publication . Part of book or chapter of book . Conference object . 2012

Key Management Protocol in WIMAX Revisited

Kahya, Noudjoud; Ghoualmi, Nacira; Lafourcade, Pascal;
Open Access
  • Published: 01 Jan 2012
  • Publisher: Springer Berlin Heidelberg
Abstract
International audience; Without physical boundaries, a wireless network faces many more vulnerabilities than a wired network does. Compared to Wi-Fi, security has been included in the design of WiMAX systems at the very start. IEEE802.16 standard (WiMAX) provides a security sublayer in the MAC layer to address the privacy issues across the fixed BWA (Broadband Wireless Access). After the launch of this new standard, a number of security issues were reported in several articles. Ever since the beginning, work has been in progress for the neutralization of these identified threats. In this paper, we first overview the IEEE802.16 standard, especially the security s...
Subjects
ACM Computing Classification System: ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS
free text keywords: Wireless broadband, Authentication protocol, Key management, Wireless network, Computer network, business.industry, business, Cryptographic protocol, WiMAX, Vulnerability, Computer science, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]

[1] Cremers, C.: Scyther-Semantics and verification of security protocols. PhD dissertation; Eindhoven University of technology (2006)

[2] IEEE Std. 802.16-2001, IEEE Standard for Local and Metropolitan Area Networks Part16: Air Interface for Fixed Broadband Wireless Access Systems, IEEE 2002 (2002)

[3] IEEE Std. 802.16-2004, IEEE Standard for Local and Metropolitan Area Networks Part16: Air Interface for Fixed Broadband Wireless Access Systems, IEEE 2004 (2004)

[4] IEEE Std. 802.16e-2005, IEEE Standard for Local and Metropolitan Area Networks Part16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems, IEEE 2006 (2006)

[5] Abbaci-kahya, N., Ghoualmi, N.: Security in Wimax. In: International Conference on Information Technology and e-Services, Tunisia (2011) ISBN 978-9938-9511-03

[6] Xu, S., Huang, C.T.: Attacks on PKM protocols of IEEE 802.16 and its later versions. In: Proceedings of 3rd International Symposium on Wireless Communication Systems (ISWCS 2006), Valencia, Spain (2006)

[7] Cremers, C.J.F.: The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414-418. Springer, Heidelberg (2008)

[8] Lang, W.-M., Wu, R.-S., Wang, J.-Q.: A Simple Key Management Scheme based on WiMAX. In: International Symposium on Computer Science and Computational Technology, IEEE 2008 (2008)

[9] Johnston, D., Walker, J.: Overview of IEEE 802.16 security. IEEE Security and Privacy Magazine 2(3), 40-48 (2004)

[10] Altaf, A., Younus Javed, M., Ahmed, A.: Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005. College of Signals, NUST. In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, IEEE 2008 (2008)

Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Part of book or chapter of book . Conference object . 2012

Key Management Protocol in WIMAX Revisited

Kahya, Noudjoud; Ghoualmi, Nacira; Lafourcade, Pascal;