0% found this document useful (0 votes)
113 views5 pages

Networking Research Paper

Security Aspects of WiMAX & Converged Network
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views5 pages

Networking Research Paper

Security Aspects of WiMAX & Converged Network
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

2010 Second International Conference on Communication Software and Networks

A Review of Some Security Aspects of WiMAX & Converged Network

Masood Habib Masood Ahmad


Department of Computer Science & IT Department of Computer Science
Shaheed Zulfikar Ali Bhutto Institute of Science and National University of Computer & Emerging Sciences
Technology Islamabad, Pakistan Peshawar, Pakistan
[email protected] [email protected]

AbstractThe future for WiMAX-based mobile wireless access There has been great evolution in wireless
is so bright. With the increasing popularity of WiMAX, it is communications over the last few years. WiMAX is an
gaining a great position in the next generation of wireless emerging wireless technology used for deploying broadband
networks. Due to the evolution of new technologies wireless is wireless metropolitan area network [1] (WMAN). WiMAX
not secured as like others networking technologies. On the is a wireless technology that offers many features with a lot
other side the trend is towards converged network in which the of flexibility. WiMAX has replaced many of the existing
same networking infrastructure is used for both data and voice telecommunication technologies and provides last mile
transmission. A lot of security concerns are needed to secure a connectivity with higher speed at longer distances, from 30
converged network. This paper aims to review the study of
to 50 miles and its transfer rate is up to 70 Mbps. Initial
WiMAX and converged network and security considerations
for both the technologies. WiMAX security in converged
version of the 802.16 standard was operating in 10-to-66-
network is studied. The security threats that can occur in GHz [1],[6],[7] providing line-of-sight transmissions. The
converged network to WiMAX and countermeasures that can other standard 802.16a provide non line-of-sight
be taken against these threats are reviewed. transmission and provide lower frequency band (2 to 11
GHz). These two main classes of WiMAX systems are fixed
Keywords-WiMAX; Converged Network; Security threats; WiMAX and mobile WiMAX. The latest 802.16 standard
Security mechanisms; Wireless Technologies adds support for mobility of SS. This could make
802.16/WiMax more vulnerable to these attacks against the
I. INTRODUCTION PHY layer because an attacker does not necessarily have to
reside in a fixed point [11].
Many wireless networks are based on radio waves, which Mainly the threats in WiMAX are to the Physical layer
are too easy to be attack. Security of a network plays a key and MAC layer. But the physical layer is much vulnerable to
role in the performance of a network. Security is more threats as compared to MAC layer. The physical layer (PHY)
important than ever before due to many reasons. When a handles signal connectivity, error correction, initial ranging,
network is implemented poorly, security threats and attacks registration, bandwidth requests, and connection channels for
are always there. But if that network is made fully secure by management and data. The MAC layer manages connections
implementing high level of security, there will be a fewer and security [10].
amounts of security threats. Applying security to a network In Section II the Literature is reviewed; Section III
is too much costly than its advantages. Both Network
describes the critical evaluation based on the evaluation of
operator and the network user concerned over network
the literature review, we conclude in Section IV, which will
security.
The objective of this paper is to done literature review summarize the work done in the paper followed by the future
and to provide a critical review of Converged network and its work. In last the references are given.
security considerations and also for WiMAX and its security II. LITERATURE REVIEW
consideration. The paper mainly focuses on the threats to
both the technologies and security measures for these threats. The purpose of this literature review is to study the
New ideas are taking birth on daily basis. The concept of literature of both converged network and WiMAX/802.16.
a converged network [2], [3] is one that has the capabilities The review is basically of security mechanisms for both
to transmit voice, data, video, or some combination of these technologies and the security threats to both of these
signal types or some other type of transmission signals. The technologies which are described in certain papers by
latest trends are towards converged network; in this type of different authors. This section is again divided into
networking infrastructure both data and voice subsections for review.
communication can be accommodated. Converged network A. Converged Networks Security considerations
has an open ways to the security threats and attacks, so it is a
challenge for the network professional to secure a converged The technologies related to the internet are changing with
network. The threats to the converged network are the same the passage of time, means to say that the technologies are
as they are in separate networks. Every threat has its own becoming advanced. Converged network is a networking
level of attack. infrastructure where data, voice and video communication

