Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1185448.1185474acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
Article

Security issues in privacy and key management protocols of IEEE 802.16

Published: 10 March 2006 Publication History
  • Get Citation Alerts
  • Abstract

    Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified in the MAC layer to address the privacy issues across the fixed Broadband Wireless Access (BWA). Several articles have been published to address the flaws in IEEE 802.16 security after the IEEE standard 802.16-2001 was released. However, the IEEE standard 802.16-2004 revision does not settle all the discovered problems and additional flaws remain. This paper gives an overview of the IEEE 802.16 standard, focusing on the MAC layer and especially the security sublayer. We analyze the security flaws in the standard as well as in related works, and illustrate possible attacks to the authentication and key management protocols. Possible solutions are also proposed to prevent these attacks. Finally, we propose a security handover protocol that should be supported in the future 802.16e for mobility.

    References

    [1]
    IEEE std 802.16-2001: Air Interface for Fixed Broadband Wireless Access Systems, 2002.
    [2]
    IEEE std 802.16-2004: Air Interface for Fixed Broadband Wireless Access Systems, 2004.
    [3]
    Intel white paper, "IEEE 802.16 and WiMax: Broadband Wireless Access for Everyone," 2004.
    [4]
    William A. Arbaugh, Narendar Shankar, Y. C. Justin Wan, "Your 802.11 Wireless network has No clothes (March 2001)," http://www.cs.umd.edu/~waa/wireless.pdf
    [5]
    Avi Freedman, Zion Hadad, "Handoff Schemes Overview and Guidelines for handoff Procedures in 802.16," IEEE C802.16sgm-02/24, 2002.
    [6]
    Matthew S. Gast, 802.11 Wireless Networks: The Definitive Guide, O'Reilly, 2002.
    [7]
    Kihun Hong, Souhwan Jung, Ki Jun Lee, Brian Lee, Jungwook Wang, "Secure Roaming of Key Association for Fast handover," IEEE C802.16e-04/407, 2004.
    [8]
    David Johnston, Jesse Walker, "Overview of IEEE 802.16 Security," IEEE Security & Privacy, May/June 2004.
    [9]
    Richard R. Joos, Anand R. Tripathi: Mutual Authentication in Wireless network (June 1997); http://cs.engr.uky.edu/~singhal/CS685-papers/joos97mutual.pdf
    [10]
    Kyung-ah Kim, Chong-Kwon Kim, Tongsok Kim, "A seamless handover Mechanism for IEEE 802.16e Broadband Wireless Access," International Scientific-Practical Conference (ISPC) Communication-2004, August 2004.
    [11]
    Itzik Kitroser, "IEEE 802.16e handoff draft," IEEE C802.16e-03/20rl, 2003.
    [12]
    Changhoi Koo, Sohyun Iim, Jungje Son, "Inter-BS communication for IEEE 802.16e handoff," IEEE 802.16e-03/29, 2003.
    [13]
    Jeff Mandin, 802.16e Privacy Key Management (PKM) version 2, IEEE C802.16e-02/131r1, 2002.
    [14]
    Wenbo Mao, Modern Cryptography: Theory and Practice, Pearson Education, Prentice Hall PTR, 2004.
    [15]
    Roger Marks, "A technical Overview of the WirelessMAN Air Interface for Broadband Wireless Access," IEEE C802.16-02/05, 2002.
    [16]
    Ron Olexa, Implementing 802.11, 802.16 and 802.20 Wireless network, ELSEVIER, July 2004.
    [17]
    Kaveh Pahlavan, Prashant Krishnamurthy, Principles of Wireless Networks: A unified Approach, Pearson Education, Prentice Hall PTR, 2002.
    [18]
    William Stalling, Cryptography and Network Security: Principles and Practices, 3rd edition, Pearson Education, Prentice Hall PTR, 2003.
    [19]
    Daniel Sweeney, WiMax Operator Manual: building 802.16 Wilreless Networks, Apress, 2005.
    [20]
    Feng Tian, DongXin Lu, Rui Li, "Comment on Security Roaming of Key association for Fast Handover," C802.16e-04/571r1, 2005.

    Cited By

    View all
    • (2021)Formal Analysis of SA-TEK 3-Way Handshake Protocols形式化分析SA-TEK 3步握手协议Journal of Shanghai Jiaotong University (Science)10.1007/s12204-021-2340-228:6(753-762)Online publication date: 2-Aug-2021
    • (2017)Countermeasures for layered security attacks on cognitive radio networks based on modified digital signature scheme2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS)10.1109/INTELCIS.2017.8260019(2-8)Online publication date: Dec-2017
    • (2017)A Technique to Reduce Problem of Delay in Key Rekeying in Mobile NetworksAdvances in Computing and Data Sciences10.1007/978-981-10-5427-3_47(448-456)Online publication date: 22-Jul-2017
    • Show More Cited By

    Index Terms

    1. Security issues in privacy and key management protocols of IEEE 802.16

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ACM-SE 44: Proceedings of the 44th annual Southeast regional conference
        March 2006
        823 pages
        ISBN:1595933158
        DOI:10.1145/1185448
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 10 March 2006

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. IEEE 802.16
        2. authentication
        3. key management
        4. roaming

        Qualifiers

        • Article

        Conference

        ACM SE06
        ACM SE06: ACM Southeast Regional Conference
        March 10 - 12, 2006
        Florida, Melbourne

        Acceptance Rates

        Overall Acceptance Rate 178 of 377 submissions, 47%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)7
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 26 Jul 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2021)Formal Analysis of SA-TEK 3-Way Handshake Protocols形式化分析SA-TEK 3步握手协议Journal of Shanghai Jiaotong University (Science)10.1007/s12204-021-2340-228:6(753-762)Online publication date: 2-Aug-2021
        • (2017)Countermeasures for layered security attacks on cognitive radio networks based on modified digital signature scheme2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS)10.1109/INTELCIS.2017.8260019(2-8)Online publication date: Dec-2017
        • (2017)A Technique to Reduce Problem of Delay in Key Rekeying in Mobile NetworksAdvances in Computing and Data Sciences10.1007/978-981-10-5427-3_47(448-456)Online publication date: 22-Jul-2017
        • (2016)Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay StationsJournal of Electrical and Computer Engineering10.1155/2016/98598302016(5)Online publication date: 1-Sep-2016
        • (2016)An empirical study of WIFI security and performance in Morocco - wardriving in Rabat2016 International Conference on Electrical and Information Technologies (ICEIT)10.1109/EITech.2016.7519621(362-367)Online publication date: May-2016
        • (2016)Authentication process enhancements in WiMAX networksSecurity and Communication Networks10.1002/sec.15779:17(4703-4725)Online publication date: 25-Nov-2016
        • (2016)Quantum-resistance authentication in centralized cognitive radio networksSecurity and Communication Networks10.1002/sec.14089:10(1158-1172)Online publication date: 10-Jul-2016
        • (2015)An enhanced authentication protocol for WRANs in TV white spaceSecurity and Communication Networks10.1002/sec.11718:13(2267-2278)Online publication date: 10-Sep-2015
        • (2014)Security in Wireless Metropolitan Area NetworksSecurity, Privacy, Trust, and Resource Management in Mobile and Wireless Communications10.4018/978-1-4666-4691-9.ch002(11-27)Online publication date: 2014
        • (2013)Security in Wireless Metropolitan Area NetworksWireless Network Security10.1007/978-3-642-36511-9_4(59-75)Online publication date: 2013
        • Show More Cited By

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media