Analysis of mobile wimax security: Vulnerabilities and solutions

Tao Han, Ning Zhang, Kaiming Liu, Bihua Tang, Yuanän Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

33 Scopus citations

Abstract

In this paper, we first give an overview of security architecture of mobile WiMAX network. Then, we investigate man-in-the-middle attacks and Denial of Service (DoS) attacks toward 802.16e-based Mobile WiMAX network We find the initial network procedure is not effectively secured that makes Man-in-the-middle and Dos attacks possible. In addition, we find the resource saving and handover procedure is not secured enough to resist DoS attacks. Focusing on these two kinds of attacks, we propose Secure Initial Network Entry Protocol (SINEP) based on Diffie-Hellman (DH) key exchange protocol to enhance the security level during network initial. We modify DH key exchange protocol to fit it into mobile WiMAX network as well as to eliminate existing weakness in original DH key exchange protocol.

Original languageEnglish (US)
Title of host publication2008 5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2008
PublisherIEEE Computer Society
Pages828-833
Number of pages6
ISBN (Print)9781424425754
DOIs
StatePublished - 2008
Externally publishedYes
Event2008 5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2008 - Atlanta, GA, United States
Duration: Sep 29 2008Oct 2 2008

Publication series

Name2008 5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2008

Conference

Conference2008 5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, MASS 2008
Country/TerritoryUnited States
CityAtlanta, GA
Period9/29/0810/2/08

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Analysis of mobile wimax security: Vulnerabilities and solutions'. Together they form a unique fingerprint.

Cite this