978-0-7695-3961-4/10 $26.00 2010 IEEE 372


DOI 10.1109/ICCSN.2010.93
can be transmitted over the same network. According to [2] Man-in-the-middle attack, the first attack is solved by
the concept of a converged network is not new. This concept Authentication and digital signatures while the lateral is
was introduced in 1980s when the Integrated Services counter-measured by Signing and verifying the data. The
Digital Network (ISDN) was in development stages. But threat to disclosure is Eavesdropping and for solving this
when the ISDN was implemented, it was not easy to be done problem Encryption technique is used. Denial of Service
as it was said to transmit voice with data on the existing attack referred to as blocking of services to the destination
telephone networks. [2] Also describes the migration of the point. DDoS is also a threats which is much dangerous than
existing network towards Convergence that there was a need simple DoS attack and also difficult to detect and
that the voice should also be sent with data packets. So it was countermeasure.
made possible, IP was the platform for this purpose. VoIP To secure a converged network a few security measures
was adopted to transfer voice and data packets on the are discussed. First is to secure the enterprise infrastructure,
internet. The converged networks provide data transfer at secondly to secure the communication applications of
high rates but having a seamless security. The packet converged networks and thirdly to make secure the services
delivery technique for the internet is Internet Protocol (IP). and maintenance access. The limitation here is that every
According to [3] IP was only designed for data transportation step has been taken to secure the Converged network but still
not voice. IP depends upon Transmission Control Protocol unable to provide security services and still are vulnerable to
(TCP) to enhance its reliability. The key challenge for threats. Some are counter-measured and some are still there
converged networks is that: How can be a connection- like; DDoS attack. Some steps to be taken against this type
oriented application transmitted over a connectionless of attack.
network? This challenge is addressed by three ways in this
paper; i) by building a network infrastructure capable of B. WiMAX & its Security Considerations
transmitting both voice and data packets, ii) Management of The previous section was about the security
the network & iii) enhancing the quality of service. This considerations of a converged network. This section is the
paper is that it is just a theoretical view about the converged review of the WiMAX and its security mechanisms and also
network; no implementation is done in this regard. threats to its security.
[4] Examines the drivers and technologies that enable [6] Has analyzed security threats to wireless networks
true convergence. Three view points are discussed for and the analysis of threats according to the level of risks to
Convergence: User services convergence, device WiMAX/802.16 has been conducted. The threats to the Mac
convergence and network convergence. In user service layer and Physical layer of WiMAX are described.
convergence different services can be provided over different According to the Authors robust wireless protocols with
networks to the same users and to different devices. While in strong encryption techniques along with using Intrusion
device convergence common devices support several access Prevention systems is effective to eliminate a lot of wireless
types. At last the network convergence refers to provide threats. The physical layer of WiMAX is vulnerable to
different user services, to several access types by keeping in threats as compared to MAC layer. The attacks on physical
mind the cost efficiency and providing quality of service. layer are jamming and scrambling. The authors tried to
Internet Protocol (IP) is being introduced in areas of describe every point open to threats, and these threats were
communication. The development in technology leads also classified according to classes. Some of these threats are
towards the increasing of bandwidth and supports the easy to be countermeasure but problems are still there
mobility which enables true converged services. Challenge because some of these attacks are difficult to
reviewed here is related to the business environment. Some countermeasure; like DDoS attack (Distributed Denial of
aspects of convergence could affect the network operators service) the detection of this attack is also difficult. The
business plans. The network operators will have a capability limitation of this paper is that the protocol defined for
of quickly adopting the new environment. Here the view of securing the wireless has certain vulnerabilities as key
converged network is described in another way. In this paper management and using weak RC4.
it is stated the cost efficiency feature and Quality of Service [7] Has also analyzed the security attacks on WiMAX.
features in network convergence but how to implement An analysis of WiMAX/802.16 architecture has been
these? conducted, that shows how the IP packets and ATM cells are
Security is an essential element of information converted into Frames. The main focus here is on the threats
technology (IT) infrastructure and applications. In [5] the analysis of the two layers; Physical layer and MAC layer in
discussion is about the security in converged networks, that detail. In physical layer the flow of bits is structured in a
how a converged network can be secured from outside sequence of frames having equal length. Author describes
threats. Attacks are growing on daily basis due to which two threats to the WiMAX; Jamming and Scrambling.
Converged network can also be attacked. A high level of Jamming attack may be unintentional or malicious and also
security is required for the converged network to make it stated that jamming is easy to detect and when detected then
secure, because in the converged network, a seamless it is easy to countermeasure. Scrambling attack is difficult to
security is provided. There has been published that when achieve and also difficult to detect. In the description of
voice applications are deployed on the converged network it MAC layer the author describes the MAC layer threats with
become vulnerable to threats like of disclosure, integrity, and respect to confidentiality and Authentication. The most
denial of services. The threats to integrity are Spoofing & threats are relating to the level of authentication.

