Analysis and Assessment the Security Issues of IEEE /WiMax Network
|
|
|
- Daniella Bailey
- 10 years ago
- Views:
Transcription
1 Masters Thesis: MEE10:24 Telecommunication System Analysis and Assessment the Security Issues of IEEE /WiMax Network Mohammad Hossain Department of Telecommunication System School of Electrical Engineering Blekinge Institute of Technology SE Karlskrona, Sweden
2 This thesis is submitted to the Department of Telecommunication System, School of Engineering at Blekinge Institute of Technology in partial fulfilment of the requirements for the degree of Master of Science in Telecommunication System. The thesis is equivalent to 30 ECTS (European Credit Transfer System) or 0.5 year of full time Studies. Contact Information: Author(s): Mohammad Hossain Supervisor: Mr. Karel De Vogeleer Department of Telecommunication System, Blekinge Institute of Technology, Sweden Examiner: Mr. Adrian Popescu Department of Telecommunication System, Blekinge Institute of Technology, Sweden Department of Internet: Telecommunication System Phone: Blekinge Institute of Technology Fax: SE Karlskrona, Sweden ii
3 Acknowledgement First and foremost I would like to mention my gratitude to Almighty ALLAH, the most Beneficent, and the most Merciful. I would like to thank my dad Mr. Khan, my mom Mrs Khan, my wife Sania for giving me the courage and strength I needed to complete my goal especially for their support and their attitude to make me feel important to them and to make me relax in between the periods of hard work. I would like to thank to Mr. Md. Hamidul Islam, a student of KTH and one of my best friends, for his advisory assistance and informative support in some crucial parts of the work. Special thanks to Mr. Karel De Vogeleer for his important time who supervised to improve and helped to reach till end during the work. Words are insufficient to express my thanks, who guided in every step to the completion of this thesis. 1
4 Abstract WiMax is a wireless based technology standard that provides high throughput broadband connections over long distances. Security is one of the major considerations in broadband wireless access especially when wireless devices are added to it. Wimax/ is also not free from vulnerability, threats, risks or other attacks to provide secured and robust services like as other standards and so on. With the high and effective security confirmation, this technology would be more reliable and trustworthy. This paper works on all possible attacks of Wimax standard and provided their solutions which separately came on light so far. This research found some difficulties in the security of transmissions and then proposed solutions for that. Also, a simulation work has been done in dot net framework with C# language and illustrated the justification of the research result. 2
5 CONTENTS Acknowledgement 1 Abstract 2 Contents 3 List of Abbreviations: 5 List of Figures: 7 List of Tables: 8 Chapter 1: Introduction Background History Difficulty Classification Thesis Goal Thesis Method 12 Chapter 2 Architecture and Evolution of The protocol layers of WiMax The PHYsical (PHY) Layer The Media Access Control (MAC) Layer Convergence Sublayer (CS) Medium Access Control Common Part Sublayer (MAC CPS) Security Sublayer Evolution of IEEE family of Standard IEEE IEEE c IEEE a IEEE IEEE e and Beyond 23 Chapter 3 Security of IEEE Standard Assessment of IEEE Standard for Known IEEE Vulnerabilities Introduction to IEEE Vulnerabilities Vulnerabilities Considered for IEEE Standard Deauthentication Attack Replay Attack AP Spoofing 30 3
6 3.3.4 Mac Address Spoofing Attacks on Carrier Sense Transmission 34 Chapter 4 IEEE Security Elements Major Security Elements of IEEE Standard Encryption Algorithms X.509 Certificate Security Associations (SAs) Encryption Keys The PKM Protocol Authorisation Key (AK) Management Data Encryption 45 Chapter 5 My Contribution Mutual Authentication The Proposed Algorithm for BS Authentication Detail Communication with the Authentication Server Replay Attack Prevention Man in Middle Attack and Denial of Service Attack Prevention Simulation Result Testing Environment Overall Communication Process 53 Chapter 6 Conclusion and Future Works Conclusion Future Works 57 References 59 Appendix 1 The Base Station (BS) Programming Code 62 Appendix 2 The Subscriber Station (SS) Programming Code 64 Appendix 3 The Authentication Server (AS) Programming Code 67 4
7 List of Abbreviations AK Authentication Key AS Authentication Server AP Access Point ATM Asynchronous Transfer Mode AES Advanced Encryption Standard BS Base Station BSID Base Stations ID BWA Broadband Wireless Access CPE Customer Premise Equipment CS Convergence Sublayer CPS Common Part Sublayer CIDs Connection Identifiers CPE Customer Premises Equipment CMAC Cipher-based Message Authentication Code CTS Clear to Send CSMA/CA Carrier Sense Multiple Access with Collision Avoidance CMAC Cipher-Based Authentication Code Wide Interoperability for DLL Data Link Layer Microwave Access DL Downlink DES Data Encryption Standard DREG-CMD Re/RE-register Command DoS Denial of Service EAP Extensible Authentication Protocol FDD Frequency Division Duplexing FDMA Frequency Division Multiple Access HMAC Hashed Message Authentication Code ISO/IEC International Organization for Standardization & the International Electrotechnical Commission ITU International Telecommunications Union IP Internet Protocol IPTV Internet Protocol Television IPv4 Internet Protocol version 4 IPv6 Internet Protocol version 6 LLC Logical Link Control LOS Line of Sight MAC Media Access Control MD5 Message-Digest algorithm 5 NLOS Non Line of Sight NIST National Institute of Standards and Technology OFDMA Orthogonal Frequency Division Multiple Access OSI Open Systems Interconnection PKM Protocol Key Management Protocol PTP Point to Point PMP Point to Multipoint PDU Protocol Data Unit PHY Layer Physical Layer PKM-REQ PKM Request PKM-RSP PKM Response 5
8 PHS Payload Header Suppression PKM Privacy Key Management PKMv1 Key Management Protocol version 1 PKMv2 Key Management Protocol version 2 QoS Quality of Service RES-CMD Reset Command RTS Request to Send SS Subscriber Station SSID Subscriber Stations ID SDU Service Data Unit SA Security Association TEK Traffic Encryption Key TDD Time Division Duplexing TDMA Time Division Multiple Access TDM Time Division Multiplexing 3-DES Triple Data Encryption Standard UL Uplink VoIP Voice over Internet Protocol WirelessMan Wireless Metropolitan Area Network Wireless HUMAN Wireless High Speed Unlicensed Metropolitan Area Network WiMax World Wide Interoperability for Microwave Access 6
9 List of Figures Figure 1.1: Fixed WiMax Showing point to point and point to multipoint communication. Figure 2.1: The seven layer OSI model for networks. In WiMax/802.16, only the first two layers are defined. Figure 2.2: Protocol layers of the BWA standard. Figure 2.3: Transferring and receiving of SDUs and PDUs in sending and receiving entity. Figure 3.1: De-authentication Attack. Figure 3.2: Deauthentication attack prevented by RES-CMD. Figure 3.3: Access point spoofing by a rogue node. Figure 3.4: SS authentication and registration. Figure 4.1: Triple DES algorithm. Figure 4.2: X.509 Authentication Figure 4.3: Authentication and Authorisation Key allocation by the BS. The BS is the server and the SS is the client. Figure 4.4: The SS asks the BS for encryption keys TEK0 and TEK1. Figure 5.1: Authentication Protocol in IEEE Standard. Figure 5.2: The Mutual Authentication process to avoid Rogue BS attack Figure 5.3: The overall Communication Process. Figure 5.4: Prevention of replay attack by using Time Stamp. Figure 5.5: The Base Station (BS) is waiting for the connection. Figure 5.6: The SS is sending information to the BS. Figure 5.7: The BS is sending information to the SS. Figure 5.8: The SS received message from the BS and decrypting the message. Figure 5.9: The SS transmitting message to the AS. Figure 5.10: The AS verified the BS and sent message to the AS. Figure 5.11: The SS verified the BS. 7
10 List of Tables Table 2.1: The five PHYsical interfaces defined in the standard. Table 2.2: Comparison of IEEE BWA Standard. Table 4.1: Encryption keys used in the IEEE standard, in its IEEE version. Table 4.2: The basics of PKMv1 protocol in IEEE standard. 8
11 Chapter 1 Introduction 1.1 Background History WiMax (World Wide Interoperability for Microwave Access) is a technology of modern telecommunication for high speed data transmission. It is stated in IEEE standard and named as WiMax by WiMax Forum which was formed in June IEEE standard, officially known as WirelessMAN states the radio frequencies of fixed broadband wireless access (BWA) operating anywhere in the world in appropriate licensed or license-exempt spectrum between 2 and 66 GHz [2] to promote conformance and interoperability of the standard. The Forum describes WiMAX as a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL Data networks have acknowledged steadily growing success since the last decades of the twentieth century. Fixed Internet networks are installed in many places all over the planet and they are now largely expanding. Wireless access demand is now becoming more important for this extra large network coverage. No doubt that by the end of the mid decade of the twenty first century, high-speed wireless data access, i.e. in Mb/s, will be largely deployed worldwide. The telecommunication world will experience this new transform by WiMAX as it is known throughout the world today. It eliminates the resource scarcity that has sustained present service providers for the last century. It will allow true market based competition in all of the major telecommunication services: voice (mobile and static), video and data as this technology allows a lower barrier to entry. WiMAX got the attraction because of its broad range of applications. It is not limited to only broadband internet access rather Voice over Internet Protocol (VoIP) which 9
12 must be adapted due to the wide deployment of VoIP, Internet Protocol Television (IPTV) replaces cable TV. Backhaul replaces many things such as Wi-Fi hotspots, towers of cell phones, mobile telephone service etc. It also replaced the installation of fiber optic cable. Backhaul can be defined as the transmission of data voice, video, TV, etc via wireline, fibre, wireless or satellite circuits from its network point of entry to the exchange switch or via multiple network backbones for distribution and delivery to its destination. [17] Figure 1.1: Fixed WiMAX showing point to point and point to multipoint communication. [1] WiMAX is also known as customer premise equipment (CPE) as it provides fixed, portable or mobile non line-of-sight (LOS) service from a base station to a subscriber station. In point-to-point its range is 30 miles (50 km) with a throughput of 72 Mbps shown in figure 1.1. It offers 6 miles non-line-of-sight (NLOS) range with a throughput of 40 Mbps in point-to-multipoint distribution. 10
13 1.2 Difficulty Classification Many wireless networks are based on radio waves and keep the network medium open more or less for interception. Protocol designers are always concerned for a secured radio transmission on any network. During the time of designing, the main focus was on handling with intrinsic untrustworthiness of wireless medium, good mobility, featuring of protocol to be confirmed of frame delivery in mobility, and also power saving [3]. Security was not on the front page and proved inadequate in previous specifications like as The network implementation was not secure enough to prevent service disruption and theft. Intruders also come on stage with various kinds of attacks named as interception, fabrication, modification, interruption and so on. The security mechanism of IEEE focused specially on security in MAC layer, which may not be able to provide adequate security in multihop scenarios and persuade the needs of rising applications in WiMax networks [4]. Paper [5] mentioned that WiMax/ is vulnerable to physical layer attacks such as jamming (A source of noise strong enough to significantly reduce the capacity of the channel) and scrambling (a sort of jamming but for short intervals of time and targeted to specific frames). Paper [6] said, at the bottom of MAC layer securities are implemented as a sub-layer in order to defend the exchange of data between the MAC layer and the PHY layer but does not save the PHY layer itself against the attacks which target the inbuilt weakness of wireless links. Paper [7] shown the security aspects of the IEEE Standard and point out the security vulnerabilities, threats and risks associated with this standard shortly. [8] Examined the MAC layer of the standard to determine the presence of the denial of service attacks and also the attacks that may be unique to the standard. Security is really an important issue since a tiny mistreat or falsification of data can bring a big hotchpotch and terminate the whole system disabled which may need again a long run to get back in right track. 11
