Sie sind auf Seite 1von 6

2014 5th International Conference on Computer and Communication Technology

Mobile WiMAX Network Security Threats and Solutions: A Survey

Vinod Kumar Jatav Dr. Vrijendra Singh


Division of Information Technology Division of Information Technology
Indian Institute of Information Technology, Allahabad Indian Institute of Information Technology, Allahabad
Jhalwa, Allahabad (U.P.), India Jhalwa, Allahabad (U.P.), India
vinodj217@gmail.com vrijendra.singh@gmail.com

AbstractIEEE 802.16 based WiMAX is an emerging wireless of IEEE 802.16 extensions [7][9][10] from the beginning to
Internet technology. Salient features of WiMAX such as high last release.
speed internet facility over a long distance, quality of service,
scalability, security, and mobility proves it better than Wi-Fi TABLE I. EVOLUTION OF WIMAX STANDARDS
Internet access. Security is a vital requirement to prevent IEEE Year Freq. Specific Features
WiMAX network from the various attacks and to increase the Std. Band
reliability. This survey paper presents the threats associated Initial version of WiMAX based on the
with the layers in WiMAX along with possible solutions. The 802.16 2001 10- single-carrier physical layer and the
paper reviews the physical layer threats i.e. scrambling and 66 burst TDM MAC layer [26].
jamming, MAC layer threats i.e. user authentication and data GHz Uses LoS towers to fixed locations.
confidentiality, routing layer threats i.e. black-hole attack and
Operates with NLoS (Lower freq. band
other miscellaneous attacks e.g. Man-in-the-Middle (MITM),
802.16a 2003 2-11 can easily penetrate barriers.
Denial of Service (DoS) and Bandwidth Spoofing. The paper GHz Max Transmission rate is 75 Mbps.
observes that jamming attack and eavesdropping of
802.16c 2003 10- Broadband Wireless Access (BWA).
management messages are the most destructive attacks for
66 Interoperability specification.
WiMAX network. GHz
Based on 802.16a standard with some
Keywords-Mobile WiMAX, Security Attack, Privacy Key 802.16d 2004 2-11 improvements and supports both TDD
Management, Base Station, Mobile Station GHz and FDD transmissions.
Mobile WiMAX supports mobile
I. INTRODUCTION stations (MS).
Operates with NLoS transmission,
Worldwide-Interoperability for Microwave-Access 802.16e 2005 2-6 Multicast and broadcast services.
(WiMAX) is an emerging wireless internet technology which GHz Mobility support to 65 mph with data
provides higher data transmission rate up to 70 Mbps with a transfer rate up to 15 Mbps and
broad coverage of 30 miles. Broad coverage of WiMAX coverage area of 1-3 miles.
makes it suitable for Wireless Last Mile Technology. Privacy Sub-Layer for N/W security and
Power saving modes for MS.
WiMAX apply point-to-point (PP) and point-to-multipoint Introduces the mesh networking and
(PMP) applications to provide its services [1]. It supports 2-11 Management Information Base.
two type of transmission techniques Line-of-Sight (LoS) and 802.16f 2005 GHz Ability to bypass obstacles, which
Non-Line-of-Sight (NLoS). WiMAX aims to deploy improves the coverage area.
Broadband Wireless Metropolitan Area Network (WMAN) 802.16g Management Planes Procedure and
[2] and integrates the benefits of broadband technology and Services, Mobility at higher layer.
Wi-Fi access. IEEE 802.16e (Mobile WiMAX) [4] supports 802.16h Improved Coexistence Mechanisms for
License Exempt Operation [19].
the wireless connection of mobile devices, such as laptops,
802.16i 2007- 2-11 Mobile Management Info. Base.
smart phones etc. Mobile WiMAX networks are also known 2011 GHz Multi-hop Relay specifications.
as the Next Generation Networks (NGN). High bandwidth, 802.16j Advance Air Interface (WiMAX2.0).
quality of services, security, deployment ease, full duplex 802.16k Data transfer rate of 1Gbps for fixed
including DSL/cable, and low cost are the major strengths 802.16m subscribers and 100Mbps for mobile
behind the popularity of WiMAX applications. subscribers [18].
WiMAX Forum, a non-profit organization encourages
IEEE 802.16 compliance and the interoperability [3].The
Fig. 1 shows the architectural model for a Mobile
IEEE 802.16 standards have been extended to gratify the WiMAX network. Mobile WiMAX network architecture
growing demands and security for broadband wireless consists of the following components [6]:
communication [8]. Table I shows the development phases