373
MAC layer PDU is also discussed. [7] Also stated that layers are reviewed and then there security issues are
there was no protection for the integrity of data traffic of discussed. Some risks and vulnerabilities to the WiMAX are
802.16, but 802.16e introduces this sort of protection overviewed. The main flaws discussed were mutual
mechanism for data protection. Authentication of traffic authentication, unclear definitions, data privacy and key
messages has been discussed. Modification of messages is management.
possible when AES is not used, and modification of traffic The doors of WiMAX/802.16 are open to threats, which
becomes a major threat. A DDoS attack is also a major are the Traffic Encryption Key (TEK) and Authorization
problem on this point and it is also unable to handle. The Key (AK) issues. That could be exposed and can create a
author advised Intrusion Detection System for handling some problem. The issues of user authentication, the issues relating
of the threats. This paper has discussed the most recent work to mobility are pointed. The Author have not provided any
done by the IEEE and the WiMAX forum. The strength of new idea, just he has described the saying of other
this paper is that the author has used a unique methodology researchers. He has taken the views of others and has placed
for the analysis of risk regarding to the threats. The weakness these views in sequences in his paper. It is just a review,
of this paper is that three options for authentication are Issues relating to mobility are just pointed and only
discussed, device list based, X.509 certificate based or EAP suggestion is given that more research is needed in this area.
based. But all the three can be compromised by an attacker Examination in [9] is just about the security of WiMAX
or by an adversary. in a Converged Network. It is a general paper which
[8] Is a review based paper, the review has been taken describes the scenario of securing wireless communications,
from the other published materials, journals, literature and the data link layer and application layer security
mostly from websites. It is described that the IEEE 802.16 is considerations. The list of vulnerabilities is given and also
still on paper and some of its methods are under the security infrastructure for these issues is described in
development stages. The physical layer and MAC layer of detail. The security threats of WiMAX are the same as the
WiMAX has been discussed. Firstly the MAC and physical threats in Converged network.
TABLE I. SUMMARIZED TABLE OF THE REVIEW

Author Summary Problems/ Solutions Limitations


Challenges
When voice applications are
AVAYA, How a converged network can be secured deployed on the converged Authentication, digital Still unable to provide security.
February 2003 from outside threats. The focus is network it become signature, Some threats are still there like;
specifically on security considerations of a vulnerable to threats like of Signing and verifying. DDoS attack. Which is too
converged network. disclosure, integrity, and & tough to detect and
denial of services. Encryption countermeasure.
An analysis of the security attacks on the Jamming, Scrambling, Spread spectrum scheme, Three options for authentication
WiMAX and architecture has been DDoS, Strong Encryption are discussed, device list based,
conducted. Main focus is on the threats Rouge BS, techniques. X.509 certificate based or EAP
Michel Barbeau analysis of Physical and MAC layer. The X.509 digital certificate Communication keys should based. But all the three can be
2005 author advised Intrusion Detection System Compromised be secure. compromised by an attacker.
for handling some of the threats. Mutual Authentication is
needed.
The physical layer and MAC layer of Message authentication,
WiMAX has been discussed. The main Eavesdropping, Availability of Data, Just a review, Issues relating to
flaws discussed were mutual DoS attack, Anti replay, mobility are just pointed and
Jamshed Hasan authentication, data privacy and key Replay attack, Mutual authentication, only suggestion are given that
2006 management. The author has suggested Man-in-the middle attack, Authorization, more research is needed in this
that more research is needed in this area to Jamming and scrambling. DES in CBC mode for data area
make it more and more mature. privacy.
AES
Mahmoud Security threats to wireless networks and Spread spectrum scheme,
Nasreldin, Heba the analysis of threats according to the Jamming & Scrambling. Security Association, Strong The protocol defined for
Aslan, Magdy level of risks to WiMAX/802.16. Threats DDoS, Encryption techniques, securing the wireless has certain
El-Hennawy, to the Mac and Physical layer are Threats to Eavesdropping of Mutual Authentication. vulnerabilities as key
Adel El- discussed. Described every point open to management messages. Authentication protocol management and using weak
Hennawy. threats, and these threats were also Rouge BS (EAP). RC4.
2008 classified according to classes.
Introduces the improvements between the Time stamp with a signature. Authors have suggested that
Mobile and Fixed WiMAX along with the Authentication and non- authorization is done by an
Prof. Dr. Ing. elements of the WiMAX security. Replay- and DoS-Attack. repudiation. Encryption, authorization key (AK) if that
Evren Eren Authentication, Authorization and Man-in-the-Middle-Attack, Increasing the sequence key s compromised the whole
and Encryption are described. Attacks are Forgery-attack, number length, communication is
Prof. Dr. Ing. discussed and countermeasures for these Attacks against the Key Using 70 days as highest compromised. One of the main
Kai-Oliver attacks are described. In last the authors Sequence Number duration of an AK and 30 points for secure and authorize
Detken has compared the fixed and mobile minutes as the smallest communication is X.509
2008 WiMAX and the encryption of data and duration of a TEK. certificates which may also be
keys in both the technologies. Also CMAC key is used compromised.
against Replay attack