14 1.3 Thesis Goal If we look back a little early, when the IEEE wireless protocol was designed, scientist and manufacturer considered the security issues afterwards all other infrastructures and so, it became one of the most vulnerable wireless protocols. During the developing time of IEEE standard, security was thought to be implemented inside the protocol but unfortunately remained. As a result, the security of this standard remains a question yet and many papers published on different security issues. The aim of this thesis work is to find out all possible attacks on IEEE standard and discuss their possible solutions so far worked out so that the new generation networking of this standard will be more effective, secure and reliable. 1.4 Thesis Method This thesis conducted following an inductive method during the conduction of this work. Thoughtful and deeper study of the problem afforded using qualitative ways. Literature study has been done during research, mostly through Internet and IEEE s website, where latest news about the protocol are announced. Previously ratified versions of RFCs of the standard are used. In addition it was tried to contact other researchers who were involving in the security structure of the protocol as IEEE members, either doing research about WiMAX individually. 12
15 Chapter 2 Architecture and Evolution of The protocol layers of WiMAX The IEEE BWA network standard follows the Open Systems Interconnection (OSI) network reference seven-layer model, also called the OSI seven layer model. The different aspect of a network technology is often described by this model. It begins from the Application Layer, or Layer 7, on the top and finishes with the PHYsical (PHY) Layer, or Layer 1, on the bottom. The functions of different protocols are separated into a series of layers by The OSI model; each layer utilizes the functions of the lower layer and transfers data to its higher layer. For example, the Internet Protocol (IP) is in the Routing Layer or in Layer 3 and sends data to its higher layer which is Transport layer or layer 4. Generally, the higher layers are implemented in software and the lower layers are implemented in hardware. Physical (PHY) Layer or Layer 1 and the Data Link Layer (DLL) or Layer 2 are the two lowest layers in OSI Model. The OSI Data Link Layer is divided into two Sublayers. These are Logical Link Control (LLC) layer and Media Access Control (MAC) layer. The physical connection is established by the PHY layer between two communication entities. MAC layer is responsible for the maintenance of the connection [9]. In WiMAX/802.16, only the first two layers are defined which is shown in figure
16 Application Presentation Session Transport Network Data Link PHYsical LLC (Logical Link Control) MAC (Medium Access Layer) Data Link Layer is Divided into two sublayers Figure 2.1 The seven layer OSI model for networks. In WiMAX/802.16, only the first two layers are defined. [9] 2.2 The PHYsical (PHY) Layer WiMAX is a Broadband Wireless Access (BWA) system. Therefore, data is transmitted at high speed on the air interface through radio (electromagnetic) waves using a given frequency i.e. operating frequency. The PHY Layer sets up the physical connection among both sides, mostly in the two directions uplink and downlink. Since, is obviously a digital technology, the PHYsical Layer is in charge of transmitting the bit sequences. It classifies the type of signal used, the type of modulation and demodulation, the transmission power and other physical characteristics. The standard considers the frequency band 2-66 GHz. This band is divided into two parts: a. The first range starts 2 and finishes at 11 GHz and is designed for NLOS transmissions. This was formerly the a standard. This is the only range at present included in WiMAX. b. The second range is between 11 and 66 GHz and is designed for LOS transmissions. It is not usually used for WiMAX at present time. [9] The standard defined five PHYsical interfaces. Table 2.1 summarised these physical interfaces. The standard (and amendments) described each of the five 14
17 physical interfaces in specific sections. Two major Duplexing modes, Time Division Duplexing (TDD) and Frequency Division Duplexing (FDD), both can be included in systems. The WirelessMAN-SC PHY is specified for frequencies in the GHz interval (LOS). Single carrier modulation and coding schemes are the basis of this standard. It supports both Frequency Division Duplexing (FDD) and Time Division Duplexing (TDD) to separate uplink and downlink. Three other PHYsical interfaces are proposed for frequencies below 11 GHz (NLOS): WirelessMAN-OFDM, known as OFDM and using OFDM transmission. This is SCa 2-11 GHz Licensed Band TDD, FDD Single Carrier technique for NLOS OFDM 2-11 GHz Licensed Band TDD, FDD OFDM for NLOS operation Table 2.1: The five PHYsical interfaces defined in the standard. [10] Designation Band of Operation Duplexing Notes Technique WirelessMAN- SC GHz TDD, FDD Single Carrier WirelessMAN- WirelessMAN- WirelessMAN GHz OFDMA Licensed Band WirelessHUMAN 2-11 GHz Licensed Exempt Band TDD, FDD OFDM Broken into subgroups to provide multiple access in a single frequency band. TDD May be SC, OFDM, OFDMA. Must include Dynamic Frequency Selection to mitigate interference. one of the most suitable preferences to provide fixed support in NLOS environment because of employing OFDM and other features like multiple forward error correction method. 15
18 WirelessMAN-OFDMA, known as OFDMA and using OFDM transmission and Orthogonal Frequency Division Multiple Access (OFDMA), with the OFDMA PHY Layer. This PHY specification uses OFDM access (OFDMA) with at least a single support of specified multi-point transform to provide combined fixed and Mobile BWA. Operation is limited to below 11 GHz licensed band [11]. WirelessMAN-SCa known as SCa and using single carrier modulations. This is also based on single carrier modulation targeted for 2-11 GHz frequency range. TDMA technique applied on both in uplink and downlink access, additionally TDM also supported in downlink. The last specification is WirelessHUMAN (High-speed Unlicensed Metropolitan Area Network) which is targeted for license exempt band below 11 GHz. Any of the air interfaces specified for 2-11 GHz can be used for this. This supports only TDD for duplexing [10]. WiMAX considers only OFDM and OFDMA PHYsical Layers of standard [9]. 2.3 The Media Access Control (MAC) Layer The MAC layer is divided into three sublayers, the CS (Convergence Sublayer), the CPS (Common Part Sublayer) and the Security Sublayer. The MAC is connection oriented and 16-bit connection identifiers (CIDs) referenced the connections where granted bandwidth or bandwidth on demand may need continuously. Multiple UL channels and DL channels are distinguished by a CID as they are associated together. The SSs check the CIDs in the received PDUs (Protocol Data Unit) and retain only those PDUs addressed to them. The MAC PDU is a data unit and it is exchanged between the MAC layers of the BS and its SSs. This data unit is sent on the downward direction to the next lower layer and received on the upward direction from the previous lower layer. 16
19 Figure 2.2 Protocol layers of the BWA standard. [10] The different layers of MAC layer and many of their functions are described shortly in the following sections Convergence Sublayer (CS) The service-specific Convergence Sublayer (CS) is also known as the CS and placed above the MAC CPS sublayer (Figure 2.2). MAC CPS provides services to the CS to use via the MAC Service Access point (SAP). The CS performs the following functions: Accepts higher-layer PDUs from the higher layers. Two types of higher layers are provided in the CS specifications as of (IEEE ) version of the standard: the asynchronous transfer mode (ATM) CS and the packet CS. The higher-layer protocols may be IP v4 (version 4) or v6 (version 6) for the packet CS. 17
20 Figure: 2.3 receiving entity [12]. Transferring and receiving of SDUs and PDUs in sending and The MSDUs (MAC Service Data Unit) are classified and mapped into appropriate CIDs (Connection Identifier). This Quality of Service (QoS) management mechanism is a basic function of the BWA. PHS (Payload Header Suppression) is an optional function of the CS, is a process of suppressing repetitive parts of payload headers at the sender and restoring these headers at the receiver. Delivers CS PDUs to the right MAC SAP and receives CS PDUs from the peer entity. Transferring and receiving of SDUs and PDUs in sending and receiving entity is shown in figure Medium Access Control Common Part Sublayer (MAC CPS) The common Part Sublayer (CPS) is in the middle of the MAC layer. The CPS represents the centre of the MAC protocol and is responsible for: 18
21 Allocation of bandwidth Establishment of connection Connection maintenance between two sides. A set of management and transfer messages are defined by Standard. The management messages are exchanged between the SS and the BS before and during the establishment of the connection. When the connection is established, the transfer messages can be exchanged to permit the data transmission. The CPS receives data from the various CSs, through the MAC SAP, classified to particular MAC connections. The QoS is taken into account for the transmission and scheduling of data over the PHY Layer. The CPS includes many procedures of different types: frame construction, multiple access, bandwidth demands and allocation, scheduling, radio resource management, QoS management, etc Security Sublayer A separate Security Sublayer is present in the MAC Sublayer (Figure 2.2) which provides authentication, secure key exchange, encryption and integrity control across the BWA system. Data encryption and authentication are the two main topics of a data network security. Keeping these objectives into front sight algorithms are designed and should prevent all known security attacks such as denial of service, theft of service, etc. A data encryption protocol is applied for encrypting connections between the SS and the BS and is made for both ways in the standard. A set of supported cryptographic suites are defined in this protocol such as data encryption pairings and authentication algorithms. An authentication protocol, the Privacy Key Management (PKM) protocol is used to provide the secure distribution of keying data from the BS to the Ss. The SS and the BS synchronize keying data through this secure key exchange due to this key management protocol. By adding digital-certificate-based SS authentication to the key 19
22 management protocol, the basic privacy mechanisms are strengthened. Moreover, the PKM protocol is used by BS ensuring conditional access to network services. 2.4 Evolution of IEEE family of standard At the end of the twentieth century many telecommunication equipment manufacturers began to build up and present products for BWA. But the industry was undergoing for an interoperable standard. With that need the national Wireless Electronics Systems Testbed (N-WEST) of the U.S National Institute of Standards and Technology (NIST) called a meeting to talk about the topic in August 1998[13]. The meeting ended up with a decision to organize within IEEE 802. This led to formation of the Working Group. Since then, the Working Group members have been working a lot for the development of fixed and mobile BWA standards. IEEE Working Group on Broadband Wireless Access (BWA) standard is responsible for development of and the included WirelessMan air interface, along with associated standards and amendments. The IEEE standard contains the specification of Physical (PHY) and Medium Access Control (MAC) layer for BWA. The first version of the standard IEEE [14] was approved on December 2001 and gone through many amendments to organize with new features and functionalities. On September 2004, the current version of the standard IEEE [15] approved and combined all the previous versions of the standards. This standard specifies the air interface for fixed BWA systems in license and licensed exempt spectrum [15] supporting multimedia services. The Working Group approved the amendment IEEE e-2005 [11] on February The evolution of the standard is presented shortly below IEEE To provide fixed broadband wireless access in a point-to-point (PTP) or point-tomultipoint (PMP) topology this issue specifies a set of MAC and PHY layer standards [14]. The PHY layer uses single carrier modulation in GHz frequency range. Base Station (BS) assigned transmission times, durations and modulations, shared 20
