802.16 PMP, 26–27
    media access (MAC) layer
    bandwidth allocation requests and grants, 44–45
    mesh topology, 51–52
    point to multiple point (PMP) topology, 36–37, 213
    service flows, 50–51
    mesh networking connections, 162–164 network security properties, 198–199
    connection maintenance, media access (MAC) layer, 47–49
    constellation error, transmitter testing for, 190
    contention resolution, media access (MAC) layer, request transmission, 46–47
    control subframes, mesh networking, TDMA framing and transmission timing, 152–154
    convergence sublayer
    MAC architecture, 25–26
    mesh networking, 149–150 quality-of-service (QoS) levels,
    165–167
    coordinated distributed scheduling messages, mesh networking, distributed election scheduling broadcast channels, 154–157




    cumulative distribution function (CDF), propagation environments, 87–90
    cyclic redundancy check (CRC), MAC layer threats, 233–234


    D
    data channels, mesh networking
    quality-of-service convergence sublayer, 165–167
    TDMA framing and transmission timing, 153–154
    transmission scheduling, 158–161 data encryption standard (DES)
    privacy key management version 1, 238–240
    WiMAX security system protocols for, 222–223
    security associations and, 216–217 data rates, WiMAX system performance,
    90–92
    data security association, WiMAX security system, 200–203
    contents of, 216–217
    decentralized scheduling, mesh networking, 149–150
    decision and initiation, handover operations, 116
    demand assigned multiple access (DAMA), media access (MAC) layer, bandwidth allocation requests, 44–45
    device under test (DUT) configuration adjacent channel leakage ratio
    measurements, 191–192
    receiver testing, 192
    transmitter power level controls, 189–190 transmitter spectral flatness, 190 transmitter spectral mask, 191
    direct-sequence spread spectrum (DSSS) waveform, IEEE 802.11 standard, 6–8
    discontinuous reception, mobility support functions and, 104
    disruption time (DT)
    handover model simulation and results, 141–143
    handover procedures, 130–131 distributed election scheduling broadcast
    channels, mesh transmission scheduling, 154–157
    distributed scheduling
    media access (MAC) layer, mesh topology, 52–53
    mesh networking, data channels, 158–161
    DOCSIS BPI+ protocol, WiMAX security and, 197–198
    downlink channel descriptor (DCD), network topology advertisement, 109
    downlink map (DL-MAP), media access (MAC) layer, point to multiple point (PMP) topology, 213
    downlink scheduling scheme, IEEE 802.16 quality-of-service standard, simulation, 72–74
    downlink targeting, handover
    synchronization, 116–117 DREG-CMD message, paging operation,
    121–124
    DREG-REQ, paging operation, 121–124 drops, in handover operations, 117–118 duplex techniques, MAC PDU transmission,
    39–40
    dynamic security associations, WiMAX system, 215–216


    E
    educational broadband services (EBS), WiMAX performance evaluation, 80
    emergency systems
    IEEE 802.16e standard for, 209 WiMAX standardization for, 209
    encapsulation technology, privacy sublayers, 27–28
    enter network code, paging operation, 124 error vector magnitude (EVM), transmitter constellation error, 190
    ETSI HIPERLAN standard, structure and properties, 11–12
    experimental data, WiMAX system performance, 92
    extended real-time polling service (ErtPS),
    IEEE 802.16e-2005 standard, 29 extended service set (ESS), IEEE 802.11
    standard, 7–8
    extensible authentication protocol (EAP) message systems in, 218
    WiMAX security system, 203, 219


    F
    fading characteristics, propagation environments, 84–85
    fast base station switching (FBSS), handover operations overview, 118–119
    fast Fourier transform (FFT), handover model simulation and results, 141–143




    5th plugfest architecture, WiMAX system testing, 187–189
    fixed broadband access, propagation environments, 83–84
    fixed WiMAX systems, performance evaluation, 78–79
    forward error correction, receiver testing, 192 frequency bands
    IEEE 802.16 standards for, 207
    WiMAX performance evaluation, 79–81 frequency division duplex (FDD)
    MAC PDU transmission, 39–40
    WiMAX system performance, data rates, 90–92
    Friis’ power transmission formula, propagation environments, 82–83


    G
    Gaussian distribution model, propagation environments, 85–87
    generic MAC header (GMH), protocol data units, 210–212
    generic packet convergence sublayer (GPCS), IEEE 802.16g standard, 31
    Global System for Mobile communications (GSM), cellular networks, 8–11
    grant mechanisms, IEEE 802.16
    quality-of-service standard, 67 guard channel method (GCM), handover
    procedures, 130–131