978-1-4799-6758-2/14/$31.00 2014 IEEE 135


II. WIMAX LAYER ARCHITECTURE AND SECURITY
Fig. 2 shows the architecture of WiMAX protocol
Layers.

Figure 2. 802.16 Layer Architecture

A. Physical Layer (PHY)


Figure 1. WiMAX architectural components.
Physical layer provides two-way mapping between MAC
Mobile Subscriber Station (MS): MS is a mobile Layer PDUs and PHY layer frames [3]. Physical layer
device used by the mobile subscriber to provide defines the transmission power and modulation-
connectivity between subscriber equipment and base demodulation techniques.
station equipment. B. Medium Access Control Layer (MAC)
Base Transceiver Station (BTS): BTS is known as MAC layer of WiMAX provides an edge between the
BS which is an electronic device with a tower. Each network layer and the physical layer. MAC layer prepares
BS provides large area coverage, also known as cell. MAC PDUs from the packets or ATM Cells received from
Any wireless device located in the cell can access the network layer. In addition, MAC Layer maintains the
the internet. According to IEEE 802.16, the scheduling and multiple access connection [7]. Sub-Layers
maximum radius of a cell is 30-mile [5]. of MAC Layer are discussed below.
Access Service Network (ASN): ASN is a complete Convergence Sub-Layer (CS): CS layer adapts data
set of network functions that provide radio access to units (IP packets or ATM cells) from higher layers
a subscriber. ASN includes DHCP addressing and prepares MAC Service Data Unit (SDU).
function, proxy AAA (Authentication, Authorization Mapping between higher level data services to MAC
and Accounting) server, and other IP-based layer service is also done by Service Access Points
resources, including network management [6]. Radio (SAP) at CS layer. [3].
access network is created by multiple ASNs and Common Part Sub-Layer (CPS): CPS defines the
base stations. ASN is used in the handover process, rules for system access, grant connection control,
mobility management, Quality of Service and radio uplink scheduling, bandwidth request and allocation
resource management [7]. etc. CPS also handles MAC PDU construction,
Connectivity Service Network (CSN): The IP connection establishment and bandwidth
connectivity services to the subscribers are provided management. MAC SAPs exchanges MAC SDUs
by CSN through the ASN [6]. The Network Service with the CS layer. SPS is tightly incorporated with
Provider (NSP) uses CSN for internet connectivity, the Security Sub-Layer [3].
management of IP addresses, authentication, Security Sub-Layer: Security Sub-Layer exchanges
authorization and roaming among the ASNs [7]. MAC PDUs with physical layer. This Sub-layer is
Rest of the paper is organized in the following manner: responsible for the encryption/decryption of MAC
Section 2 presents an overview of WiMAX Layer SDUs and MAC PDUs including with authentication
architecture. Comprehensive survey of Mobile WiMAX handling and secure key exchange.
network security attack/threat models and solutions have Fig. 3 shows the security sub-layer of MAC for Mobile
been reviewed in section 3. Section 4 contains the analysis WiMAX. Security Sub-Layer of MAC [12] defines all the
part of the survey paper and discusses about the various kind security specifications related to IEEE 802.16 standard.
of existing simulators for WiMAX. Finally, Section 5
concludes the survey paper followed by the references.

