Abstract
Wireless Metropolitan Area Networks (WMANs) provide wireless communications at acceptable bandwidth over much larger geographical areas compared to Wireless Local Area Networks (WLANs). Also known as Wireless Local Loop (WLL), WMANs are based on the IEEE 802.16 standards with commercial name Worldwide Interoperability for Microwave Access (WiMAX). With its global market growing eighty-five percent in 2010 to 1.7 billion U.S. dollars, WiMAX is becoming a major competitor among the prevailing wireless communications technologies. While improved IEEE 802.16 standards and amendments were published and adopted in almost every year of the past decade, existing standards still contain a number of security vulnerabilities inherent from deprecated versions. This chapter starts with an introduction to and overview of Metropolitan Area Networks (MANs), WMANs, WiMAX and IEEE 802.16 standards, then discusses the technical details of WiMAX and IEEE 802.16 security aspects such as confidentiality, integrity, key generation and management, as well as security vulnerabilities, treats, and countermeasures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ghosh A, Wolter D R, Andrews J G, Chen R (2005) Broadband wireless access with wimax/802.16: current performance benchmarks and future potential. Communications Magazine, IEEE, 2005, 43(2): 129–136.
MAN (2011) Retrieved from http://en.wikipedia.org/wiki/Metropolitan_area_network. Accessed 11 October, 2011.
WiMAX (2011) Retrieved from http://en.wikipedia.org/wiki/WiMAX. Accessed 11 October, 2011.
White I M, Rogge M S, Shrikhande K, Kazovsky L G (2003) A summary of the hornet project: A next-generation metropolitan area network. Selected Areas in Communications, IEEE Journal, 21(9): 1478–1494.
Green P E Jr, Coldren L A, Johnson K M, Lewis J G, Miller C M, Morrison J F, Olshansky R, Ramaswami R, Smithand E H Jr (1993) All-optical packetswitched metropolitan-area network proposal. Lightwave Technology, 11(5): 754–763.
IEEE LAN/MAN Standards Committee (2002) IEEE standard for local and metropolitan area networks: Overview and architecture. IEEE Standards, IEEE Std 802-2001.
WiMAX Forum Goals (2011) Retrieved from http://www.wimaxforum.org/news/2839. Accessed 11 October, 2011.
Guide to SecuringWiMAXWireless Communications (2011). Retrieved from http://csrc.nist.gov/publications/nistpubs/800-127/sp800-127.pdf. Accessed 11 November, 2011.
WiMAX Forum (2011) Retrieved from http://www.wimaxforum.org/. Accessed 11 November, 2011.
Nguyen T (2011) A survey of wimax security threats. Retrieved from http://www.cs.Wustl.edu/~jain/cse571-09/ftp/wimax2.pdf. Accessed 11 November, 2011.
Nasreldin M, Asian H, El-Hennawy M, El-Hennawy A (2008) WiMAX Security. Advanced Information Networking and Applications—Workshops, 2008 (AINAW 2008). 22nd International Conference, pp. 1335–1340.
Maccari L, Paoli M, Fantacci R (2007) Security Analysis of IEEE 802.16. Communications (ICC’ 07). IEEE International Conference, pp. 1160–1165.
Yang E (2011) A Survey of WiMAX and Mobile Broadband Security. Retrieved from http://www.cs.wustl.edu/~jain/cse571-09/ftp/WiMAX1.pdf. Accessed 11 November, 2011.
Eklund C, Marks R B, Stanwood K L, Wang S (2002) IEEE standard 802.16: a technical overview of the Wireless MANTM air interface for broadband wireless access. Communications Magazine, IEEE, 40(6): 98–107.
Extensible Authentication Protocol (EAP) (2011) Retrieved from http://en.wikipedia.org/wiki/Extensible_Authentication_Protocol. Accessed 11 November, 2011.
Nuaymi L (2007) WiMAX: Technology for Broadband Wireless Access. John Wiley and Sons, New York.
Public-Key Cryptography Standards (PKCS) (2011) Retrieved from http://www.rsa.com/rsalabs/node.asp?id=2124. Accessed 11 November, 2011.
Public Key Infrastructure (PKI) (2011) Retrieved from http://en.wikipedia.org/wiki/Public_key_infrastructure. Accessed 11 November, 2011.
Barbeau M, Laurendeau C (2007) Analysis of Threats to WiMAX/802.16 Security. Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks. Wireless Networks and Mobile Communications Series, Volume 7, Taylor and Francis Group CRC Press, Boca Raton.
[20] WiMAX Public Key Infrastructure (PKI) Users Overview (2011). Retrieved from http://www.wimaxforum.org/sites/wimaxforum.org/files/page/2009/12/wimax_pki_users_overview_4_28_10.pdf. Accessed 11 November, 2011.
Xu S, Matthews M, Huang T C (2006) Security issues in privacy and key management protocols of IEEE 802.16. In Proceedings of the 44th annual Southeast regional conference (ACM-SE 44), pp. 113–118.
New EAP Variants (2011) Retrieved from http://www.wimaxforum.org/news/731. Accessed 11 November, 2011.
RFC 5216: The EAP-TLS Authentication Protocol (2011) Retrieved from http://tools.ietf.org/html/rfc5216. Accessed 11 November, 2011.
IEEE 802.16 WiMAX Security (2011) Retrieved from http://www.first.org/conference/2005/papers/kitti-wongthavarawat-slides-1.pdf. Accessed 11 November, 2011.
Data Encryption Standard (DES) (2011) Retrieved from http://en.wikipedia.org/wiki/Data_Encryption_Standard. Accessed 11 November, 2011.
Advanced Data Encryption (AES) (2011) Retrieved from http://en.wikipedia.org/wiki/Advanced_Encryption_Standard. Accessed 11 November, 2011.
Counter Mode (2011) Retrieved from http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Counter_.28CTR.29. Accessed 11 November, 2011.
CBC-MAC (2011) Retrieved from http://en.wikipedia.org/wiki/CBC-MAC. Accessed 11 November, 2011.
Barbeau M (2005) WiMAX/802.16 threat analysis. In Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet’ 05), pp. 8–15.
Dekleva S, Shim F P, Varshney U, Knoerzer G (2007) Evolution and emerging issues in mobile wireless networks. Communication of the ACM—Smart business networks, 50(6): 38–43.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Chen, L., Shashidhar, N., Yuan, S., Yang, M. (2013). Security in Wireless Metropolitan Area Networks. In: Wireless Network Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36511-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-36511-9_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36510-2
Online ISBN: 978-3-642-36511-9
eBook Packages: Computer ScienceComputer Science (R0)