New Cryptanalysis and Modelling for Wireless Networking
View/ Open
Author
Alzaabi, Mohamed Abdulla Hasan Saif
Attention
2299/17115
Abstract
High data rates and interoperability of vender devices have made WiMAX a prime desire for use worldwide.
WiMAX is based on the IEEE 802.16 standard. IEEE 802.16a, b, c & d versions were updated within three years of the first launch of WiMAX. However, during those early years reports were published that highlighted the security weaknesses of the standard. These weaknesses prompted the IEEE to issue a new version, 802.16e to tackle the security issues. Despite this security enhancement, WiMAX remains vulnerable.
This research project looks at the vulnerability of WiMAX 802.16e Subscriber Station/Mobile Station authentication at the initial entry and proposes approaches to the prevention of Denial of Service (DoS) attacks at this point in order to secure the Media Access Control (MAC) layer from such threats.
A new protocol has been designed and developed to provide confidentiality, authentication and integrity to WiMAX users. This new protocol is integrated with Z algorithm (an algorithm described later in this paper) to provide:
Confidentiality of management messages
Message Authentication code
ID to provide for message integrity and user authentication.
A simulation package was also required, to prove that a linear load of DoS attack would disable or exhaust the capacity of the base station of a WiMAX network, as well as providing other simulation functions. The freely available simulation tool NIST (NIST IPSec (Internet Protocol Security) and IKE (Internet Key Exchange) Simulation) is oriented towards fixed network communications (NIIST, 2003). There are no other relevant simulation tools; hence the purpose of this research project is to develop a new tool to simulate WiMAX security vulnerabilities and test the new protocol.
Publication date
2016-04-18Published version
https://doi.org/10.18745/th.17115https://doi.org/10.18745/th.17115
Other links
http://hdl.handle.net/2299/17115Metadata
Show full item recordRelated items
Showing items related by title, author, creator and subject.
-
Renewal through participation in Global Food Security Governance : implementing the International Food Security and Nutrition Civil Society Mechanism to the Committee on World Food Security
Duncan, J.; Barling, David (2012)The food commodity price rises from 2006 to 2008 engendered a period of political renewal and reform in the governance of global food security. The Committee on World Food Security (CFS) was designated as the main international ... -
Towards a National Sustainable Food Security Policy : A project to map the policy interface between Food Security and Sustainable Food Supply
Barling, David; Sharpe, R.; Lang, T. (Centre for Food Policy, City University, London, 2008)Report to the Esmee Fairburn Foundation -
A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments
Ramalingam, Soodamani; Gan, Hock; Epiphaniou, Gregory; Mistretta, Emilio (2020-09-14)IoT systems differ from traditional Internet systems in that they are different in scale, footprint, power requirements, cost and security concerns that are often overlooked. IoT systems inherently present different fail-safe ...