New Cryptanalysis and Modelling for Wireless Networking
Alzaabi, Mohamed Abdulla Hasan Saif
High data rates and interoperability of vender devices have made WiMAX a prime desire for use worldwide. WiMAX is based on the IEEE 802.16 standard. IEEE 802.16a, b, c & d versions were updated within three years of the first launch of WiMAX. However, during those early years reports were published that highlighted the security weaknesses of the standard. These weaknesses prompted the IEEE to issue a new version, 802.16e to tackle the security issues. Despite this security enhancement, WiMAX remains vulnerable. This research project looks at the vulnerability of WiMAX 802.16e Subscriber Station/Mobile Station authentication at the initial entry and proposes approaches to the prevention of Denial of Service (DoS) attacks at this point in order to secure the Media Access Control (MAC) layer from such threats. A new protocol has been designed and developed to provide confidentiality, authentication and integrity to WiMAX users. This new protocol is integrated with Z algorithm (an algorithm described later in this paper) to provide: Confidentiality of management messages Message Authentication code ID to provide for message integrity and user authentication. A simulation package was also required, to prove that a linear load of DoS attack would disable or exhaust the capacity of the base station of a WiMAX network, as well as providing other simulation functions. The freely available simulation tool NIST (NIST IPSec (Internet Protocol Security) and IKE (Internet Key Exchange) Simulation) is oriented towards fixed network communications (NIIST, 2003). There are no other relevant simulation tools; hence the purpose of this research project is to develop a new tool to simulate WiMAX security vulnerabilities and test the new protocol.
MetadataShow full item record
Showing items related by title, author, creator and subject.
Garzia, Fabio; Borghini, Francesco; Bruni, Alberto; Mighetto, Paolo; Ramalingam, Soodamani; B. Russo, Simona (2020-02-01)The assessment of perceived risk by people is extremely important for safety and security management. Each person is based on the opinion of others to make a choice and the Internet represents the place where these opinions ...
A Stochastic Method to Physical Layer Security of an Amplify-and-Forward Spectrum Sensing in Cognitive Radio Networks: Secondary User to Relay Simpson, Oluyomi; Sun, Yichuang (IEEE, 2019-07-22)In this paper, a framework for capitalizing on the potential benefits of physical layer security in an amplify-and-forward cooperative spectrum sensing (AF-CSS) in a cognitive radio network (CRN) using a stochastic geometry ...
A Stochastic based Physical Layer Security in Cognitive Radio Networks: Cognitive Relay to Fusion Center Simpson, Oluyomi; Sun, Yichuang (IEEE, 2020-01-16)Cognitive radio networks (CRNs) are found to be, without difficulty wide-open to external malicious threats. Secure communication is an important prerequisite for forthcoming fifth-generation (5G) systems, and CRs are not ...