Hausarbeiten logo
Shop
Shop
Tutorials
De En
Shop
Tutorials
  • How to find your topic
  • How to research effectively
  • How to structure an academic paper
  • How to cite correctly
  • How to format in Word
Trends
FAQ
Zur Shop-Startseite › Informatik - IT-Security

Preformace study of WiMAX Network Security

Security Network

Titel: Preformace study of WiMAX Network Security

Forschungsarbeit , 2011 , 19 Seiten

Autor:in: Ali Raheem (Autor:in)

Informatik - IT-Security

Leseprobe & Details   Blick ins Buch
Zusammenfassung Leseprobe Details

Undeniably, networks have become very important techniques of exchanging information (data) in fast ways. (WIMAX) World Interoperability for Microwave Access is one of the greatest technologies in the communication area. WIMAX has been used widely in telecommunication for long distance communication. From this point, this paper will explore four important sections related to this technique. Firstly, it will discuss the performance conduct of the WIMAX as compared to that of Wi-Fi. Secondly, it will critically evaluate the current solutions for the security problems in WIMAX network. Thirdly, it will attempt to design a new method to improve the security performance of WIMAX network. Fourthly, it will provide a security system that can be applied in real life applications to support the security performance of WIMAX network.

Leseprobe


Table of Contents

1. INTRODUCTION:

2. WIMAX VS WI-FI

3. EVAALUATION WIMAX SECURITY:

4. WIMAX SOLTTION SECURITY AND IMROVEMENT:

5. CONCLUSION:

Objectives & Topics

The primary objective of this paper is to conduct a performance and security analysis of WiMAX technology, specifically addressing vulnerabilities in current standards and proposing a robust improvement for secure network access.

  • Performance comparison between WiMAX and Wi-Fi technologies.
  • Critical evaluation of security mechanisms in the IEEE 802.16 standard.
  • Analysis of Man-in-the-Middle and Denial of Service (DoS) attacks.
  • Development of the SINEP (Secure Initial Network Entry Protocol) technique.
  • Enhancement of authentication and key exchange using Diffie-Hellman protocols.

Excerpt from the Book

3. EVAALUATION WIMAX SECURITY:

In this part, WiMAX security will be discussed to have a clear overview of WiMAX network. WiMAX uses encryption which is a mechanism that provides secured data called data confidentiality and integrity. Furthermore, WiMAX uses the encryption which means taking the plaintext and mixing the data (information) by applying a complex mathematical algorithm to produce cipher text. The cipher text is transmitted over the wireless network and cannot be understood by the hacker who wants to steal the information. Figure 6 shows WiMAX Advanced Encryption Standard (AES) which is used to create cipher text .The latter can protect the information from any attack that could happen at any moment. Furthermore, AES takes encryption key and uses a counter one as an input to produce and create a bit stream. Finally, the bit stream will be XOR with the plaintext to create the Cipher text as Figure 6 shows. When the receiver receives the data (information), it will reverse this process to recover the plaintext. However, to activate this process, the transmitter and receiver should use the same encryption key. [10]

Summary of Chapters

1. INTRODUCTION: This chapter introduces WiMAX as a next-generation wireless technology based on the IEEE 802.16 standard and highlights its role in providing high-speed mobile access.

2. WIMAX VS WI-FI: This section compares WiMAX and Wi-Fi, contrasting their technical specifications, coverage areas, and operational advantages and disadvantages.

3. EVAALUATION WIMAX SECURITY: This chapter analyzes current security mechanisms in WiMAX, specifically focusing on AES encryption and vulnerabilities such as Man-in-the-Middle and DoS attacks.

4. WIMAX SOLTTION SECURITY AND IMROVEMENT: This chapter proposes the SINEP technique, an enhancement of the Diffie-Hellman key exchange, to secure initial network entry against identified threats.

5. CONCLUSION: This chapter summarizes the findings regarding security weaknesses in WiMAX and confirms that the proposed SINEP protocol successfully enhances network performance and security.

Keywords

WiMAX, IEEE 802.16, Network Security, Data Confidentiality, AES, Encryption, SINEP, Diffie-Hellman, Authentication, Man-in-the-Middle Attack, DoS, Wireless Networks, PKMv2, Network Protocols, Security Improvement

Frequently Asked Questions

What is the core focus of this research paper?

The paper focuses on evaluating the security performance of WiMAX networks and identifying vulnerabilities that expose subscribers to various cyber threats.

What are the primary thematic areas covered?

Key topics include WiMAX architecture, performance comparisons with Wi-Fi, existing encryption mechanisms (AES), and common attack vectors like DoS and Man-in-the-Middle.

What is the ultimate goal of the research?

The goal is to design a more secure communication method, specifically the SINEP protocol, to prevent unauthorized message interception during network initialization.

Which scientific methodology is employed?

The author performs a literature-based comparative analysis of current standards followed by a theoretical design and proposal of an enhanced security protocol.

What does the main body of the paper address?

The main body examines technical specifications, evaluates security protocols, models specific attack scenarios, and details the logic behind the proposed SINEP improvement.

Which keywords characterize this study?

Core keywords include WiMAX, Network Security, SINEP, Encryption, Diffie-Hellman, and Wireless Communication.

How does the SINEP technique improve WiMAX security?

SINEP improves security by integrating an enhanced Diffie-Hellman key exchange that adds identity authentication, ensuring that the base station and subscriber station are mutually validated.

What specific problem occurs during the initial WiMAX network entry?

The standard process allows for unencrypted management frames, which hackers exploit to launch DoS attacks or impersonate stations via Man-in-the-Middle techniques.

Is the proposed SINEP protocol compatible with existing hardware?

The paper suggests SINEP as a protocol enhancement developed via software-level modification of the existing key exchange mechanisms to ensure better resilience against attacks.

Why is AES alone insufficient for WiMAX security?

While AES secures transmitted data, it does not encrypt all management frames during the initial entry, leaving the connection negotiation process vulnerable to exploitation.

Ende der Leseprobe aus 19 Seiten  - nach oben

Details

Titel
Preformace study of WiMAX Network Security
Untertitel
Security Network
Hochschule
( Middlesex University in London )
Veranstaltung
Telecommunication Engineering
Autor
Ali Raheem (Autor:in)
Erscheinungsjahr
2011
Seiten
19
Katalognummer
V200705
ISBN (eBook)
9783656281931
ISBN (Buch)
9783656283263
Sprache
Englisch
Schlagworte
WiMAX Wi-Fi Security Encryption
Produktsicherheit
GRIN Publishing GmbH
Arbeit zitieren
Ali Raheem (Autor:in), 2011, Preformace study of WiMAX Network Security, München, GRIN Verlag, https://www.hausarbeiten.de/document/200705
Blick ins Buch
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
  • Wenn Sie diese Meldung sehen, konnt das Bild nicht geladen und dargestellt werden.
Leseprobe aus  19  Seiten
Hausarbeiten logo
  • Facebook
  • Instagram
  • TikTok
  • Shop
  • Tutorials
  • FAQ
  • Zahlung & Versand
  • Über uns
  • Contact
  • Datenschutz
  • AGB
  • Impressum