136
associated with both the layers of WiMAX and proposes
some enhancements to the existing model to improve the
performance of the encryption algorithms [2].
Solution: Paper [26] analyzes the security issues at
physical layer in WiMAX and proposed a new method to
solve the security issues using neural cryptography, which
could generate a pair of secret keys through neural
synchronization [26]. Research paper [28] introduced the
scrambling attack at Physical layer in WiMAX networks and
provided a prevention approach DCJS [27]. Table II briefs
Figure 3. IEEE 802.16 MAC Security Sub-layer the attacks and countermeasures for WiMAX layer threats.
TABLE II. WIMAX LAYER THREATS AND COUNTERMEASURES
Security Sub-Layer applies three steps to support
WiMAX security; Subscriber Authentication (at the time of Layer Attack Countermeasure
entry in to the network), Subscriber Authorization (if the Jamming attack Increase the power or
subscriber is provisioned by the NSP), and then Encryption bandwidth of signals
(for the secure key exchange and data traffic). Component Scrambling attack Anomalies monitoring,
Protocols at Security Sub-layer guarantee the authorization Physical DCJS [23]
Layer
and confidentiality at the time of link establishment between Water-Torture attack Discarding bogus frames
the authorized parties (service provider and subscriber) [19]. Forgery attack Mutual authentication
Encapsulation Protocol (EP): EP secures packet data Replay attack Mutual authentication
across the IEEE 802.16d (fixed BWA) network. It
MAC Management Diffie-Hellman key
defines a set of well defined cryptographic suites message in Initial agreement scheme
(pairs of data encryption and authentication Network Entry
algorithms) and protocol to apply those algorithms to MAC Access Network Security PKI based key exchange[46]
MAC PDUs [20]. Layer MITM Attack Diffie-Hellman key
Protocol for Key Management (PKM): PKM exchange protocol
provides secure distribution of featured data from BS DoS Attack Digital Signatures
to SS. PKM helps SS and BS in the synchronization
of featured data. PKM imposes restricted network B. Routing Layer Attacks in WMN
access to the BS. The Warm-hole attack using sinkhole attack at network
Security Sub-Layers of IEEE 802.16d [21] and IEEE layer of Relay WiMAX (IEEE 802.16j) is a severe attack
802.16e [4] states the security methods for fixed WiMAX [50].The performance of Black hole attack in WiMAX-
and mobile WiMAX networks respectively. Fixed network WLAN interface network, with high impact with fewer
uses protocol PKMv1 for security architecture and consist efforts by intruder nodes is presented in [29][30]. Black Hole
some of the security issues. Mobile WiMAX uses PKMv2 attack affects the performance of entire network like
protocol which provides flexible solutions to the network decrease the throughput and increase the packet drop or
security issues including with authentication for devices and packet delay [29].
subscribers between MSs and CSNs. PKMv2 authentication Solution: Paper [31] discusses the main solutions for
protocol is a 3-way hand shaking process, including with a routing security in Wireless Mesh Networks (WMN) and
confirmation message from MS to BS. presents a model CONFIDENT comprising a novel way to
characterize the effectiveness of such approaches.
III. MOBILE WIMAX ATTACKS AND SOLUTIONS CONFIDANT is a secure routing protocol based on the DSR
WiMAX security issues and solutions have been protocol in NS-2 simulator. Network Entry Process with
discussed by many of the researchers in the past. Problems of Reliable Counter (NEPRC) scheme related threats have been
802.16d and the analysis of WiMAX security [23], Security presented in [32] along with an enhanced solution to detect
issues and solutions for both PMP and mesh networks [24]. and prevent the topological attacks including wormhole
This section has categorized these researcher papers based on attacks and sinkhole attacks completely in WMN.
the nature of attacks and presents a comprehensive review
with solutions. C. Security Sub-Layer and Encryption
An interdependent and open security plan has been
A. Physical and MAC Layer Attacks proposed in [38], which offers a centralized management
Threats associated with the physical layer and MAC solution for the authentication, authorization and accounting
layer are reviewed and ranked in [3] and are surveyed in part for a WiMAX network. Yang and Li has given an
[12]. An overview of the WiMAX security architecture has overview of the security issue on both the layers of WiMAX
been discussed along with various kinds of threats at in their research paper [39]. Authentication, encryption, and
Physical Layer (scrambling and jamming) and MAC Layer availability security mechanisms along with security threats
(forgery attack) in [29][30]. Paper [2] examines the threats to WiMAX network have been discussed in [1]. Huang and