23 with all nodes in the network in the form of broadcast Uplink and Downlink maps. Subscribers hear only the base station that they are connected to and do not need to listen any other node of the network. Subscriber Stations (SS) have the ability to negotiate for bandwidth allocation on a burst to burst basis to provide scheduling flexibility. The modulation schemes which employed in this standard are QPSK, 16-QAM and 64-QAM. These can be changed from frame to frame and SS to SS, depending on the robustness of the connection. The standard supports both Time Division Duplexing (TDD) and Frequency Division Duplexing (FDD). The ability of providing differential Quality of Service (QoS) in the MAC Layer is an important feature of QoS check performed by a Service Flow ID. Service flows can be originated either from BS or SS works only in (Near) Line of Sight (LOS) conditions with outdoor Customer Premises Equipment (CPE) IEEE c-2002 IEEE Standards Board approved amendment IEEE c on December 2002 [13]. The detail system profiles for GHz were added and some errors and irregularities of the first version of the standard were corrected in this amendment IEEE a-2003 This version amends IEEE by changing some characteristics. It enhances the medium access control layer so that it can support multiple physical layer specifications and providing additional physical layer specifications. IEEE working group ratified this in January 2003 [16] GHz physical layer support was added in this amendment. Both licensed and license-exempt bands are included. As it operates below 11 GHz range, Non Line of Sight (NLOS) operation becomes possible which extends the geographical reach of the network. Multipath propagation becomes an issue due to NLOS operation. Multipath propagation, interference 21
24 mitigation, advanced power management technique and adaptive antenna arrays were included in specification [16]. Orthogonal Frequency Division Multiplexing (OFDM) inclusion was an alternative option to single carrier modulation. This version also improved Security issue. Some privacy layer features became obligatory while in they were optional. Mesh topology with PMP was an optional support in this version of IEEE802.16a. IEEE 2005 Table 2.2: Comparison of IEEE BWA Standard [11] IEEE IEEE a IEEE e- Completed December 2001 January 2003 September 2004 December 2005 Spectrum GHz 2-11 GHz 2-11 GHz 2-11 GHz Propagation/Channel Conditions Bit Rate LOS NLOS NLOS NLOS UP to 134 Mbps UP to 75 Mbps UP to 75 Mbps UP to 15 Mbps (28 MHz (20 MHz (20 MHz (5 MHz Channelization) Channelization) Channelization) Channelization) Modulation QPSK, 16-QAM BPSK, QPSK, 256 subcarriers Scalable (optional in UL), 16-QAM, OFDM, BPSK, OFDMA, QPSK, 64-QAM 64-QAM, QPSK, 16-QAM, 16-QAM, 64- (optional) 256-QAM 64-QAM, 256- QAM, 256-QAM (optional) QAM (optional) Mobility Fixed Fixed Fixed/Nomadic Portable/mobile IEEE , c-2002 and a-2003 were integrated all together and a new standard created which is known as In the beginning, it was published as a revision of the standard under the name REVd, but the standard was reissued under the name at September This is the version of the standard which is used for WiMAX certification. 22
25 2.4.5 IEEE e and Beyond The IEEE Working Group is quite energetic, with committees actively working on extensions to add mobility, conformance standards and test methodologies. The IEEE e extension, which added support for mobile subscriber stations, is ratified during IEEE e has undergone some draft revisions. Also the IEEE f and g are the amendments which deal the network Management Plane in the works. 23
26 Chapter 3 Security of IEEE Standard 3.1 Assessment of IEEE Standard for Known IEEE Vulnerabilities. During the time of design and implementation of IEEE standard, security was one of the major issues under consideration. At least it was tried to get rid of those attacks which were extremely popular for IEEE wireless standard. Most of those attacks were solved later on and the solutions were applied during the evolution of IEEE standard. As a result this newly born standard is free from some attacks and vulnerabilities which are still hazardous in conventional wireless network. But, this doesn t mean that IEEE standard is totally free from security problems. Moreover, before finding out the security lacks of this standard, it s really necessary to study all those issues which were solved after IEEE standard and which are still under consideration. Concerning this matter this chapter reflects on those security issues which were solved in IEEE standard after the implementation and launch of IEEE To handle those attacks even today we need to know shortly how those attacks were in action for IEEE and how they are solved or proposed in IEEE standard. 3.2 Introduction to IEEE Vulnerabilities Most of the vulnerabilities are divided into two classes [18]. These are identity vulnerabilities and media access control vulnerabilities. Some well known vulnerabilities which belong to these two categories are cryptographic weakness, network exploitations and denial of service attacks. 24
27 Identity vulnerability takes place when control and information messages are not authenticated properly. [18] mentioned, this attack happens particularly on IEEE as the standard implicitly trusts message source addresses. The standard does not have a robust sender authentication mechanism at the MAC layer. The receiving station receives message without proper authentication process and any correctly formatted message from an appropriate source address pretend as genuine message. Thus, by sending powerful MAC messages, the attacker takes place of its own. Media access vulnerabilities occurred when the attacker keeps the transmission medium busy for the victim stations. Here, the attacker sends a lot of short packets in rapid succession, and all nodes believe that the medium is already used by another node. All the other nodes are listening to the medium and are waiting for their turn to broadcast, but don t get it as long as it remains occupied. Another way is that the attacker sends packets which are long enough to keep the transmission medium busy for long time. The attacked nodes will not transmit rather waiting until the transmission medium becomes free. This way the attacker attacked the transmission of physical carrier sense mechanism of the nodes. 3.3 Vulnerabilities Considered for IEEE Standard. So far some vulnerabilities of IEEE standard are introduced. There are some other vulnerabilities which are also common to both standards. This section will focus how these vulnerabilities work on both standards. There are some improvements done during the designing time of IEEE standard and so some vulnerabilities which present in IEEE are not exist any longer in IEEE Those improved technologies are also mentioned in this chapter where exist. Some are under construction. Some are still in problem which are mentioned in this paper in the later chapter. 25
28 3.3.1 Deauthentication Attack A. IEEE Background The deauthentication attack is one of the named identity vulnerabilities in IEEE standard. A new node must go through an authentication and association process to get access in an IEEE network. If authentication is open, then any node can join the network freely. But, if it is secured on shared key basis, then the access needs network password. After authentication it goes through association process and then it gets right to access data (sending and receiving) across the whole network. When a node receives a deauthentication message, it instantly removes itself from the network and come back to its base state. In the deauthentication attack, the attacker disguised himself as a node of the wireless network. This rogue node first determines the address of the Access Point (AP) which is analogous to the BS (Base Station) in an IEEE network. The wireless network is controlled by this AP [18]. The address of the AP is not protected by cryptological ways. Sometimes AP s are configured this way that their address can be found by listening to the transmissions of other nodes though they do not broadcast their presence directly. Figure 3.1 De-authentication attack [20] 26
29 By getting the AP s address the attacker uses it as default broadcast address. The attacker transmits the deauthentication message to every station within reach. Any station who believes this message comes from AP, stops transmission immediately. These deauthenticated nodes must now restart the authentication and association process from the beginning. The attacker repeats the transmission of deauthentication message and makes the network traffic completely idle. This is shown in figure 3.1. Deauthentication attack becomes possible only because of some basic properties of the deauthentication message. The most important thing is that the message source address is completely unauthenticated from a logical check. As there is no cryptographical protection exits for the source address of AP. It is an easy task for the attacker to build valid messages and transmit them into the network. If the message is formatted perfectly, the victim will respond to it and fall into the trap. B. Application to IEEE There are some MAC messages in IEEE which are analogous to the deauthentication message found in IEEE One of those messages is the Reset Command (RES-CMD) message. The base station (BS) sends this message to a particular subscriber station (SS) to completely reset itself [19]. The subscriber who will receive this valid RES-CMD message will reinitialize its MAC and try to repeat initial system access is shown in figure 3.2. BS is allowed to send this message to reset unresponsive or malfunctioning SS. Another similar type of message is De/REregister Command (DREG-CMD) message. The BS forced an SS to change its access state by sending this message. One of the purposes of sending this message includes forcing an SS to leave the transmission channel completely. Unlike IEEE , IEEE has significant protection against the misuse of those commands. The first protection mechanism is the use of Hashed Message Authentication Code (HMAC) digest with SHA-1 hash for message authentication. In this mechanism, a 160 bit value is generated as HMAC digest by using the original message and the shared secret key. The HMAC digest is sent to the receiver with the original message. After getting the message the receiver now calculates the HMAC digest by using the message and the known secret key. This calculated value is 27
30 Operational Attacker puts RES-CMD RES-CMD Calculate HMAC digest Over RES-CMD HMAC Verify NO Discard RES-CMD Yes Attack fails Reset SS Reinitialize MAC Initial System Access Fig 3.2: Deauthentication attack prevented by RES-CMD [19] Compared with the receive HMAC value. To get the same hash, the message and the shared key must be exactly same. Otherwise it will not be accepted. 28
31 3.3.2 Replay Attack A. IEEE Background A replay attack is an attack where an authentication message or data is replayed by an attacker to deceive a receiver from granting access. It may be any kind of retransmission of data into a network which brings out by attacker only to fulfill his malicious target. A valid piece of information is intercepted by an attacker and reused without being modified. In IEEE network, this attack creates a Denial of Service (DoS) problem which sometimes becomes a major issue to concern. The receiving node gets the message as valid and then it consumes bandwidth and computing time for the message to be decoded and acted upon. The complete lack of serialization of messages makes IEEE network sensitive in this vulnerability. There is no built in method to detect and discard replayed messages in IEEE network. B. Application to IEEE The scenario is quite different in IEEE standard. To make a successful replay attack an attacker may need the operation of both BS and SS in hand. If the network is designed in FDD (Frequency Division Duplexing) mode, the transmission of BS and SS takes place in different frequencies. Then it really becomes a hard task for an attacker to transmit data in one frequency and receive in another. Again, the presence of HMAC digest demands the retransmitted message must remain unchanged, the capability of the message to be reused depends on its internal details. When there is any transient information like as time stamp or a serial number is given within message, then it really becomes a difficult option for an attacker to bring out this attack. An original RES-CMD message does not contain any serial number, timestamp or transient information. So, an attacker may try to use this message to make a replay attack. But, unfortunately the attack won t get place either. Because, IEEE
32 involves MAC header with the message to calculate HMAC digest. HMAC must be unaltered for the replay attack to work and it creates the problem for the attacker. The MAC header contains CID (Connection Identifier) of SS which must be reset after receiving this message. Once reset, the SS will continue operation under the new CID assigned by the BS. The CID is 16 bit value and the BS chooses one new among 65,536 choices. It is unexpected for an attacker that the SS will be assigned with same CID. Even if the CID remains same, the SS would negotiate a new set of keys with which to authenticate the message. Thus a replay attack based on RES-CMD fails. A replay attack with DREG-CMD message fails too for the same basis AP Spoofing A. IEEE Background The access point spoofing (AP Spoofing) is a typical man-in-the middle attack. The attacker suits himself between two nodes and controls all the traffic between them in this attack. This threat is very dangerous as the attacker is able to catch all the information traveling across the network. It is not so easy rather complex to make a man-in-the-middle attack in a wired network because this would require real access to the network. But there is no need of physical existence in wireless network and so preferred by the attacker. The first step is to set up a rogue AP for association between a victim node and legitimate AP. Then the rogue AP is established by copying all the configuration of the legitimate one: SSID, MAC address etc. The next step is to wait for a new user trying to connect to the network where it gets connection with the rogue AP. The users can connect by themselves with the rogue AP or the attacker can create a denial of service attack to the legitimate AP to interrupt connections and automatically new users get into trap with the rogue AP. In IEEE networks, the subscriber nodes select AP by the strength of the receiving signal. The attacker only needs to do is to ensure that his AP has greater signal strength as seen by the victim. To accomplish that, the attacker tries to place his AP nearer to the victim than the legitimate AP, or to use a different technique by using directional antennas. This scenario is shown in figure
33 Weak signal to original access point Strong signal from rogue access point Figure 3.3: Access Point spoofing by a rogue node [21]. Thus the victim node gets connection to the rogue AP and continues its works as it does with the legitimate AP since it does not know the real fact. The attacker captures all the necessary information s starting from passwords when the victim tries to login for different accesses. Getting all the required information s the attacker achieves the ability to penetrate the legitimate network. This attack is possible in IEEE network because it doesn t have strong twoway authentication between AP and nodes. AP credentials are usually broadcasted across the network for subscriber nodes. As a result, eavesdropping the network becomes easy for the attacker and he gets all the in formations needed. The user nodes may use WEP authentication to authenticate themselves to the AP which is also vulnerable but still more secure. An attacker needs to eavesdrop a lot of traffic and try cryptanalysis in order to get the password. B. Application to IEEE AP spoofing is called BS spoofing in IEEE network. To obtain authorization and traffic keying material from the BS, an SS uses the PKM (Key Management Protocol) protocol. This protocol also supports periodic reauthorization and key refreshment. X.509 digital certificates, the RSA public key encryption algorithm are used by the key management protocol. A strong encryption algorithm is also used to perform key exchanges between SS and BS. 31
34 The PKM protocol performs like as a client-server model. The SS requests keying material being a PKM client to the BS where the BS acts like as a PKM server and responds with the requests of the SS. The SS received only keying material from the BS as a client when they are authorized. The protocol uses MAC management messages which are PKM-REQ and PKM-RSP between the SS and the BS. Public key cryptography is used by the PKM protocol to establish a shared, secret Authentication Key (AK) between the SS and the BS. The authentication key is used to secure traffic encryption keys (TEKs) during consecutive PKM exchanges. Subscriber Station Authentication Base Station and Registration Subscriber Station 1. Authorization Request and Authentication Information (Contains X.509 Certificate) 2. BS responds with Authorization Reply (Contains Authorization Key encrypted with the SS s Public Key) 3. With successful authorization, SS registers with the network Figure 3.4: SS authentication and Registration [12] During the initial authorization exchange a BS authenticates a client SS. Each SS carries a unique X.509 digital certificate issued by the manufacturer. The digital certificate contains the SS s public key and MAC address. When requesting an AK, an SS presents its digital certificate to the BS. The BS verifies the digital certificate and then uses the verified public key to encrypt an AK that the BS then sends back to the requesting SS. Thus, with the AK exchange, the BS establishes an authenticated 32
35 identity of a client SS and the SS is authorized to access its services which is shown in figure 3.4. In this process it s very difficult for an attacker to get inside into the network specially being a rouge SS. The BS is still not ratified and this can be a key point to attack. But, only dedicated and knowledgeable attacker can break through the network. The BS authentication is discussed later on this paper as a new idea to enhance security in IEEE standard Mac Address Spoofing A. IEEE Background A MAC address is an address which exists in Data Link Layer (layer 2) of the OSI model. There are two sublayers in Data Link Layer as we previously mentioned in chapter 2. These two layers are media Access Control (MAC) layer and Logical Link Control (LLC) layer. A network node uses MAC address to gain access to the network and permission to transmit data which is controlled by the MAC sublayer. MAC address is a unique address which is written into hardware during the time of manufacture. In IEEE standard, MAC address filtering at the AP was a way to prevent nonlegitimate users to join the network. But, it was discovered that MAC spoofing was not a hard task for the attackers. There are a lot of programs, for various OSs (Operating Systems) that can modify the MAC address reported by the network adapter. This procedure is really easy and can be done within minutes. Though MAC spoofing became well known, IEEE still use this authorization scheme because the 48-bit MAC thought to be long enough for a brute force attack to take place. But new programs are created in time and these allowed attackers to overcome this barrier. However, the address is broadcasted into the network as required by the standard and attackers don t need to invest long period of time for find out. Only a few packets needed to be intercepted for the attackers to get the MAC address. This way by stealing the MAC address a rogue node can be identified as a legitimate user into the network. 33
36 B. Application to IEEE IEEE standard also uses 48-bit MAC address. During the time of authentication each SS uses an SS certificates which is issued and signed by manufacturer [7]. An SS certificates identifies a particular SS and its MAC address which is included in its subject field. The BS and SS identify each other during the initial ranging and authentication process by using this value. When SS sends Ranging Request (RNG-REQ) to BS, SS includes its MAC address. In the Ranging Response (RNG-RSP) of the BS the MAC address is included again. So, an eavesdropper intercepting either the uplink or the downlink of the connection may get the MAC address of the authorized SS. But, [7] proposed the solution. This design assumes that the SS maintains the private key corresponding to its public key in a sealed storage, preventing attackers from easily compromising it. Still the problem remains in the authentication of BS or the lack of BS certificate. In that case a mutual authentication is needed to prevent the client against forgery or other kind of attacks Attacks on Carrier Sense Transmission A. IEEE Background In IEEE network any station first sense the transmission medium either it is free or occupied. If the station gets the channel free, and then it transmits through the channel when all other stations sense that the channel is busy and don t transmit. This mechanism avoids collisions as only one station accesses the channel at a certain period of time. This mechanism is known as Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) which reduces the probability of collisions in channel during transmission. CSMA/CA can optionally be supplemented by the exchange of a Request to Send (RTS) packet sent by the sender S, and a Clear to Send (CTS) packet sent by the intended receiver R, alerting all nodes within range of the sender, the receiver, or 34
37 both, to keep quiet for the duration of the main packet. This is known as the IEEE RTS/CTS exchange. A rouge node easily breaks out this mechanism in different ways and brings the network down for all other nodes. One simple task it does that it placed itself into the network and transmitting continuously fake packets to keep the transmission medium busy. All other nodes sensing the medium busy and wait until its becoming free. Frequency jamming is another dangerous flaw in wireless network. If an attacker makes a pure RF jamming, then every system, which communicates in the same frequency with the target, would stop operating. B. Application to IEEE IEEE standard doesn t use collision avoidance while sensing the carrier to determine that the transmission medium is free or not. It uses UL map and DL map to control the traffic. It uses collision detection rather than collision control. When there is a collision it sends back data after a certain period again. Attacker cannot make the network nodes fool easily as it does in IEEE After joining into the network all nodes receive UL map before their authentication. UL map contains the transmission time, modulation schemes for transmission. The attacker can try to capture these information s as these messages can be accessed without much difficulties. The attacker then synchronizes its transmission time and frequency to attack. In the UL map, the CID s (Connection Identifier) of SS s are displayed which is found by the attacker. Then it transmits in the same scheduled time as the obtained CID s of SS s. The time and modulation scheme is determined by using UL map. This way a real message of an SS and the rogue message of the attacker will collide. This rogue message is considered as a legitimate message by the protocol as the message is sent after analyzing all original information s. 35
38 Chapter 4 IEEE Security Elements 4.1 Major Security Elements of IEEE Standard There are some major security elements which defined the total security structure of IEEE network. The most significant parts of the IEEE security standard are Security Association (SA), X.509 certificate, PKM authorization, Privacy and Key Management and Encryption. Assessments of these elements are essential before mentioning the security lacks and their implementations. 4.2 Encryption Algorithms There are many encryption algorithms which can be used for securing ciphering key exchange and for the encryption of transport data. These algorithms are included in the IEEE standard security sublayer. The encryption algorithms are: RSA (Rivest Shamir Adleman). RSA is a public key cryptosystem defined by Rivest, Shamir and Adleman in This public-key asymmetric encryption algorithm used to encrypt the Authorisation Reply message using the SS public key. The authorisation Reply message includes the Authorisation Key (AK). RSA may also be used for the encryption of traffic encryption keys when these keys are transmitted from the BS to the SS. This algorithm is based on exponentiation in modular arithmetic. It is one of the popular algorithms generally accepted as practical and secure for public-key encryption. DES (Data Encryption Standard). The DES and 3-DES are shared (secret) key encryption algorithms. The DES algorithm may be used for traffic data encryption. It is mandatory for IEEE equipment. The 3-DES algorithm 36
39 can be used for the encryption of the traffic encryption keys. In DES, a fixed length string of plaintext bits inserted to produce a ciphertext bit string of the same length output. This transformation takes place by a series of complicated operations. In DES, the block size is 64 bits. A key is also used in the transformation from plaintext to ciphertext in DES so that decryption can only be possible by those who are informed about the particular key for encryption. 3-DES is simply another mode of DES operation. It takes three 64-bit keys, for an overall key length of 192 bits. The procedure for encryption is exactly the same as regular DES, but it is repeated three times. Hence the name Triple DES or 3-DES. The data is encrypted with the first key, decrypted with the second key, and finally encrypted again with the third key. Figure 4.1 shows the working procedure of triple DES algorithm. Figure 4.1: Triple DES algorithm [22] AES (Advanced Encryption Standard). The AES algorithm is a shared (secret) key encryption algorithm. The input and output sequences consist of 128 bits in AES algorithm. The Cipher Key for the AES algorithm is a sequence of 128, 192 or 256 bits. This algorithm may be used for traffic data encryption and can also be used for the encryption of the traffic encryption keys. Its implementation is not obligatory. Some other cryptographic algorithms are also included in IEEE standard. 37