    H
    handover (HO) function
    base station downlink synchronization, 116–117
    base station termination, 117 cancellation operations, 116
    cell reselection, 115–116
    decision and initiation operations, 116 drops during, 117–118
    fast BS switching, 120–121 IEEE 802.16e-2005 standard, 29
    legacy procedures, 131–133 mobility support and, 104
    macro diversity, 118–120
    mobility support operations, 114–115 network entry/reentry, 118
    network topology acquisition, 109–114 ranging operations, 117
    scanning and association results, 117 simulation model and results, 141–143
    harmonics, transmitter measurements with, 192
    hashed message authentication code (HMAC)
    creation of, 217–218
    mesh networking connections, 163–164 security authentication, 169
    privacy key management version 1, 237–238
    WiMAX security system, 203 authentication protocols, 217–218
    authorization keys, 217
    high-speed downlink packet access (HSDPA) standard, cellular networks, 10–11
    HIPERLAN WLAN technology standard, evolution of, 11–12
    HiperMAN standard, development of, 207


    I
    identifiers, mesh networking connections, 162–164
    idle mode
    network reentry from, 125–126 paging operation timer, 121–124
    IEEE 802.11 standard
    broadband wireless access and, 206 complementary technologies, 16–17
    network backbone, 208–209 structure and properties, 6–8
    IEEE 802.15 standard, complementary technologies, 17
    IEEE 802.16-2001 standard, development of, 230
    IEEE 802.16-2004 standard
    adaptive antenna system (AAS), 24 adaptive modulation, 24
    evolution of, 22–28
    interoperability and certification testing, 179–183
    MAC layer, 25–28
    nonline-of-sight (NLOS) operation, 230–231
    physical layer specifications, 23–24 space time coding, 24–25
    IEEE 802.16a standard, evolution of, 22–23 IEEE 802.16b standard, evolution of, 22 IEEE 802.16c standard, evolution of, 21–22 IEEE 802.16d standard, media access (MAC)
    layer, point to multiple point (PMP) topology, 37–38
    IEEE 802.16e-2005 standard evolution of, 28–30
    handover procedures, 130–131
    legacy procedures, 131–133 mobility support
    handover mechanisms, 109–121




    location update, 124–126 network reentry from idle model,
    126–127
    overview, 104
    paging operations, 121–124
    power-saving mechanisms, 105–109 IEEE 802.16f standard, evolution of, 30 IEEE 802.16g standard, evolution of, 30–31 IEEE 802.16h standard, evolution of, 32 IEEE 802.16i standard, evolution of, 30 IEEE 802.16j standard, 33
    IEEE 802.16k standard, evolution of, 31–32 IEEE 802.16 standard
    evolution of, 20, 206
    fixed and mobile standards, 78–79 frequency bands, 79–81
    mesh topology, 26–27
    networking applications, 162–167 network security issues, 168–171 overview, 147–150
    physical layer specifications, 150–151 time division multiple access, 150–162
    overview of, 21–22
    proprietary solutions vs., 20–21 WiMAX security and, 197–198
    IEEE 802.16 Task Group E, competing technologies, 14–15
    IEEE 802.20 standard
    competing technologies, 14–15 structure and properties, 8
    IEEE 802.22 standard, wireless regional area network (WRAN), 14
    IEEE 802 standards
    structure and properties, 4–8 implementation extra information for testing
    (IXIT) protocol, abstract test suite, 182–183
    in-building penetration, propagation environments, 87–88
    independent basic service set (IBSS), IEEE
    802.11 standard, 7–8
    industrial, scientific, and medical (ISM) band,
    IEEE 802.11 standard, 6–8 interoperability testing, WiMAX systems,
    179–183



    Download 2,02 Mb.

    Do'stlaringiz bilan baham:
  • 1   ...   178   179   180   181   182   183   184   185   186




    Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
    ma'muriyatiga murojaat qiling

    kiriting | ro'yxatdan o'tish
        Bosh sahifa
    юртда тантана
    Боғда битган
    Бугун юртда
    Эшитганлар жилманглар
    Эшитмадим деманглар
    битган бодомлар
    Yangiariq tumani
    qitish marakazi
    Raqamli texnologiyalar
    ilishida muhokamadan
    tasdiqqa tavsiya
    tavsiya etilgan
    iqtisodiyot kafedrasi
    steiermarkischen landesregierung
    asarlaringizni yuboring
    o'zingizning asarlaringizni
    Iltimos faqat
    faqat o'zingizning
    steierm rkischen
    landesregierung fachabteilung
    rkischen landesregierung
    hamshira loyihasi
    loyihasi mavsum
    faolyatining oqibatlari
    asosiy adabiyotlar
    fakulteti ahborot
    ahborot havfsizligi
    havfsizligi kafedrasi
    fanidan bo’yicha
    fakulteti iqtisodiyot
    boshqaruv fakulteti
    chiqarishda boshqaruv
    ishlab chiqarishda
    iqtisodiyot fakultet
    multiservis tarmoqlari
    fanidan asosiy
    Uzbek fanidan
    mavzulari potok
    asosidagi multiservis
    'aliyyil a'ziym
    billahil 'aliyyil
    illaa billahil
    quvvata illaa
    falah' deganida
    Kompyuter savodxonligi
    bo’yicha mustaqil
    'alal falah'
    Hayya 'alal
    'alas soloh
    Hayya 'alas
    mavsum boyicha


    yuklab olish