WIMAX Security Issues

662 Words2 Pages

WIMAX Security Issues
Threats to The WIMAX
Some of the WIMAX threats are: Rogue base stations, DoS attacks, Man-in-the-middle attacks, and Network manipulation with spoofed management frames, Threats in the physical layer.
Rogue base stations
It is defined as an attacker, which copies a legitimate base station. It allows hackers to confuse subscribers. WiMAX uses time division multiple access, thus the rogue base station must transfer with a stronger power at the same time the legitimate station transfers. The authentication protocols (EAP Protocol) used in WiMAX help relieve this threat.
(EAP Protocol forces mutual authentication, therefore the subscriber station would send an authentication message to the rogue base station. This does not completely alleviate the threat of rogue base stations, but it does make it more difficult.)
Denial of Service (DoS) attacks
DoS attacks are defined as an effort to make a computer resource unavailable to its users. (Hackers usually use this type of attack on web servers for banks, credit card payment gateways or DNS root servers.) A DoS attack uses the IP address to flood the user’s network and obstruct the communication between the intended user and the victim. It has been proposed that a Shared Authentication Information (SAI) protocol could be used to offer a defense mechanism against DoS attacks, without incurring over- head at the ASN gateway and the base station.
Man-in-the-middle attacks
These are some forms of snooping. The hacker founds separate connections between two victims and transmits the messages between them. The hacker interrupts the public key from one of the victims and sends their own public key to the proposed victim. After responds the hacker then has that public key. I...

... middle of paper ...

...ch an attacker resends valid frames that the attacker has intercepted in the middle of forwarding.
Threats to The MAC Layer
MAC Layer Connections: Management connections and data transport connections are two connections in this layer. The management connections have three types: basic, primary, and secondary. A basic connection and primary connection are created for each MS when they join the network. A basic connection is used for short and urgent management message. And a primary connection is used for delay-tolerant management messages. The secondary connection is used for IP summarized management messages such as dynamic host configuration protocol [DHCP], and simple network management protocol [SNMP]. Transport connections can be provisioned or can be recognized on demand. They are used for user traffic flows. Unicast or multicast can be used for transmission.

More about WIMAX Security Issues

Open Document