137
[16] have discussed about the security Sub-layer, Solution: Paper [8] provides a comprehensive taxonomy
Authorization Protocol, Key Management Protocol, of attacks and countermeasures on 802.16 followed by a full-
Encryption and Security Issues in Multi-hop scale assessment study of indicative attacks that belong to
Communications for WiMAX. broader attack classes. Each attack has been classified based
Solution: Paper [40] compared the security mechanisms on its type, occurrence, impact upon the system etc with
in authentication protocol (PKM). A comprehensive security possible countermeasures and remedies.
frame-work for mobile WiMAX has been presented in [41]
which uses public key certificates and HIBC. Implemented E. NSP Security Concerns
framework provides a complete, secure and efficient solution According to the white paper [6] presented by Motorola
for stationary and mobile subscribers, compared to the Incorporation, it is the responsibility of the NSPs to develop
proposed standard (PKMv2). comprehensive security strategies for the design of secure
network, policy, integration and operational security
D. WiMAX Attacks based on Risk Level practices. Table III lists the major concerns related to
Fig. 4 shows the list of WiMAX attacks based on their WiMAX security for NSPs [6]:
risk level [8] [33]:
TABLE III. WIMAX SECURITY CONCERNS FOR NSPS
Requirement Threat Description
Confident- MITM One-way or two-way impersonation
iality between BS and MS.
Privacy Attacker captures real-time packets and
Compro- does offline analysis to detect the
mise management traffic information over
physical links (wired or wireless).
Integrity
Theft of Attacker MS (without proper
Service authorization and online/offline auditing)
accesses services with no payments.
Physical Disturbing of physical links (like
DoS jamming attack) disgraces the network
services and performance.
Injection of modified traffic control
Protocol information can be used to tire out the
Availability DoS resources and network performance.
Repeatedly legitimate messages are
Replay inserted to drain network resources or to
exclude legitimate MS.

F. MITM and DoS Attacks


Paper [22][34] presents an overview of Mobile WiMAX
protocol layer and security scheme including with MITM
attacks and DoS Service attacks.

Figure 4. WiMAX Attacks

Paper [33] presents different security vulnerabilities


found in IEEE 802.16e with possible solutions to eliminate
them. Research paper [31] focuses on problems regarding
fixed WiMAX network including with request and RNGRSP Figure 5. SINEP Model
authorization.