40 HMAC (Hashed Message Authentication Code) and CMAC (Cipher-Based Message Authentication Code). A specific algorithm involving a cryptographic hash function in combination with secret key is used to calculate hashed message authentication code in cryptography [23]. It may be used to verify both the data integrity and the authenticity of a message with any MAC. Cryptographic hash function such as MD5 (Message-Digest algorithm 5) or SHA-1 (Secure Hash Algorithm-1) may be used in the calculation of an HMAC. CMAC (Cipher-based Message Authentication Code) is a block cipher based algorithm. HMAC and CMAC are used for message authentication and integrity control. 4.3 X.509 Certificate In 1988 ISO/IEC (the International Organization for Standardization & the International Electrotechnical Commission) and ITU (International Telecommunications Union) published a standard, X.509 which is an electronic proof of identity [24]. X.509 defines an authentication infrastructure based on public-key techniques. It performs implicit authentication using data encryption and explicit authentication using digital signature [25]. During the initial authorization exchange a BS authenticates a client SS. Each SS carries a unique X.509 digital certificate issued by the manufacturer. This digital certificate includes the SS s public key and MAC address. When requesting an AK, an SS presents its digital certificate to the BS. The BS verifies the digital certificate and then used the verified public key to encrypt an AK. The BS then sends back the AK to requesting SS. Figure 4.2 shows the X.509 authentication. Authentication with X.509 Encryption Subscriber Station Figure 4.2: X.509 Authentication [12]. Base Station 38
41 The BS associates an SS s authentication identity and hence with the data service such as voice, video, and data that a subscriber is authorized to access. Therefore, the BS establishes an authenticated identity of a client SS and the services which the SS is authorized to access with the AK exchange. As the BS authenticates the SS, it can defend against an attacker employing a cloned SS that is masquerading as a legitimate SS. Prevention of cloned SSs from assigning false credentials to a BS can be prevented by using the X.509 certificate. All SSs may have factory-installed RSA private/public key pairs or have an internal algorithm to generate such key pairs dynamically. If an SS needs to generate its RSA key pair by using its internal algorithm, the SS will generate the key pair before it exchanges AK. All SSs that rely on internal algorithms to generate an RSA key pair will support a mechanism for installing a manufacturer-issued X.509 certificate. The application of a factory-installed RSA private/public key pair confines the chances of success for any hacker. The first obstacle for a hacker is to have an SS from the same vendor as the targeted BS, and the second is to crack the X.509 encryption. 4.4 Security Associations (SAs) The IEEE standard defines a Security Association (SA) as a set of security information a BS and one or more of its client SSs share in order to support secure communications. The SAs are managed by the BS. When an authentication event takes place the BS gives the SS a list of Security Associations associated with its connections. Generally, an SS has a Security Association for its secondary management connection and two more for the downlink and the uplink links. After that, the BS may indicate one or more new SAs to the SS. Each SA has its own ID called SAID. The base station and the subscriber share the SAID and develop all the security parameters which make things a lot easier. The Security Association Identifier (SAID) is a 16-bit identifier shared between the BS and the SS that uniquely identifies an SA [29]. 39
42 4.5 Encryption Keys Different encryption keys are used for the security of IEEE network. A list of encryption keys of IEEE standard is given in the table below. The notation and number of bits of the keys are also stated. Table 4.1: Encryption keys used in the IEEE standard, in its IEEE version [26]. Encryption Symbol Number of Description Keys Bits Authorisation Key Key Encryption Key Traffic Encryption Key HMAC Key for the Downlink HMAC Key for the Uplink HMAC Key in the Mesh mode AK 160 SS gets authentication from its BS. It s a shared secret key and used for secure transactions. It is also used to generate encryption keys. KEK 128 Key Encryption Key used for the encryption of the TEK. TEK 128 Used to encrypt data by using different algorithms. HMAC_KEY_D 160 It authenticates messages in the downlink direction. HMAC_KEY_U 160 It authenticates messages in the uplink direction. HMAC_KEY_S 160 It authenticates messages in the Mesh mode. 4.6 The PKM Protocol The BS acts as server and controls the distribution of keying material to the client SS. An authenticated client/server key management protocol is employed by the security 40
43 sublayer of IEEE standard. The PKM (Privacy Key Management) protocol based security is present where the BS authenticates a client SS during the initial authorisation exchange. An SS used digital-certificate to get authentication from the BS. Public key cryptography is used by the PKM protocol to establish a shared secret key between the SS and the BS. PKM protocol is also used by the SS to support periodic reauthorisation and key refresh. PKMv1 is used in IEEE standard and its basic working features are listed in the table below. Table 4.2: The basics of PKMv1 protocol in IEEE standard [26]. Feature PKMv1 protocol Authentication RSA-based one-way authentication: the BS authenticates the SS. Security Association One SA family: Unicast. Composed of three types of security associations: primary, dynamic and static. Key Encryption Use of three encryption algorithms: 3-DES, RSA and AES. Data Encryption Two different algorithms are defined in standard: DES in the CBC mode, AES in the CCM mode. In IEEE standard the PKM protocol has two generic MAC management messages: 41
44 o PKM Request (PKM-REQ). The PKM-REQ message contains one PKM message in its message payload. This message is transferred from the SS to the BS. o PKM Response (PKM-RSP). The PKM-RSP message contains one PKM message in its message payload. It is always transferred from the BS to the SS. The BS authenticates the SS and provides it with key material to enable the ciphering of data after capability negotiation. Every SS starts initial work with RSA private/public key pairs which are installed by the manufacturing company on it. An internal algorithm might be given to produce these key pairs sometimes instead of direct attachment. When RSA key pairs are installed on SS by manufacturer, a digital X.509 certificate is also provided. But, when internal algorithm needs to generate key pairs, there exits a mechanism to install manufacturer issued X.509 certificate by following the key generation. So, X.509 digital certificate of each SS is unique and issued by the SS manufacturer. The public key and the MAC address of an SS are attached with the SS X.509 digital certificate. The SS X.509 certificate is a public key certificate that combines the SS identifying information to its RSA public key. The secret key AK is received from the operator. An SS presents its digital certificate to the BS when requesting an AK. The SS X.509 certificate is signed digitally by the SS manufacturer. As the BS knows the manufacturer s public key, it can verify the signature. An SS got the verification from the BS by showing its X.509 digital certificate during the time of requesting an AK (Authorisation Key). It also presents the description of the supported cryptographic algorithms to the BS. Further secure transactions are done by this shared secret AK. Before sending an authentication response to the SS, the BS verifies the digital certificate and determines the encryption algorithm that should be used. The RSA algorithm is used to encrypt the AK with the verified public key. This RSA public key encrypted AK is then sent to the requesting SS from the BS. This authentication process and key exchange are shown in the figure
45 SS BS SS initiates its access SS sends the authorization information to BS and presents its X.509 Certificate. SS sends the authorization request message and presents its X.509 certificate with its supportive encryption algorithm The SS is authenticated by the BS as the BS can verify the signed digital certificate X.509 of SS. Authorisation Response, (RSAencrypted with SS public key), BS sends the authorization Key (AK) to SS Keys are in exchange, using AK Figure 4.3: Authentication and Authorisation Key allocation by the BS. The BS is the server and the SS is the client [26]. At first, a PKM Authorisation Information message is sent by SS. X.509 certificate is provided with this message. This is an informative message that SS sends to the BS and the BS gets the knowledge of manufacturer s certificate of the client SS. After the Authorisation Information message, an SS sends A PKM Authorisation Request message to the BS. This message contains the SS X.509 certificate, SSs 43
46 primary SAID and a description of its security ability. The digital certificate is verified again by the BS. The AK is encrypted by the public key. The BS sends back a PKM Authorisation Response message to the SS containing this AK. Cloned SSs are prevented to pass false credentials to a BS with this mechanism. 4.7 Authorisation Key (AK) Management The keying information s of all its SAs are maintained by the BS. The PKMv1 protocol uses public key cryptography to establish a shared secret key i.e. an AK between the SS and the BS. An unknown SS sends an Authorisation Request message to the BS. It initiates the activation of a new AK. The BS creates and then sends back this AK to requesting SS in Authorisation Reply message. Every AK has a predefined lifetime given by the BS. The AK remains active until it expires. An SS must reauthorize before the expiration of its current AK otherwise the BS considers this SS unauthorised and then no longer holds an active AK for it. This is the responsibility of an SS for requesting authorisation to its BS and maintaining an active AK. By reissuing an Authorisation Request to the BS, an SS refreshes its AK. With the reception of an Authorisation Request message from an SS, the BS starts an AK transition period. The BS creates a single active AK for the SS. This AK is sent back with Authorisation Reply message to the SS. In reception of another Authorisation Request message, the BS sends back a second AK to the SS. It s mentioned earlier that every AK has a predefined lifetime which is fixed by the BS. This second AKs lifetime is the remaining lifetime of the first AK and a predefined AK lifetime. After receiving this Authorisation Reply message, an SS starts sending of Key Request MAC management message encrypted with this AK. The lifetimes of these two AKs overlap each other. The BS has the ability to support two active AKs in the same time for each client SS during an AK transition period. When the older key expires the key transition period ends. A configurable duration of time is maintained by every SS to schedule the beginning of reauthorisation. The BS does not need to know this time. The BS maintains the AKs according to their 44
47 predefined lifetime. AKs exercise is imperative when encryption keys are generated for more exchanges. 4.8 Data Encryption The PKM protocol performs key exchanges between the SS and the BS by using X.509 digital certificate, the RSA public key encryption algorithm and other strong encryption algorithms. When an AK is obtained by an SS from BS after the exchanges of PKM messages, it is used for further secure PKM exchanges of TEKs (Traffic Encryption Keys). So, in IEEE , it is obtained two-tier key systems. At first, the PKM protocol authenticates an SS to BS when a shared secret key (AK) is established by public key cryptography and then SS gets the registration to the network when AK is used to secure the exchange of Traffic Encryption Keys (TEKs) [27]. The BS generates two TEKS initially for each SA. When the old one expires, it generates new key. Among the two keys the BS uses the older one to encrypt the downlink traffic. To decrypt the uplink traffic it uses either of the two keys depending on which key is being used by the SS. Figure 4.4 shows that the SS requests the BS for encryption keys TEK0 and TEK1. The BS changes its key whenever it expires. The SS uses the newer of the two keys to encrypt uplink traffic. For downlink traffic, it can use either of the two keys depending upon which key is being used by the BS. SS BS Key Request Key Reply (TEK0, TEK1) Figure 4.4: The SS asks the BS for encryption keys TEK0 and TEK 1[28]. 45
