Skip to main content

Security in Wireless Metropolitan Area Networks

  • Chapter
Wireless Network Security

Abstract

Wireless Metropolitan Area Networks (WMANs) provide wireless communications at acceptable bandwidth over much larger geographical areas compared to Wireless Local Area Networks (WLANs). Also known as Wireless Local Loop (WLL), WMANs are based on the IEEE 802.16 standards with commercial name Worldwide Interoperability for Microwave Access (WiMAX). With its global market growing eighty-five percent in 2010 to 1.7 billion U.S. dollars, WiMAX is becoming a major competitor among the prevailing wireless communications technologies. While improved IEEE 802.16 standards and amendments were published and adopted in almost every year of the past decade, existing standards still contain a number of security vulnerabilities inherent from deprecated versions. This chapter starts with an introduction to and overview of Metropolitan Area Networks (MANs), WMANs, WiMAX and IEEE 802.16 standards, then discusses the technical details of WiMAX and IEEE 802.16 security aspects such as confidentiality, integrity, key generation and management, as well as security vulnerabilities, treats, and countermeasures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ghosh A, Wolter D R, Andrews J G, Chen R (2005) Broadband wireless access with wimax/802.16: current performance benchmarks and future potential. Communications Magazine, IEEE, 2005, 43(2): 129–136.

    Article  Google Scholar 

  2. MAN (2011) Retrieved from http://en.wikipedia.org/wiki/Metropolitan_area_network. Accessed 11 October, 2011.

    Google Scholar 

  3. WiMAX (2011) Retrieved from http://en.wikipedia.org/wiki/WiMAX. Accessed 11 October, 2011.

    Google Scholar 

  4. White I M, Rogge M S, Shrikhande K, Kazovsky L G (2003) A summary of the hornet project: A next-generation metropolitan area network. Selected Areas in Communications, IEEE Journal, 21(9): 1478–1494.

    Article  Google Scholar 

  5. Green P E Jr, Coldren L A, Johnson K M, Lewis J G, Miller C M, Morrison J F, Olshansky R, Ramaswami R, Smithand E H Jr (1993) All-optical packetswitched metropolitan-area network proposal. Lightwave Technology, 11(5): 754–763.

    Article  Google Scholar 

  6. IEEE LAN/MAN Standards Committee (2002) IEEE standard for local and metropolitan area networks: Overview and architecture. IEEE Standards, IEEE Std 802-2001.

    Google Scholar 

  7. WiMAX Forum Goals (2011) Retrieved from http://www.wimaxforum.org/news/2839. Accessed 11 October, 2011.

    Google Scholar 

  8. Guide to SecuringWiMAXWireless Communications (2011). Retrieved from http://csrc.nist.gov/publications/nistpubs/800-127/sp800-127.pdf. Accessed 11 November, 2011.

    Google Scholar 

  9. WiMAX Forum (2011) Retrieved from http://www.wimaxforum.org/. Accessed 11 November, 2011.

    Google Scholar 

  10. Nguyen T (2011) A survey of wimax security threats. Retrieved from http://www.cs.Wustl.edu/~jain/cse571-09/ftp/wimax2.pdf. Accessed 11 November, 2011.

    Google Scholar 

  11. Nasreldin M, Asian H, El-Hennawy M, El-Hennawy A (2008) WiMAX Security. Advanced Information Networking and Applications—Workshops, 2008 (AINAW 2008). 22nd International Conference, pp. 1335–1340.

    Google Scholar 

  12. Maccari L, Paoli M, Fantacci R (2007) Security Analysis of IEEE 802.16. Communications (ICC’ 07). IEEE International Conference, pp. 1160–1165.

    Google Scholar 

  13. Yang E (2011) A Survey of WiMAX and Mobile Broadband Security. Retrieved from http://www.cs.wustl.edu/~jain/cse571-09/ftp/WiMAX1.pdf. Accessed 11 November, 2011.

    Google Scholar 

  14. Eklund C, Marks R B, Stanwood K L, Wang S (2002) IEEE standard 802.16: a technical overview of the Wireless MANTM air interface for broadband wireless access. Communications Magazine, IEEE, 40(6): 98–107.

    Article  Google Scholar 

  15. Extensible Authentication Protocol (EAP) (2011) Retrieved from http://en.wikipedia.org/wiki/Extensible_Authentication_Protocol. Accessed 11 November, 2011.

    Google Scholar 

  16. Nuaymi L (2007) WiMAX: Technology for Broadband Wireless Access. John Wiley and Sons, New York.

    Book  Google Scholar 

  17. Public-Key Cryptography Standards (PKCS) (2011) Retrieved from http://www.rsa.com/rsalabs/node.asp?id=2124. Accessed 11 November, 2011.

    Google Scholar 

  18. Public Key Infrastructure (PKI) (2011) Retrieved from http://en.wikipedia.org/wiki/Public_key_infrastructure. Accessed 11 November, 2011.

    Google Scholar 

  19. Barbeau M, Laurendeau C (2007) Analysis of Threats to WiMAX/802.16 Security. Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks. Wireless Networks and Mobile Communications Series, Volume 7, Taylor and Francis Group CRC Press, Boca Raton.

    Google Scholar 

  20. [20] WiMAX Public Key Infrastructure (PKI) Users Overview (2011). Retrieved from http://www.wimaxforum.org/sites/wimaxforum.org/files/page/2009/12/wimax_pki_users_overview_4_28_10.pdf. Accessed 11 November, 2011.

    Google Scholar 

  21. Xu S, Matthews M, Huang T C (2006) Security issues in privacy and key management protocols of IEEE 802.16. In Proceedings of the 44th annual Southeast regional conference (ACM-SE 44), pp. 113–118.

    Google Scholar 

  22. New EAP Variants (2011) Retrieved from http://www.wimaxforum.org/news/731. Accessed 11 November, 2011.

    Google Scholar 

  23. RFC 5216: The EAP-TLS Authentication Protocol (2011) Retrieved from http://tools.ietf.org/html/rfc5216. Accessed 11 November, 2011.

    Google Scholar 

  24. IEEE 802.16 WiMAX Security (2011) Retrieved from http://www.first.org/conference/2005/papers/kitti-wongthavarawat-slides-1.pdf. Accessed 11 November, 2011.

    Google Scholar 

  25. Data Encryption Standard (DES) (2011) Retrieved from http://en.wikipedia.org/wiki/Data_Encryption_Standard. Accessed 11 November, 2011.

    Google Scholar 

  26. Advanced Data Encryption (AES) (2011) Retrieved from http://en.wikipedia.org/wiki/Advanced_Encryption_Standard. Accessed 11 November, 2011.

    Google Scholar 

  27. Counter Mode (2011) Retrieved from http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Counter_.28CTR.29. Accessed 11 November, 2011.

    Google Scholar 

  28. CBC-MAC (2011) Retrieved from http://en.wikipedia.org/wiki/CBC-MAC. Accessed 11 November, 2011.

    Google Scholar 

  29. Barbeau M (2005) WiMAX/802.16 threat analysis. In Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet’ 05), pp. 8–15.

    Google Scholar 

  30. Dekleva S, Shim F P, Varshney U, Knoerzer G (2007) Evolution and emerging issues in mobile wireless networks. Communication of the ACM—Smart business networks, 50(6): 38–43.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Chen, L., Shashidhar, N., Yuan, S., Yang, M. (2013). Security in Wireless Metropolitan Area Networks. In: Wireless Network Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36511-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36511-9_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36510-2

  • Online ISBN: 978-3-642-36511-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics