Show simple item record

dc.contributor.authorAlzaabi, Mohamed Abdulla Hasan Saif
dc.date.accessioned2016-04-18T09:57:02Z
dc.date.available2016-04-18T09:57:02Z
dc.date.issued2016-04-18
dc.identifier.urihttp://hdl.handle.net/2299/17115
dc.description.abstractHigh data rates and interoperability of vender devices have made WiMAX a prime desire for use worldwide. WiMAX is based on the IEEE 802.16 standard. IEEE 802.16a, b, c & d versions were updated within three years of the first launch of WiMAX. However, during those early years reports were published that highlighted the security weaknesses of the standard. These weaknesses prompted the IEEE to issue a new version, 802.16e to tackle the security issues. Despite this security enhancement, WiMAX remains vulnerable. This research project looks at the vulnerability of WiMAX 802.16e Subscriber Station/Mobile Station authentication at the initial entry and proposes approaches to the prevention of Denial of Service (DoS) attacks at this point in order to secure the Media Access Control (MAC) layer from such threats. A new protocol has been designed and developed to provide confidentiality, authentication and integrity to WiMAX users. This new protocol is integrated with Z algorithm (an algorithm described later in this paper) to provide:  Confidentiality of management messages  Message Authentication code  ID to provide for message integrity and user authentication. A simulation package was also required, to prove that a linear load of DoS attack would disable or exhaust the capacity of the base station of a WiMAX network, as well as providing other simulation functions. The freely available simulation tool NIST (NIST IPSec (Internet Protocol Security) and IKE (Internet Key Exchange) Simulation) is oriented towards fixed network communications (NIIST, 2003). There are no other relevant simulation tools; hence the purpose of this research project is to develop a new tool to simulate WiMAX security vulnerabilities and test the new protocol.en_US
dc.language.isoenen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subject4G securityen_US
dc.subject5G securityen_US
dc.subjectRSAen_US
dc.subjectZRSAen_US
dc.subjectZ Algorithmen_US
dc.subjectWiMAX Securityen_US
dc.subjectLTE Securityen_US
dc.subjectDoS attacksen_US
dc.subjectEncryptionen_US
dc.subjectDecryptionen_US
dc.subjectNetSecSimen_US
dc.subjectNetwork Security Simulatoren_US
dc.titleNew Cryptanalysis and Modelling for Wireless Networkingen_US
dc.typeinfo:eu-repo/semantics/doctoralThesisen_US
dc.identifier.doi10.18745/th.17115
dc.identifier.doi10.18745/th.17115
dc.type.qualificationlevelDoctoralen_US
dc.type.qualificationnamePhDen_US
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record