New Cryptanalysis and Modelling for Wireless Networking
Alzaabi, Mohamed Abdulla Hasan Saif
High data rates and interoperability of vender devices have made WiMAX a prime desire for use worldwide. WiMAX is based on the IEEE 802.16 standard. IEEE 802.16a, b, c & d versions were updated within three years of the first launch of WiMAX. However, during those early years reports were published that highlighted the security weaknesses of the standard. These weaknesses prompted the IEEE to issue a new version, 802.16e to tackle the security issues. Despite this security enhancement, WiMAX remains vulnerable. This research project looks at the vulnerability of WiMAX 802.16e Subscriber Station/Mobile Station authentication at the initial entry and proposes approaches to the prevention of Denial of Service (DoS) attacks at this point in order to secure the Media Access Control (MAC) layer from such threats. A new protocol has been designed and developed to provide confidentiality, authentication and integrity to WiMAX users. This new protocol is integrated with Z algorithm (an algorithm described later in this paper) to provide: Confidentiality of management messages Message Authentication code ID to provide for message integrity and user authentication. A simulation package was also required, to prove that a linear load of DoS attack would disable or exhaust the capacity of the base station of a WiMAX network, as well as providing other simulation functions. The freely available simulation tool NIST (NIST IPSec (Internet Protocol Security) and IKE (Internet Key Exchange) Simulation) is oriented towards fixed network communications (NIIST, 2003). There are no other relevant simulation tools; hence the purpose of this research project is to develop a new tool to simulate WiMAX security vulnerabilities and test the new protocol.
MetadataShow full item record
Showing items related by title, author, creator and subject.
Renewal through participation in Global Food Security Governance : implementing the International Food Security and Nutrition Civil Society Mechanism to the Committee on World Food Security Duncan, J.; Barling, David (2012)The food commodity price rises from 2006 to 2008 engendered a period of political renewal and reform in the governance of global food security. The Committee on World Food Security (CFS) was designated as the main international ...
Christianson, B.; Hu, P. (University of Hertfordshire, 1995)In an open distributed system, resources must be shared among various users. Security is one of the major issues in designing such a system. When a computer system is connected to a network, it is very important to ensure ...
Ramalingam, Soodamani; Gan, Hock; Epiphaniou, Gregory; Mistretta, Emilio (2020-09-14)IoT systems differ from traditional Internet systems in that they are different in scale, footprint, power requirements, cost and security concerns that are often overlooked. IoT systems inherently present different fail-safe ...