374
The author describes that if we use secure devices by the security. A few threats are there like; DDoS attack that is too
WiMAX then the communication can be secure. Application tough to detect and countermeasure.
level security is needed to secure the communication. The An analysis of the security attacks on the WiMAX and
strength of this paper is that a detail and a great security architecture has been conducted. Main focus is on the threats
infrastructure is provided, that how to secure the analysis of Physical and MAC layer. Intrusion Detection
communication. Here [9] describes the mechanism for the System is advised to be used for handling some of the
detection of DoS attack; that the (SBC) session border threats. Jamming, Scrambling, DDoS, Rouge BS creation,
controller can be used to detect the DoS attack. It is a general compromising of X.509 digital certificates are some the
paper and the limitations were not so specific in this paper. common attacks on WiMAX technology. The techniques
The security infrastructure define by the author is so much used to countermeasure these attacks/threats are spread
secure but its cost will be too high in deployment. So the cost spectrum scheme, Strong Encryption techniques.
is making a main issue here. Communication keys security and Mutual Authentication but
[10] Introduces the basic improvements between the still the threats are there. Three options for authentication are
Mobile WiMAX and Fixed WiMAX along with the elements discussed, but all the three can be compromised by an
of the WiMAX security. The security mechanisms; attacker.
Authentication, Authorization and Encryption are studied in [9] Describes threats like Client and server
detail for the Base Station (BS) and Mobile Station (MS) in impersonation, Message tampering, Session
different phases. The focus is on the two essential phases tampering/hijacking, Signaling request resulting in DoS
which have shortcomings: Authentication Phase and Key attack and has proposed the security services like Firewalls
Material Exchange Phase. In last the comparison of fixed and NAT traversal, topology hiding, DoS and flood attack
and mobile WiMAX and the encryption of data and keys in detection, Signaling and media security, theft of service
both the technologies. The strength of this paper is that the prevention, Granular access control, Session admission
methodology used by the Authors is changed from others. control, Firewalls specially designed for application-specific
They have explained every main aspect of the threats or gateways, IDS and IPS. But the problem arise here that the
countermeasure to these threats of WiMAX. The limitation security infrastructure define by the author is so much secure
of this paper is that the authors have suggested that but its cost too much in deployment the given services for
authorization of BS and MS is done by an authorization key security. So the cost and security are proportional to each
(AK) if that key is compromised the whole communication is other.
compromised. One of the main points for secure and
authorize communication discussed is X.509 certificates IV. CONCLUSION
which may also be compromised. The security threats to the converged network are merely
similar to that of WiMAX network infrastructure. WiMAX is
III. CRITICAL EVALUATION designed with a lot of security mechanisms to make it secure
In this section the evaluation of review is done form the threats, but still not so secure from threats. The
critically. Table 1 contains the tabular format of a security of WiMAX was described by keeping in mind the
summarized review of the literature. What are the challenges Data link Layer. The Physical layer is having an open access
to the converged network and WiMAX? & what are the which is easy to be attacked. Threats to the security of
solutions for these challenges. Every author has its own WiMAX were analyzed. These threats were having five
view. The limitations found in the reviewed papers are also classes: interception attack, fabrication attack, modification,
mentioned in this table. replay attack, reaction attack, interruption attack and
In previous section the review of converged repudiation attack. Security mechanisms are also provided to
network and WiMAX is described along with their security make WiMAX secure from the threats.
threats and measure. Different security threats are given and A lot of wireless attacks could be countermeasure by
then solutions for these threats are also discussed by different using wireless protocols and strong encryption techniques.
authors. A lot of solutions are given for the problems but still One of the dangerous threats is eavesdropping of
any of the networking technology is not secure from threats. management messages, which enables the attacker to capture
If we compare the threats of both the technologies important data when the network is using weak encryption
(Converged Network & WiMAX) we get that threats techniques. Other serious threat is DOS attack which is done
described by all authors having some sort of similarity with on availability, this attack could also be countermeasure but
each other. And the countermeasures for these attacks the DDOS Distributed DOS attack is not easy to
are also the same, but every researcher has its own way countermeasure.
of research and presenting of idea. The methodology Converged networks are also vulnerable to security
used by every author is not the same. threats. End-to-end secure communications can be achieved
When voice applications are deployed on the converged by keeping security in mind. The security threats to a
network it become vulnerable to threats like disclosure, converged network were studied and security mechanisms
integrity, and denial of services. So these threats can be for these threats were also discussed. In addition, three steps
solved by Authentication, digital signature, Signing and are also discussed for securing a converged that are; first to
verifying & Encryption techniques but still unable to provide secure the enterprise infrastructure, second to secure the
communication applications of converged networks and third