138
Solution: Focusing on MITM and DoS attacks, a Diffie- plays a key role in the performance and reliability for
Hellman key exchange protocol based model (SINEP) has WiMAX network. Implementation of top level security is
been proposed in [22]. SINEP model shown in figure 5 highly required to lessen the threats in the network.
reduces the possibilities of MITM attacks and defends Like other wireless networks, WiMAX network is also
against DoS attacks toward mobile WiMAX. The model uncovered to many of the security flaws at both the protocol
used H parameter to detect DDoS attacks for the traffic layers i.e. Physical Layer and MAC Layer. This survey paper
generated in Mobile WiMAX Network. High amount categorizes the security threats related to the WiMAX and
transmission of RNG-REQ messages toward the Base presents them along with the proposed solutions for the ease
Station introduces the DDoS attacks. An attacker node can of new researchers.
misuse RNG-REQ messages to waste the resources of the In future, the collaboration of multiple attacks/attackers
network by changing some fields randomly and forwarding may cause more severe results, if they are taken together.
to the Base Station in bulk [36]. Simulation results of [36]
show the statistical property variations among the normal REFERENCES
and attack traffic patterns. Research paper [21] presents [1] J. Qayyum, M. Lal, F. Khan, M. Imad, Survey & assessment of
RNG-RSP message attack and concludes that it is vulnerable wimax, its security threats and their soltuions, International Journsal
to DoS attack in WiMAX. A robust model ISNAP for DoS, of Video & Image Processing and Network Security 11 (2011) 3647.
MITM, and replay attacks has been presented in [35]. DoS [2] M. Habib, T. Mehmood, F. Ullah, M. Ibrahim, Performance of wimax
attack traffic on the Wi-Bro network, logs generation and the security algorithm (the comparative study of rsa encryption algorithm
trackbacking of the attackers has been analyzed in [37]. with ecc encryption algorithm), International Conference on
Computer Technology and Development, ICCTD09., volume 2,
G. Miscellaneous Threats IEEE, 2009, pp. 108112.
A detailed literature review has been presented in [42] for [3] M. Barbeau, Wimax/802.16 threat analysis, in: Proceedings of the 1st
WiMAX network vulnerabilities. Paper [15] proposes an ACM international workshop on Quality of service & security in
wireless and mobile networks, ACM, 2005, pp. 815.
algorithm for WiMAX network system to prevent
[4] I. L. S. Committee, et al., Ieee standard for local and metropolitan
fixed/mobile misbehavior node attacks. Analysis of BWA area networks part 16: Air interface for fixed and mobile broadband
technology has been presented in paper [7]. It compares wireless access systems amendment 2: Physical and medium access
WiMAX technology with Wi-Fi and 3G internet control layers for combined fixed and mobile operation in licensed
technologies. Paper [6] discusses reference architecture for bands and corrigendum 1, IEEE std 802 (2005).
Mobile WiMAX Security. Paper [43] classified wireless [5] M. Chakraborty, D. Bhattacharyya, Overview of end-to-end wimax
attack on a system into four major classes: interception, network architecture, WiMAX SECURITY AND QUALITY OF
SERVICE (2010) 1.
fabrication, modification, interruption including with a fifth
class of attacks repudiation. Ranking of these threats [6] Paolini, Monica, and S. F. Consulting. "Building end-to-end WiMAX
networks."Senza Fili Consulting (2007).
according to the level of risk is presented in [44].
[7] M. S. Islam, M. T. Alam, Wimax: An analysis of the existing
technology and compare with the cellular networks (2009).
IV. ANALYSIS AND SIMULATION TOOLS
[8] C. Kolias, G. Kambourakis, S. Gritzalis, Attacks and countermeasures
Many of the security issues had already been fixed by the on 802.16: Analysis and assessment (2013).
evolutionary development in 802.16 extensions, but still [9] S. S. Hasan, M. A. Qadeer, Wimax as a next generation wireless
some security issues exist without any appropriate solution. network, in: 2nd IEEE International Conference on Computer Science
Threats or vulnerabilities related to WiMAX layers have and Information Technology. ICCSIT., IEEE, 2009, pp. 485489.
fascinated the concentration of researchers for gentle [10] R. K. Nichols, P. C. Lekkas, Wireless security, McGraw-Hill New
solutions. Threats like jamming, scrambling, water-torture, York, 2002.
forgery, and replay attacks are of major consideration at [11] H. Rashvand, Wimax cybercity & ngn, in: Proceedings of the
WiMAX Physical layer. Critical threats at MAC layer of International Conference on Mobile Technology, Applications, and
Systems, ACM, 2008, p. 108.
WiMAX are MAC management message eavesdrop, MITM
[12] T. Nguyen, A survey of wimax security threats, Computer Science
and DoS attacks [5].
Some of the most well-known and widely used Department, Washington University , 2009.
simulators have been taken in the consideration out of the [13] S. Katti, B. Krishnamurthy, D. Katabi, Collaborating against common
research papers [5][36][51][52][53][54][ 55] viz. NS-2, NS- enemies, Proceedings of the 5th ACM SIGCOMM conference on
3, OPNET, Qualnet, Asset 3G/WiMAX, Winprop and Internet Measurement, USENIX Association, 2005, pp. 3434.
NCTuns etc. OPNET Modeler Wireless Suite supports [14] S. Chen, J. Xu, Z. Kalbarczyk, K. Iyer, Security vulnerabilities: From
modeling and simulation of WiMAX Network [56]. It analysis to detection and masking techniques, Proceedings of the
includes NGN architectures designing, application IEEE 94 (2006), pp. 407418.
performance prediction, and development of scheduling [15] R. K. Jha, I. Z. Bholebawa, U. D. Dalal, A. V. Wankhede, Detection
schemes for BS and MS. and fortification analysis of wimax network: With misbehavior node
attack, Intl J. of Communications, Network and System Sciences,
V. CONCLUSION 2012,pp. 353367.
[16] C.-T. Huang, J. M. Chang, Responding to security issues in wimax
A wireless network system makes the use of an open and
insecure radio channel with kind of security issues (traffic networks, IT Professional, 2008, pp. 1521.
confidentiality, integrity) and network attacks [17]. Security