48 TEKs have a limited lifetime and needs to refresh periodically. At expiration of the older TEK, the BS uses the newer TEK for encryption. It is the responsibility of the SS to update its keys on regular interval of time. The BS uses a KEK when encrypting the TEK in the Key Reply (PKM-RSP) MAC management message. The TEK is encrypted with one of the following algorithms, using the KEK: 3-DES, RSA or AES. The TEK encryption algorithm is indicated by the TEK encryption algorithm identifier in the cryptographic suite of the SA [28]. 46
49 Chapter 5 My Contribution The intention of this paper is to accumulate all security issues of IEEE standard, finding security threats and suggesting their solutions. Security might not be a major concern in wired network but plays a vital role in wireless network. Researchers still have been working on it since it began its journey. In future, more problems may come out and researchers will present newer solutions. It s an immense area and needs to maintain a regular inspection as it is increasing with time. IEEE network is a modern theme in broadband wireless network. It has already achieved high recognition among people to serve wireless broadband network. High popularity demands high security in data transmission. High security and robust transmission will take this technology far stage ahead in the sector of broadband wireless and world wide network access. 5.1 Mutual Authentication In IEEE standard, an SS tries all the way to get authentication from BS. But, there exists no regulation for BS to authenticate itself. Because of this lack, a rogue BS may pretend as a legitimate BS which is not possible for an SS to recognize. Therefore BS must authenticate itself as SS does. Mutual authentication is the solution. Authentication must be performed from both sides. We can have a look in the present scenario. The existing authentication protocol can be shown in figure below. Message 1: SS à BS: Cert (SS) (Auth Req message) Message 2: SS à BS: Cert (SS) Capabilities BCID Message 3: BS à SS: KU SS (AK) SeqNo Lifetime SAIDList Figure 5.1: Authentication Protocol in IEEE Standard. 47
50 In Figure 5.1, Cert (SS) is the digital X.509 certificate that SS got from its manufacturer. The X.509 basic fields include the certificate version, serial number, signature, issuer, validity, subject, subject public key info, issuer unique ID, subject unique ID, and extensions. The SS supported authentication and data encryption algorithms are included in Capabilities. BCID is the Basic Connection ID of SS. BS sends back KU SS (AK) which is the Authorisation Key encrypted by SS s public key. SeqNo is a 4-bit sequence number for AK. Lifetime is the number of seconds before AK expires (32 bits). The identities and the properties of the SAs (Security Associations) due to which an SS is authorized to obtain keying information are given in SAIDList. This existing protocol has no approach to define the authentication of BS. A rogue BS can seize the message from SS instead of legitimate BS and can appear itself as a legitimate BS. Let s consider that the rogue BS cannot open the data message as those are encrypted but it can easily replay the message to the BS again and again, and can make the SS unauthenticated to the BS. Important data like as banking or government activities are not secured on this protocol. Mutual authentication is implemented in the next version of the standard which is IEEE e mobile network. But, there is no hand in work yet for the fixed network. This paper proposed an algorithm to make this fixed network reliable and robust which is discussed below. 5.2 The Proposed Algorithm for BS Authentication During the time of transmission, an SS initiates the session. It sends its identifications, capabilities and other requirements to the BS. After checking the documents the BS sends back Authorization Reply to the SS. This reply must be checked whether it is from the legitimate BS or rogue BS. As the SS has no ability to check it, it can get help of a trusted third party. This third trusted party is an Authentication Server (AS) which must be in the knowledge of SS. The AS and the BS know each other as they are manufactured by the manufacturer this way. After getting the Auth Reply from the BS, the SS will send it to the Authentication Server (AS). The BS will also forward 48
51 information containing its own ID, SSID and SS credentials to the AS. The AS will judge both side information s received from the BS and the SS and return the confirmation to the SS. In this message, if SS finds that the BS is a legitimate one, it will continue its transmission. Otherwise, it will end further communication with the BS. Step 1: SS communicates BS Step 2: BS communicates SS and AS Step 3: SS communicates AS Step 4: AS communicates SS Step 5: SS communicates BS Figure 5.2: The Mutual Authentication process to avoid Rogue BS attack The figure 5.2 shows the new authentication protocol to avoid rogue BS. Here the BS sends back the Auth Reply message to the legitimate SS where it also includes its ID which the SS will present to Authentication Server (AS). If any attacker tries to involve the network, it will be captured by Authentication Server. However, legitimate BS will not allow any other party but the legitimate SS as it checks its ID and other credentials. DES (Data Encryption Standard) encryption can be used in all private-public key cases. 49
52 5.3 Detail Communication with the Authentication Server The BS and the AS know each other from the commencement as they are manufactured this way. An AS permits only a legitimate BS and no other disturbing elements. The SS knows equally the BS and the AS so that it can verify the BS from the trusted AS. The Figure 5.3 shows the overall messaging diagram of a successful authentication transmission between a BS and an SS where both of them obtain help from the trusted third party the AS (Authentication Server). All the messages are described below in the message exchanging diagram. Message 1: SS à BS: Cert (SS) (Auth Req message) TS (Time Stamp) Message 2: SS à BS: Cert (SS) Capabilities BCID TS Message 3: BS à SS: KU SS (AK) SeqNo Lifetime SAIDList BSID Message 4: BS à AS: BSID SSID KU ss Message 5: SS à AS: E (KR ss, [SSID BSID]) Message 6: AS à SS: E (KU ss, [Confirmation Message]) Message 7: SS à BS: E(Further Communication) Figure 5.3: The overall Communication Process. Message 1: SS communicates with BS. Message 2: SS initiates the communication presenting its own certificate and credentials named as capabilities with time stamp only to defend overflowing from thieves for the BS. Message 3: The BS presents its own ID and other documents by encrypting with SS public key. Message 4: The BS also sends the credentials of SS to the AS. However, the BS and the AS are both established by the manufacturer and they know each other as trust equipment. Message 5: The SS gives the credentials that it received from the BS to the AS encrypting by its own private key. Message 6: The AS knows the SS s public key from the BS and sends back the confirmation message after observing the message. Message 7: Protected communication starts between the SS and the BS. 50
53 5.4 Replay Attack Prevention When the SS sends its ID and initial credentials, an attacker can get it and then continuously sends to the BS. The BS considers the legitimate SS as a fraud and denies. When the legitimate SS tries to connect later, the BS may block it permanently from the network. This is replay attack in which an attacker though cannot read the data of the legitimate SS but can bring the SS out of the network A time stamp is needed for it. The data type of time stamp is simply time identifying when the action, messaging or transmission takes place. Time stamps usually have fixed length validity period. A signature on some data (either in a certificate or message) that includes a specified time or period of time (length can be in milliseconds) during which a key or data is valid is called a timestamp. Any transmission or communication after this time period will not work out by the system which makes the system secure from outside attack as attackers are trying to reach when the period is over (as attacker needs time to process and retransmit). This will inform the BS about the time and an attacker will not acquire success in his bad motivation. This procedure can be shown in figure 5.3. In this figure it is shown that an SS contacts with the BS by using a time stamp. Message 1: SS à BS: Cert (SS) (Auth Req message) TS (Time Stamp) Message 2: SS à BS: Cert (SS) Capabilities BCID TS Message 3: BS à SS: KU SS (AK) SeqNo Lifetime SAIDList TS BSID Figure 5.4: Prevention of replay attack by using Time Stamp. The BS also sends back its ID to the SS which is BSID (Base Station ID). The SS sends this ID to the AS to check the BS status. 51
54 5.5 Man in Middle Attack and Denial of Service Attack Prevention These both attacks are omitted from this scenario. We can review that how these attacks can take place for the subscriber. When an attacker gets the initial data that a subscriber sends to the BS for the first time, the attacker may get a copy of it and tries to send the same data to the BS again and again. The BS then considers the original SS as a fake one and denies to service. But, in this proposed scenario, the attacker cannot send data the BS as there used a time stamp. Because of using time stamp, the BS will not allow any more unencrypted data from that SS. As the BS knows the SS s public key, further transmission that the BS will accept from that SS must be encrypted. And it is not an easy task for the attacker to overcome the time stamp. So, there is no man in middle attack which easily removes the possibility of denial of service attack. Since, the denial of service attack is the last part of man in middle attack in this case. 5.6 Simulation Result The proposed algorithm is demonstrated in a simulation process only to represent its accuracy, perfections and way of working. The obtained result of the simulation process confirmed that the algorithm works according to its theme and process. The testing environment of the simulation and its way of working is given below Testing Environment Testing environment expressed the manipulation of the result. A simple implementation of a TCP client server relationship has been considered here where the SS works as client, the BS the AS work as server respectively. The algorithm has some prerequisite conditions like as the BS the AS are previously trusted to each other and the SS the BS would use public key cryptography for message encryption or decryption. 52
55 The simulation process used the following things in its testing environment. Microsoft Windows Vista platform Processing power of the machine 2.0GHZ The Socket class in the.net framework TCP/IP protocol. Some encryption and decryption capabilities. Programming language C#.NET Overall Communication Process Step 1: The BS is waiting to get someone s request like as the SS. Here the BS is running at port 8001 and the local IP is Figure 5.5: The Base Station (BS) is waiting for the connection. Step 2: The SS has connected to the BS with port 8001 and Local end point is The SS is sending its subscriber ID and all necessary credentials to the BS. 53
56 Figure 5.6: The SS is sending information to the BS. Step 3: The BS received successfully the SS credentials. The BS encrypted its ID by using DES encryption and sends it to the SS. Figure 5.7: The BS is sending information to the SS. Step 4: The SS received encrypted information from the BS. The SS is decrypting the BS information by using DES decryption and found the BS ID. 54
57 Figure 5.8: The SS received message from the BS and decrypting the message. Step 5: To Verify the BS, the SS is sending the BS ID to the Authentication Server (AS). Local end point of the AS is and TCP port Figure 5.9: The SS transmitting message to the AS. Step 6: The AS received message from the SS, verified the BS as rouge or trusted and sent acknowledgement to the SS. 55
58 Figure 5.10: The AS verified the BS and sent message to the AS. Step 7: After receiving the acknowledgement of the AS, the SS got the confirmation that the BS is trusted or not. If the BS is trusted then protected communication will start between the SS and the BS otherwise all communication will remain stop in this phase. Figure 5.11: The SS verified the BS. 56
