security challenges in wimax

Upload: vanyuk

Post on 06-Apr-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 Security Challenges in WiMAX

    1/22

    Security challenges in WiMAX

    S. Yukesh Kumar

    M. Neeraj Kumar

  • 8/3/2019 Security Challenges in WiMAX

    2/22

  • 8/3/2019 Security Challenges in WiMAX

    3/22

    Introduction

    WiMAX, meaning Worldwide Interoperability for Microwave

    Access, is a telecommunication technology that provides

    wireless transmission of data .

    WiMAX is wireless broadband technology, and a great alternative to

    fixed broadband connections such as cable or DSL.

    The technology is based on the IEEE 802.16 standard (also

    called Broadband Wireless Access).

  • 8/3/2019 Security Challenges in WiMAX

    4/22

    WiMAX Tower

    A single WiMAX tower can provide coverage to a very large area -- as big as

    3,000 square miles (~8,000 square km).

    A WiMAX tower station can connect directly to the Internet using a high-bandwidth, wired connection .

    It can also connect to another WiMAX tower using a line-of-sight, microwave

    link. This connection to a second tower (often referred to as a backhaul),

    along with the ability of a single tower to cover up to 3,000 square miles, is

    what allows WiMAX to provide coverage to remote rural areas.

  • 8/3/2019 Security Challenges in WiMAX

    5/22

    Types of Services Nonline-of-sight (NLOS)

    Point to multipoint. (tower to individual connection)

    Line-of-sight (LOS)

    Point to point. (tower to tower)

  • 8/3/2019 Security Challenges in WiMAX

    6/22

    Architecture of WiMAX

  • 8/3/2019 Security Challenges in WiMAX

    7/22

    How WiMAX works

  • 8/3/2019 Security Challenges in WiMAX

    8/22

    Working1. SS begin scanning presets frequency for base station.

    2. BS responds. Synchronizes with SS.

    3. Ranging parameters sets UL-MAP messages in everyframe SS bursts with increasing power until itreaches/receives a ranging response from BS.

    4. BS responds with timing and power adjustments,management CIDs (connection ID).

    5. SS reports its physical layer capabilities(modulation/coding schemes)

    6. BS accepts SS; is ready for service flow.

    Base

    Station

    Subscriber

    Station

  • 8/3/2019 Security Challenges in WiMAX

    9/22

    Security issues

  • 8/3/2019 Security Challenges in WiMAX

    10/22

    Loop holes

  • 8/3/2019 Security Challenges in WiMAX

    11/22

    Types of layers

    MAC layers

    Physical layers

    PKM (Privacy and Key Management Protocols)

  • 8/3/2019 Security Challenges in WiMAX

    12/22

    Security layers

  • 8/3/2019 Security Challenges in WiMAX

    13/22

    Physical layer threats

    Since PS is above the PHY layer

    Jamming

    Scrambling

    How to avoid

    Frequency hopping

    Direct sequence spread spectrum

    Law enforcement

  • 8/3/2019 Security Challenges in WiMAX

    14/22

    MAC Layer Threats Authentication

    Lack of BS certificate

    Forgeryorreplay attack by mutualauthentication

    Denial of Service (DoS)

    The attackers try to overload the server

    with state transitions operations resulting

    in a denial of service attack.

  • 8/3/2019 Security Challenges in WiMAX

    15/22

    How to prevent MAC layer threats

    Authorization

    PKM may suffer from forgery attack due to

    unauthenticated BS Avoid by mutual authentication or adding

    random challenge text to authentication protocol

    AK is generated totally by BS

    SS can contributes some bits to generate AK Every certified MAC address should be distinct

  • 8/3/2019 Security Challenges in WiMAX

    16/22

    Encryption process for MAC layer

  • 8/3/2019 Security Challenges in WiMAX

    17/22

    Security issues inP

    KM layer

    WiMAX utilizes PKM to establish a

    secure link between the BS and SS PKM uses followings to perform key

    exchanges between SS and BSX.509 digital certificates

    RSA public-key algorithmstrong encryption algorithm

  • 8/3/2019 Security Challenges in WiMAX

    18/22

    RSA algorithm

  • 8/3/2019 Security Challenges in WiMAX

    19/22

    Conclusion

  • 8/3/2019 Security Challenges in WiMAX

    20/22

  • 8/3/2019 Security Challenges in WiMAX

    21/22

  • 8/3/2019 Security Challenges in WiMAX

    22/22