375
to secure the services and maintenance access. That leads
towards a secure converged network.
WiMAX security in converged network is also a main
concern. WiMAX provides a robust security, but still have
threats. By deploying WiMAX in converged network,
security should be the main agenda. There is the security of
converged network plus the security of WiMAX but some
extra security measures should also be taken to make the
new infrastructure secure. The security measure can be
software based or hardware based. By deploying secure
devices for WiMAX we can secure the communication at
application layer. But then the problem of cost occurs,
because robust security providence leads to higher cost.
FUTURE WORK
After studying different aspects of the study about the
Converged Network and WiMAX and their security
measures, we came to an end that a lot of security services
are provided to secure the communication but still not
secure. A lot of security concerns should be provided, so
future work is needed in this area to secure the
communication and countermeasure the security threats/
attacks.

REFERENCES

[1] William C. Y. Lee, Wireless and Cellular Telecommunications


Third Edition, Chapter 7.
[2] Mark A. Miller, Introduction to Converged Networking WHITE
PAPER, A technical briefing series on VoIP and converged networks
Volume 1, August 2005
[3] Lillian Goleniewski, Telecommunication Essentials 2nd Edition,
Chapter 10 Next generation networks & Convergence.
[4] White Paper by ERICSSON, Evolution towards converged services
and networks. April 2005
[5] White Paper by AVAYA, Security in Converged Networks
February 2003 www.avaya.com
[6] Mahmoud Nasreldin, Heba Aslan, Magdy El-Hennawy, Adel El-
Hennawy, WiMAX Security International Conference on
Advanced Information Networking and Applications 2008, IEEE
[7] Michel Barbeau, WiMax/802.16 Threat Analysis ACM Int.
Workshop on Quality of Service & Security in Wireless and Mobile
Networks, Q2SWinet 05, October 13, 2005.
[8] Jamshed Hasan Security Issues of IEEE 802.16 (WiMAX) School
of Computer and Information Science, Edith Cowan University,
Australia, 2006
[9] By Ramana Mylavarapu Security considerations for WiMAX-based
converged network (August 2005) www.rfdesign.com
[10] Prof. Dr. Ing. Evren Eren and Prof. Dr. Ing. Kai-Oliver Detken
WiMAX-Security Assessment of the Security Mechanisms in
IEEE 802.16d/e 2008
[11] Hyung-Joon Kim IEEE 802.16/WiMax Security Dept. of Electrical
and Computer Engineering Stevens Institute of Technology, Hoboken,
New Jersey

376

You might also like