139
[17] L. Cuilan, A simple encryption scheme based on wimax, International [37] D. Pareek, Economics of wimax, The Business of WiMAX, 173210.
Conference on E-Business and Information System Security, [38] H. Yu, P. B. Gibbons, M. Kaminsky, Toward an optimal social
EBISS09. IEEE, 2009, pp. 14. network defense against sybil attacks, Proceedings of the twenty-sixth
[18] M. Habib, M. Ahmad, A review of some security aspects of wimax annual ACM symposium on Principles of distributed computing,
and converged network, 2nd International Conference on ACM, 2007, pp. 376377.
Communication Software and Networks. IEEE, 2010, pp. 372376. [39] Y. Zhang, H.-H. Chen, Mobile WiMAX: Toward broadband wireless
[19] M. Bogdanoski, P. Latkoski, A. Risteski, B. Popovski, Ieee 802.16 metropolitan area networks, CRC Press, 2007.
security issues: a survey (2008). [40] K. Sameni, N. Yazdani, A. Payandeh, Analysis of attacks in
[20] D. Ourston, S. Matzner, W. Stump, B. Hopkins, Coordinated internet authentication protocol of ieee 802.16 e, Int. J. Com. Net. Tech ,
attacks: responding to attack complexity, Journal of Computer 2013, pp. 3344.
Security, 2004, pp. 165190. [41] M. Rodoper, A. Baliga, E. Jung, W. Trappe, An efficient security
[21] I. . W. Group, et al., Ieee standard for local and metropolitan area framework for mobile wimax, Proceedings of the 27th Annual ACM
networks, part 16: Air interface for fixed broadband wireless access Symposium on Applied Computing, ACM, 2012, pp. 14941501.
systems, IEEE Std 802, 2004, pp. 162004. [42] R. Jha, U. D. Dalal, A journey on wimax and its security issues,
[22] T. Shon, W. Choi, An analysis of mobile wimax security: International Journal of Computer Science and Information
vulnerabilities and solutions, Network-Based Information Systems, Technologies, 2010, pp. 256263.
Springer, 2007, pp. 8897. [43] F. Ohrtman, K. Roeder, Wi-Fi Handbook: Building 802.11 b Wireless
[23] D. Johnston, J. Walker, Overview of ieee 802.16 securit y, Security & Networks, volume 67, McGraw-Hill, 2003.
Privacy, IEEE , 2004, pp. 4048. [44] M. Nasreldin, H. AsIan, M. El-Hennawy, A. El-Hennawy, Wimax
[24] P. Rengaraju, C.-H. Lung, Y. Qu, A. Srinivasan, Analysis on mobile security, 22nd Int. Conference on Advanced Information Networking
wimax security, Toronto International Conference on Science and and ApplicationsWorkshops (AINAW).,IEEE, 2008, pp. 13351340.
Technology for Humanity (TIC-STH), IEEE, 2009, pp. 439444. [45] A. Kaushik, Mobile wimax security, architecture and assessment,
[25] S. S. Hasan, M. A. Qadeer, Security concerns in wimax, First Asian International Journal of Electronics and Computer Science
Himalayas International Conference on Internet, AH-ICI09., IEEE, Engineering (IJECSE, ISSN: 2277-1956), 2012, pp. 0714.
2009, pp. 15. [46] B. Bhargava, Y. Zhang, N. Idika, L. Lilien, M. Azarmi, Collaborative
[26] D. Hu, Y. Wang, Security research on wimax with neural attacks in wimax networks, Security and Communication Networks,
cryptography, International Conference on Information Security and Wiley InterScience, 2009, pp. 373391.
Assurance, ISA08., IEEE, 2008, pp. 370373. [47] http://www.dshield.org.
[27] M. Barbeau, J. Hall, E. Kranakis, Detecting impersonation attacks in [48] S. Cheung, U. Lindqvist, M. W. Fong, Modeling multistep cyber