59 Chapter 6 Conclusion and Future Works 6.1 Conclusion This research focused on the security of IEEE Wimax network. Different attacks were analyzed against the networks security architecture. Mutual authentication is verified only to enhance the security of subscriber to avoid fake base stations. The proposed algorithm showed how to establish mutual authentication. The major security elements and their functions are explained only to present the security architecture to the researchers. The security lacks are found only by doing paper based works but the attacks are not so easy in real world. Even if the security holes exist, it needs highly dedicated expertise attacker to penetrate. Researchers and manufacturers are working responsibly to make it more authenticated and robust. Though some vulnerabilities are already determined and fixed, new attacks may occur. For this reason, a regular study and keen observation is essential. 6.2 Future Works IEEE e which is also known as Mobile Wimax, the latest standard for Wimax which already presents considerable security improvements over IEEE This standard employs better encryption methods and has additional secure key management protocol. A new authentication method based on EAP (Extensible Authentication protocol) is added. But there are a lot of security issues remain to be solved yet. Authentication and authorization are fundamental to every wireless technology, because without strong security the technology is not comfortably utilizable. The future work is to focus on the authentication and authorization of IEEE e keeping some questions in front side. 57
60 a) What are the main authentication and authorization aspects in Mobile Wimax? b) What are the main security issues associated with authentication and authorization for Mobile Wimax? c) Which security solutions satisfy the security issues? d) What more can be done as its security improvements? 58
61 References [1]. WiMAX.com is the leading community portal for the worldwide WiMAX community. [2]. Roger B. Marks, IEEE Standard for Global Broadband Wireless Access, ITU Telecom World 2003, Session: The future of wireless Geneva, Switzerland. [3]. Mahmoud Nasreldin, Heba Aslan, Magdy El-Hennawy, Adel El-Hennawy. WiMax Security mber= /08 $ IEEE DOI /WAINA [4]. Kejie Lu and Yi Qian, University of Puerto rico, Hsiao-Hwa Chen, National Sun Yat-Sen University. A Secure and Service-Oriented Network Control Framework for WiMax Networks mber= [5]. Michel Barbeau, School of Computer Science, Carleton University, Canada. WiMax Threat Analysis barbeau.pdf [6]. Hyung-Joon Kim, Dept. of Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, New Jersey IEEE /WiMax Security [7]. Jamshed Hasan, School of Computer and Information Science, Edith Cowan University, Australia Security Issues of IEEE (WiMax) %20Security%20Issues%20of%20IEEE% %20(WiMAX).pdf [8]. Derrick D. Boom Denial of Service Vulnerabilities in IEEE Wireless Networks IEEE C802.16e-04/406 [17]. hannel=b [9] Loutfi Nuaymi, WiMAX Technology for Broadband Wireless Access, John Wiley & Son Ltd. [10] IEEE , IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems, 1 October,
62 [11] Mohammad Azizul Hasan, Performance evaluation of WiMAX/ OFDM Physical layer, Helsinki University of Technology. [12] Frank Ohrtman, WiMAX Handbook, building WiMAX networks, McGraw-Hill [13] Roger B Marks, IEEE Standard for Global Broadband Wireless Access, [14] IEEE Std , IEEE Std IEEE Standard for Local and Metropolitan area networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems, December 2001 [15] IEEE , IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems, 1 October, 2004 [16] IEEE Std a2003 (Amendment to IEEE Std ), IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems Amendment 2: Medium Access Control Modifications and Additional Physical Layer Specifications for 211 GHz, January 2003 [18] John Bellardo and Stefan Savage, Denial of Service Attacks Real Vulnerabilities and Practical Solutions. [19] Derrick D. Boom, Denial of Service Vulnerabilities In IEEE Wireless Networks, Master s Thesis at Naval Postgraduate School Monterey, California, USA, [20] M. Zubair Shafiq and Muddassar Farooq, College of Electrical & Mechanical Engineering National University of Sciences & Technology, Rawalpindi, Pakistan. [21] [22] Panu Hamalainen, Marko Hannikainen, Configurable Hardware Implementation Of Triple DES Encryption Algorithm For Wireless Local Area Network, Tampere University of Technology, Finland. [23] Donald L. Evans, Philip J. Bond, Arden L. Bernent, Fips Pub 198, The Keyed- Hash Message Authentication Code (HMAC), National Institute of Standard and Technology. [24] Hoyt L. Kesterson II, Digital Signature-Whom do you trust? Bull HN World wide Information Systems Inc, Phoenix, Arizona [25] Sharon Boeyen, White Paper, S.509 Certification Path Validation. 60
63 [26] Laurent Butti, Wimax: Security Analysis and Experience Return, Network Security Senior Expert, Orange Division R&D, France Telecom. [27] Sen Xu, Manton Matthews, Chin-Tser Huang, Security Issues in Privacy and Key Management Protocols, Department of Computer Science and Engineering, University of South Carolina. [28] VMD Jagannath, Wireless Security , Term Paper Report; CS 625. [29] David Johnston and Jesse Walker, Overview of IEEE Security. IEEE Computer Society. 61
64 Appendix 1: The BS (Base Station) programming code. using System; using System.Text; using System.Net; using System.Net.Sockets; using System.Security.Cryptography; using System.Collections.Generic; using System.ComponentModel; using System.Data; using System.Linq; using System.IO; namespace Base_Station { class Program { public static void Main() { try { IPAddress iipaddress = IPAddress.Parse(" "); //use the same in the client /* Initializes the Listener */ TcpListener itcplistener = new TcpListener(iIPAddress, 8001); /* Start Listeneting at the specified port */ itcplistener.start(); Console.WriteLine("\nThe Base Station (BS) is running at port "); Console.WriteLine("\nThe local End point is :" + itcplistener.localendpoint); Console.WriteLine("\nWaiting for a connection..."); Socket isocket = itcplistener.acceptsocket(); Console.WriteLine("\nConnection accepted from the Subscriber Station (SS) " + isocket.remoteendpoint); ID : "); byte[] vbyte = new byte[100]; int k = isocket.receive(vbyte); Console.WriteLine("\nRecieved Subscriber Station (SS) for (int i = 0; i < k; i++) Console.Write(Convert.ToChar(vbyte[i])); /*********************Message Encryption******************************/ string smsg = "005"; string venc; DESCryptoServiceProvider idescryptoserviceprovider = new DESCryptoServiceProvider(); 62
65 System.Text.Encoding iencoding = new System.Text.UTF8Encoding(); byte[] vkey = iencoding.getbytes(" "); byte[] viv = { 1, 2, 3, 4, 5, 6, 7, 8 }; ICryptoTransform iicryptotransform = idescryptoserviceprovider.createencryptor(vkey, viv); byte[] vmsg = iencoding.getbytes(smsg); byte[] benc = iicryptotransform.transformfinalblock(vmsg, 0, vmsg.length); venc = System.Convert.ToBase64String(benc); /*********************Message Encryption******************************/ string vbsidencry = venc; ASCIIEncoding asen = new ASCIIEncoding(); isocket.send(asen.getbytes(vbsidencry)); Console.WriteLine("\nSent Acknowledgement..."); Console.WriteLine("\n************************************************ ******************************"); /* clean up */ isocket.close(); itcplistener.stop(); } } catch (Exception e) { Console.WriteLine("Error... " + e.stacktrace); } } } 63
66 Appendix 2: The SS (Subscriber Station) programming Code. using System; using System.Text; using System.Net; using System.Net.Sockets; using System.Security.Cryptography; using System.Collections.Generic; using System.ComponentModel; using System.Data; using System.Linq; using System.IO; namespace Subscriber_Station { class Program { public static void Main() { try { TcpClient itcpclient = new TcpClient(); Console.WriteLine("\nConnecting..."); itcpclient.connect(" ", 8001); // Connected to the BS Console.WriteLine("\nConnected to the Base Station (BS)"); Console.Write("\nEnter the Subscriber Station (SS) ID to be transmitted to the Base Station (BS): "); String istring = Console.ReadLine(); Stream istream = itcpclient.getstream(); ASCIIEncoding iasciiencoding = new ASCIIEncoding(); byte[] vbyte = iasciiencoding.getbytes(istring); Console.WriteLine("\nTransmitting..."); istream.write(vbyte, 0, vbyte.length); byte[] bb = new byte[100]; int k = istream.read(bb, 0, 100); for (int i = 0; i < k; i++) Console.Write(Convert.ToChar(bb[i])); Console.WriteLine("\nReceived Message Successfully..."); itcpclient.close(); Console.WriteLine("\nOops! The Base Station (BS) ID is Encrypted..."); Console.WriteLine("\nDecrypting..."); string str; System.Text.ASCIIEncoding enc = new System.Text.ASCIIEncoding(); 64
67 str = enc.getstring(bb); string trimmed = str.trim('\0'); /*********************Message Decryption*************************/ string sdec; DESCryptoServiceProvider idescryptoserviceprovider = new DESCryptoServiceProvider(); Encoding iencoding = new System.Text.UTF8Encoding(); byte[] bkey = iencoding.getbytes(" "); byte[] biv = { 1, 2, 3, 4, 5, 6, 7, 8 }; ICryptoTransform iicryptotransform = idescryptoserviceprovider.createdecryptor(bkey, biv); byte[] ibyte = System.Convert.FromBase64String(trimmed); byte[] idec = iicryptotransform.transformfinalblock(ibyte, 0, ibyte.length); sdec = iencoding.getstring(idec); /*********************Message Decryption*************************/ string vbsidde = sdec; Console.WriteLine("\nBase Station (BS) ID is: " + vbsidde); TcpClient Atcpclnt = new TcpClient(); ///////////////////////////////////////////////////////////////////// ///// Atcpclnt.Connect(" ", 8002); // Connected to the AS Console.WriteLine("\nConnected to the Authentication Server (AS)..."); Console.Write("\nEnter the Base Station (BS) ID to be transmitted to the Authentication Server (AS): "); istring = Console.ReadLine(); istream = Atcpclnt.GetStream(); vbyte = iasciiencoding.getbytes(istring); Console.WriteLine("\nTransmitting..."); istream.write(vbyte, 0, vbyte.length); bb = new byte[100]; k = istream.read(bb, 0, 100); for (int i = 0; i < k; i++) Console.Write(Convert.ToChar(bb[i])); Console.WriteLine("\n************************************************ *******************"); 65
68 Atcpclnt.Close(); ///////////////////////////////////////////////////////////////////// //// } } catch (Exception e) { Console.WriteLine("Error... " + e.stacktrace); } } } 66
69 Appendix 3: The AS (Authentication Server) programming Code. using System; using System.Text; using System.Net; using System.Net.Sockets; namespace Authentication_Server { class Program { static void Main(string[] args) { try { IPAddress iipaddress = IPAddress.Parse(" "); //use the same in the client (Local machine IP Address) TcpListener itcplistener = new TcpListener(iIPAddress, 8002); itcplistener.start(); Console.WriteLine("\nAuthentication server (AS) is running at port \n"); Console.WriteLine("\nThe local End point is :" + itcplistener.localendpoint); Console.WriteLine("\nWaiting for a connection..."); Socket isocket = itcplistener.acceptsocket(); Console.WriteLine("\nConnection accepted from the Subscriber Station (SS)" + isocket.remoteendpoint); byte[] vbyte = new byte[100]; int j = isocket.receive(vbyte); Console.WriteLine("\nRecieved..."); for (int i = 0; i < j; i++) Console.Write(Convert.ToChar(vbyte[i])); string str; System.Text.ASCIIEncoding enc = new System.Text.ASCIIEncoding(); str = enc.getstring(vbyte); string str1 = "005"; int result = str1.compareto(str); ASCIIEncoding iasciiencoding = new ASCIIEncoding(); if (result == 0) { isocket.send(iasciiencoding.getbytes("\nthisbase Station (BS) is Trusted!!!!!!!")); Console.WriteLine("\nSent Acknowledgement"); Console.WriteLine("*************************************************" ); 67
70 } if (result!= 0) { isocket.send(iasciiencoding.getbytes("\nthis BS is Rouge!!!!")); Console.WriteLine("\nSent Acknowledgement"); Console.WriteLine("***********************************************"); } /* clean up */ isocket.close(); itcplistener.stop(); } } } } catch (Exception e) { Console.WriteLine("\nError... " + e.stacktrace); } 68
NEW WORLD TELECOMMUNICATIONS LIMITED. 2 nd Trial Test Report on 3.5GHz Broadband Wireless Access Technology
NEW WORLD TELECOMMUNICATIONS LIMITED 2 nd Trial Test Report on 3.5GHz Broadband Wireless Access Technology Issue Number: 01 Issue Date: 20 April 2006 New World Telecommunications Ltd Page 1 of 9 Issue
INTRODUCTION TO IEEE STANDARD 802.16: WIRELESS BROADBAND ACCESS
RIVIER ACADEMIC JOURNAL, VOLUME 3, NUMBER 1, SPRING 2007 INTRODUCTION TO IEEE STANDARD 802.16: WIRELESS BROADBAND ACCESS Robert J. Zupko* Undergraduate student, B.S. in Computer Science Program, Rivier
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
Figure 1: Bandwidth and coverage of wireless technologies [2].
Simulation and Performance Evaluation of WiFi and WiMAX using OPNET Ravinder Paul, Sukhchandan Lally, and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {rpa28, lally,
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Network Configuration Setup Guide. Air4G-W24 9.50
For Air4G-W24 9.50 This document forms the release note relevant to the specific product release as stated above. It covers new features, performance and any limitations of the product known at the time
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
802.16 - Usage. Wireless Broadband Networks. Need for Speed WMAN
Wireless Broadband Networks - Usage WLAN: Support of mobile devices, but low data rate for higher number of users What to do for a high number of users or even needed QoS support? Problem of the last mile
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
How To Test The Performance Of The Internet Protocol Security Over Wimax (Ipec) Over Wimax Networks
PHOTO F/X2 IPSec Provisioning in WiMAX Networks Levon Nazaryan, Emmanouil A. Panaousis, and Christos Politis The IEEE 82.16 standard [7] (mobile broadband wireless access system), which is also known as
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work
Cable Modems Definition Cable modems are devices that allow high-speed access to the Internet via a cable television network. While similar in some respects to a traditional analog modem, a cable modem
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Simulative Investigation of QoS parameters for VoIP over WiMAX networks
www.ijcsi.org 288 Simulative Investigation of QoS parameters for VoIP over WiMAX networks Priyanka 1, Jyoteesh Malhotra 2, Kuldeep Sharma 3 1,3 Department of Electronics, Ramgarhia Institue of Engineering
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Narrowband and Broadband Access Technologies
Computer Networks and Internets, 5e Chapters 12 and 16 Access and Interconnection Technologies (slidesets abridged/combined) By Douglas Comer Modified from the lecture slides of Lami Kaya ([email protected])
WiMAX and 802.16 Standards
WiMAX and 802.16 Standards Pietro Nicoletti piero[at]studioreti.it Wimax-Eng - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Providing Teleworker Services Describe the enterprise requirements for providing teleworker services Explain how
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
Fixed, nomadic, portable and mobile applications for 802.16-2004 and 802.16e WiMAX networks
Fixed, nomadic, portable and mobile applications for 802.16-2004 and 802.16e WiMAX networks November 2005 Prepared by Senza Fili Consulting on behalf of the WIMAX Forum Executive Summary The WiMAX Forum
International Journal of Advance Engineering and Research Development. QoS Analysis of VOIP Traffic over WiMAX
Scientific Journal of Impact Factor(SJIF): 3.134 International Journal of Advance Engineering and Research Development Volume 2,Issue 5, May -2015 QoS Analysis of VOIP Traffic over WiMAX Saira Banu 1,
TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY
TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY SUBMITTED TO THE KUMAUN UNIVERSITY, NAINITAL BY MANOJ CHANDRA LOHANI FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE UNDER THE
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Appendix A: Basic network architecture
Appendix A: Basic network architecture TELECOMMUNICATIONS LOCAL ACCESS NETWORKS Traditionally, telecommunications networks are classified as either fixed or mobile, based on the degree of mobility afforded
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
The Draft IEEE 802.16m System Description Document
00-0- IEEE 0.m-0/00 0 0 Table of Content Scope References The Draft IEEE 0.m System Description Document Definition, Symbols, Abbreviation Overall Network Architecture IEEE 0.m System Reference Model IEEE
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications
Application Note License-Exempt Gigabit Ethernet Microwave Radio Applications Applicable Products: EX-5r GigE, EX-5r-c GigE Introduction The accelerated growth of fixed and mobile wireless broadband services
1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
COMP 3331/9331: Computer Networks and Applications
COMP 3331/9331: Computer Networks and Applications Week 10 Wireless Networks Reading Guide: Chapter 6: 6.1 6.3 Wireless Networks + Security 1 Wireless and Mobile Networks Background: # wireless (mobile)
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
Municipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction...
Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS... 6 3G... 6 Wimax... 7 Introduction... 7 Fixed-WiMAX based on the IEEE 802.16-2004... 8 Mobile
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Ajay Gummalla-July 2001
DOCSIS Overview Ajay Gummalla Ethernet in the First Mile Study Group July 2001 Ajay Gummalla-July 2001 1 HFC Plant Topology VIDEO combiner Fiber TX Fiber Fiber RX Tap CMTS Fiber RX Fiber Fiber TX 2way
IEEE 802.16 Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the 802.16 Air Interface Specification
Project Title Date Submitted Source Re: Abstract Purpose Notice Release IEEE Patent Policy IEEE 802.16 Broadband Wireless Access Working Group ATM Based MAC Layer Proposal for the 802.16 Air Interface
1 Introduction to mobile telecommunications
1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Motorola Wireless Broadband. Point-to-Multipoint (PMP) Access Network Solutions
Motorola Wireless Broadband Point-to-Multipoint (PMP) Access Network Solutions Motorola Technology is as Simple as it is Powerful Motorola Wireless Broadband Point-to-Multipoint (PMP) solutions are streamlined,
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Telecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
A Performance Study of Wireless Broadband Access (WiMAX)
A Performance Study of Wireless Broadband Access (WiMAX) Maan A. S. Al-Adwany Department of Computer & Information Engineering, College of Electronics Engineering University of Mosul Mosul, Iraq [email protected]
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Henrich C. Poehls Master s Thesis M.Sc. in Information Security Information Security Group Royal Holloway,
Cambium Networks Wireless Broadband Solutions for Service Providers
Cambium Networks Wireless Broadband Solutions for Service Providers Leading Global Provider of: Broadband Wireless solutions Ene 2015 Copyright 2013 Cambium Networks, Inc. All rights reserved. 1 Cambium
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. [email protected] Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
WiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
Packet Synchronization in Cellular Backhaul Networks By Patrick Diamond, PhD, Semtech Corporation
Packet Synchronization in Cellular Backhaul Networks By Patrick Diamond, PhD, Semtech Corporation (Semtech White Paper October 2008) INTRODUCTION For carriers to leverage cost-effective IP networks to
INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA
COMM.ENG INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA 9/6/2014 LECTURES 1 Objectives To give a background on Communication system components and channels (media) A distinction between analogue
Hot Issues in Wireless Broadband Networking
Hot Issues in Wireless Broadband Networking Raj Jain Washington University in Saint Louis Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/talks/oe06.htm
EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater
EAP9550 is a powerful and multi-functioned 11n Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly at
TeleGuard 5GHz Point To Point Broadband Radio Ethernet
The TeleGuard broadband wireless platform in the 5GHz frequency range is part of the TeleGuard family of products from SLD Security & Communications. Superior features such as non-line-of-sight (NLOS),
An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet
An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet Richa Gupta 1, Hamid Ali 2, munendra kumar das 3, Shalini Chaudhary 4 P.G. Student, Department of Electronics and
Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 [email protected] www.tunitas.
Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 [email protected] www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
SkyWay-Mobile. Broadband Wireless Solution
SkyWay-Mobile Broadband Wireless Solution Wonderful World of Wireless The era of ubiquitous communication has arrived. Region by region, country by country and continent by continent, wireless connectivity
The Basics of Wireless Local Area Networks
The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola [email protected] +46 712345678 ABSTRACT This paper is written as a brief education about the basics of
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
Comparing WiMAX and HSPA+ White Paper
Comparing WiMAX and HSPA+ White Paper Introduction HSPA+ or HSPA Evolved is the next step in the 3GPP evolution. With 3GPP Rel-7 and Rel-8, several new features are added to this 3G WCDMA technology,
Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access Kyung-ah Kim 1, Chong-Kwon Kim 2, and Tongsok Kim 1 1 Marketing & Technology Lab., KT, Seoul, Republic of Korea, {kka1,tongsok}@kt.co.kr
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: [email protected] Local Area Network LANs connect computers and peripheral
