security challenges in wimax
TRANSCRIPT
-
8/3/2019 Security Challenges in WiMAX
1/22
Security challenges in WiMAX
S. Yukesh Kumar
M. Neeraj Kumar
-
8/3/2019 Security Challenges in WiMAX
2/22
-
8/3/2019 Security Challenges in WiMAX
3/22
Introduction
WiMAX, meaning Worldwide Interoperability for Microwave
Access, is a telecommunication technology that provides
wireless transmission of data .
WiMAX is wireless broadband technology, and a great alternative to
fixed broadband connections such as cable or DSL.
The technology is based on the IEEE 802.16 standard (also
called Broadband Wireless Access).
-
8/3/2019 Security Challenges in WiMAX
4/22
WiMAX Tower
A single WiMAX tower can provide coverage to a very large area -- as big as
3,000 square miles (~8,000 square km).
A WiMAX tower station can connect directly to the Internet using a high-bandwidth, wired connection .
It can also connect to another WiMAX tower using a line-of-sight, microwave
link. This connection to a second tower (often referred to as a backhaul),
along with the ability of a single tower to cover up to 3,000 square miles, is
what allows WiMAX to provide coverage to remote rural areas.
-
8/3/2019 Security Challenges in WiMAX
5/22
Types of Services Nonline-of-sight (NLOS)
Point to multipoint. (tower to individual connection)
Line-of-sight (LOS)
Point to point. (tower to tower)
-
8/3/2019 Security Challenges in WiMAX
6/22
Architecture of WiMAX
-
8/3/2019 Security Challenges in WiMAX
7/22
How WiMAX works
-
8/3/2019 Security Challenges in WiMAX
8/22
Working1. SS begin scanning presets frequency for base station.
2. BS responds. Synchronizes with SS.
3. Ranging parameters sets UL-MAP messages in everyframe SS bursts with increasing power until itreaches/receives a ranging response from BS.
4. BS responds with timing and power adjustments,management CIDs (connection ID).
5. SS reports its physical layer capabilities(modulation/coding schemes)
6. BS accepts SS; is ready for service flow.
Base
Station
Subscriber
Station
-
8/3/2019 Security Challenges in WiMAX
9/22
Security issues
-
8/3/2019 Security Challenges in WiMAX
10/22
Loop holes
-
8/3/2019 Security Challenges in WiMAX
11/22
Types of layers
MAC layers
Physical layers
PKM (Privacy and Key Management Protocols)
-
8/3/2019 Security Challenges in WiMAX
12/22
Security layers
-
8/3/2019 Security Challenges in WiMAX
13/22
Physical layer threats
Since PS is above the PHY layer
Jamming
Scrambling
How to avoid
Frequency hopping
Direct sequence spread spectrum
Law enforcement
-
8/3/2019 Security Challenges in WiMAX
14/22
MAC Layer Threats Authentication
Lack of BS certificate
Forgeryorreplay attack by mutualauthentication
Denial of Service (DoS)
The attackers try to overload the server
with state transitions operations resulting
in a denial of service attack.
-
8/3/2019 Security Challenges in WiMAX
15/22
How to prevent MAC layer threats
Authorization
PKM may suffer from forgery attack due to
unauthenticated BS Avoid by mutual authentication or adding
random challenge text to authentication protocol
AK is generated totally by BS
SS can contributes some bits to generate AK Every certified MAC address should be distinct
-
8/3/2019 Security Challenges in WiMAX
16/22
Encryption process for MAC layer
-
8/3/2019 Security Challenges in WiMAX
17/22
Security issues inP
KM layer
WiMAX utilizes PKM to establish a
secure link between the BS and SS PKM uses followings to perform key
exchanges between SS and BSX.509 digital certificates
RSA public-key algorithmstrong encryption algorithm
-
8/3/2019 Security Challenges in WiMAX
18/22
RSA algorithm
-
8/3/2019 Security Challenges in WiMAX
19/22
Conclusion
-
8/3/2019 Security Challenges in WiMAX
20/22
-
8/3/2019 Security Challenges in WiMAX
21/22
-
8/3/2019 Security Challenges in WiMAX
22/22