future wireless and mobile networks, Secure Mobile Ad-hoc attacks for scenario recognition, in: DARPA Information
Networks and Sensors, Springer, 2006, pp. 8095. Survivability Conference and Exposition, 2003. Proceedings, volume
[28] P.-W. Chi, C.-L. Lei, A prevention approach to scrambling attacks in 1, IEEE, 2003, pp. 284292.
wimax networks, IEEE International Symposium on a World of [49] C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, R. Govindan,
Wireless Mobile and Multimedia Networks & Workshops, Cossack: Coordinated suppression of simultaneous attacks, in:
WoWMoM09., IEEE, 2009, pp. 18. Proceedings of DARPA Information Survivability Conference and
[29] H. Yu, M. Kaminsky, P. B. Gibbons, A. Flaxman, Sybilguard: Exposition, volume 1, IEEE, 2003, pp. 213.
defending against sybil attacks via social networks, ACM SIGCOMM [50] V. K. Jatav, M. Tripathi, M. S. Gaur, & V. Laxmi, (2012, February).
Computer Communication Review , 2006, pp. 267278. Wireless Sensor Networks: Attack Models and Detection. In 2012
[30] B. M. Lail, V. Foreword By-Chang, Broadband network & device IACSIT Hong Kong Conferences, IPCSIT vol. 30 (2012)(2012)
security, McGraw-Hill, Inc., 2002. IACSIT Press, Singapore
[31] V. Lima, V. Ruivo, M. Curado, Securing wireless mesh net works: a [51] A. Andreadis, S. Rizzuto, R. Zambon, A new ns2 tool to inv estigate
winning combination of routing and forwarding mechanisms, qos management over mobile wimax, Proceedings of the 4th
Proceedings of the 5th International Latin American Networking International Conference on Simulation Tools and Techniques, ICST,
Conference, ACM, 2009, pp. 1117. 2011, pp. 240248.
[32] J. Cao, M. Ma, M. A. B. Ariff, Security enhancements in wimax mesh [52] J. Farooq, T. Turletti, An ieee 802.16 wimax module for the ns-3
networks, 4th IEEE International Conference on Broadband Network simulator, Proceedings of the 2nd International Conference on
and Multimedia Technology (ICBNMT), IEEE, 2011, pp. 572578. Simulation Tools and Techniques, ICST, 2009, p. 8.
[33] A. Deininger, S. Kiyomoto, J. Kurihara, T. Tanaka, Security [53] N. Chauhan, R. K. Yadav, Security analysis of identity based
vulnerabilities and solutions in mobile wimax, Int. Journal of cryptography and certificate based in wimax network using omnet++
Computer Science and Network Security (IJCSNS), 2007, pp. 715. simulator, in: 2nd International Conference on Advanced Computing
& Communication Technologies (ACCT), , IEEE, 2012, pp. 509512.
[34] H. Yang, F. Ricciato, S. Lu, L. Zhang, Securing a wireless world,
Proceedings of the IEEE , 2006,pp. 442454. [54] J. F. Borin, N. L. da Fonseca, Simulator for wimax networks,
Simulation Modelling Practice and Theory, 2008, pp. 817833.
[35] R. M. Hashmi, A. M. Siddiqui, M. Jabeen, K. Shehzad, A. Zubair,
[55] S.M. Huang, Y.C. Sung, S.Y. Wang, Y.B. Lin, Nctuns simulation tool
K. Alimgeer, Improved secure network authentication protocol for wimax modeling, Proceedings of the 3rd international conference
(isnap) for ieee 802.16, International Conference on Information and on Wireless internet, ICST, 2007, p. 20.
Communication Technologies ( ICICT09), IEEE, 2009, pp. 101105.
[56] https://www.opnet.com/solutions/brochures/R&D_Defense.pdf
[36] J. R. Douceur, The sybil attack, in: Peer-to-peer Systems, Springer,
2002, pp. 251260.

140

Das könnte Ihnen auch gefallen