Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Security analysis of the WiMAX technology in Wireless Mesh networks
Blekinge Institute of Technology, School of Computing.
Blekinge Institute of Technology, School of Computing.
2009 (English)Independent thesis Advanced level (degree of Master (Two Years))Student thesis
Abstract [en]

The IEEE 802.16 (WiMAX) is the promising technique to overcome some disadvantages on the Security concern of the widespread IEEE 802.11 standard. For providing high speed wide area broadband wireless access, WiMAX is an emerging wireless technology for creating multi-hop Mesh network. Based on the wired backbone wireless Mesh networks serve to get over present dependencies of wireless system. Wireless operates on Physical later and MAC layer in the air interface to provide fixed and Mobile Broadband Wireless Access (BWA) in broad range of frequencies. Due to the lack of Physical infrastructure of wireless networks are inherently less secure. In order to protect data exchange between the MAC layer and PHY layer WiMAX specifies a security sub-layer at the bottom of the MAC layer. The security sub-layer provides privacy with SS and BS from service hijacking. For providing authentication, data traffic privacy services and key management a PKM protocol defined by the WiMAX MAC as a sub-layer where the PKM protocol is the main protocol work in the security sub-layer. WiMAX is only a “Paper based” newly established technology based on Wi-Fi system then it is tough to find out its security holes in all the way. Keeping all the fact in mind the objectives of the thesis are to analyze the WiMAX security architecture security keys (AK, KEK and HMAC) are used for authorization, authentication and key management and TEK is for secure data transmission, possible security vulnerabilities, threats and risks are classified according to different layer with 802.16 std Mesh network. In addition, vulnerabilities comparison between IEEE 802.11 and 802.16 std has been pointed out in details, as well as security improvements and possible solutions has been proposed to protect WiMAX attacks.

Place, publisher, year, edition, pages
2009. , p. 61
Keywords [en]
IEEE 802.16, WiMAX, Mesh mode, Mesh network, Vulnerability, Security threats
National Category
Computer Sciences Telecommunications
Identifiers
URN: urn:nbn:se:bth-3039Local ID: oai:bth.se:arkivex3066084B5894BDCEC12576C9004D9B1AOAI: oai:DiVA.org:bth-3039DiVA, id: diva2:830336
Uppsok
Technology
Supervisors
Available from: 2015-04-22 Created: 2010-02-13 Last updated: 2018-01-11Bibliographically approved

Open Access in DiVA

fulltext(1594 kB)645 downloads
File information
File name FULLTEXT01.pdfFile size 1594 kBChecksum SHA-512
e2d82d2c922a44b6f7d485243fd212dd03d458ab27a9a439a929b827e99b6f86dbbdbd770fcf6cb50dfead4a2c77242c5e9f88a86094f24e928a86e3b8e65a24
Type fulltextMimetype application/pdf

By organisation
School of Computing
Computer SciencesTelecommunications

Search outside of DiVA

GoogleGoogle Scholar
Total: 645 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 257 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf