Networking Research Paper
Networking Research Paper
AbstractThe future for WiMAX-based mobile wireless access There has been great evolution in wireless
is so bright. With the increasing popularity of WiMAX, it is communications over the last few years. WiMAX is an
gaining a great position in the next generation of wireless emerging wireless technology used for deploying broadband
networks. Due to the evolution of new technologies wireless is wireless metropolitan area network [1] (WMAN). WiMAX
not secured as like others networking technologies. On the is a wireless technology that offers many features with a lot
other side the trend is towards converged network in which the of flexibility. WiMAX has replaced many of the existing
same networking infrastructure is used for both data and voice telecommunication technologies and provides last mile
transmission. A lot of security concerns are needed to secure a connectivity with higher speed at longer distances, from 30
converged network. This paper aims to review the study of
to 50 miles and its transfer rate is up to 70 Mbps. Initial
WiMAX and converged network and security considerations
for both the technologies. WiMAX security in converged
version of the 802.16 standard was operating in 10-to-66-
network is studied. The security threats that can occur in GHz [1],[6],[7] providing line-of-sight transmissions. The
converged network to WiMAX and countermeasures that can other standard 802.16a provide non line-of-sight
be taken against these threats are reviewed. transmission and provide lower frequency band (2 to 11
GHz). These two main classes of WiMAX systems are fixed
Keywords-WiMAX; Converged Network; Security threats; WiMAX and mobile WiMAX. The latest 802.16 standard
Security mechanisms; Wireless Technologies adds support for mobility of SS. This could make
802.16/WiMax more vulnerable to these attacks against the
I. INTRODUCTION PHY layer because an attacker does not necessarily have to
reside in a fixed point [11].
Many wireless networks are based on radio waves, which Mainly the threats in WiMAX are to the Physical layer
are too easy to be attack. Security of a network plays a key and MAC layer. But the physical layer is much vulnerable to
role in the performance of a network. Security is more threats as compared to MAC layer. The physical layer (PHY)
important than ever before due to many reasons. When a handles signal connectivity, error correction, initial ranging,
network is implemented poorly, security threats and attacks registration, bandwidth requests, and connection channels for
are always there. But if that network is made fully secure by management and data. The MAC layer manages connections
implementing high level of security, there will be a fewer and security [10].
amounts of security threats. Applying security to a network In Section II the Literature is reviewed; Section III
is too much costly than its advantages. Both Network
describes the critical evaluation based on the evaluation of
operator and the network user concerned over network
the literature review, we conclude in Section IV, which will
security.
The objective of this paper is to done literature review summarize the work done in the paper followed by the future
and to provide a critical review of Converged network and its work. In last the references are given.
security considerations and also for WiMAX and its security II. LITERATURE REVIEW
consideration. The paper mainly focuses on the threats to
both the technologies and security measures for these threats. The purpose of this literature review is to study the
New ideas are taking birth on daily basis. The concept of literature of both converged network and WiMAX/802.16.
a converged network [2], [3] is one that has the capabilities The review is basically of security mechanisms for both
to transmit voice, data, video, or some combination of these technologies and the security threats to both of these
signal types or some other type of transmission signals. The technologies which are described in certain papers by
latest trends are towards converged network; in this type of different authors. This section is again divided into
networking infrastructure both data and voice subsections for review.
communication can be accommodated. Converged network A. Converged Networks Security considerations
has an open ways to the security threats and attacks, so it is a
challenge for the network professional to secure a converged The technologies related to the internet are changing with
network. The threats to the converged network are the same the passage of time, means to say that the technologies are
as they are in separate networks. Every threat has its own becoming advanced. Converged network is a networking
level of attack. infrastructure where data, voice and video communication
373
MAC layer PDU is also discussed. [7] Also stated that layers are reviewed and then there security issues are
there was no protection for the integrity of data traffic of discussed. Some risks and vulnerabilities to the WiMAX are
802.16, but 802.16e introduces this sort of protection overviewed. The main flaws discussed were mutual
mechanism for data protection. Authentication of traffic authentication, unclear definitions, data privacy and key
messages has been discussed. Modification of messages is management.
possible when AES is not used, and modification of traffic The doors of WiMAX/802.16 are open to threats, which
becomes a major threat. A DDoS attack is also a major are the Traffic Encryption Key (TEK) and Authorization
problem on this point and it is also unable to handle. The Key (AK) issues. That could be exposed and can create a
author advised Intrusion Detection System for handling some problem. The issues of user authentication, the issues relating
of the threats. This paper has discussed the most recent work to mobility are pointed. The Author have not provided any
done by the IEEE and the WiMAX forum. The strength of new idea, just he has described the saying of other
this paper is that the author has used a unique methodology researchers. He has taken the views of others and has placed
for the analysis of risk regarding to the threats. The weakness these views in sequences in his paper. It is just a review,
of this paper is that three options for authentication are Issues relating to mobility are just pointed and only
discussed, device list based, X.509 certificate based or EAP suggestion is given that more research is needed in this area.
based. But all the three can be compromised by an attacker Examination in [9] is just about the security of WiMAX
or by an adversary. in a Converged Network. It is a general paper which
[8] Is a review based paper, the review has been taken describes the scenario of securing wireless communications,
from the other published materials, journals, literature and the data link layer and application layer security
mostly from websites. It is described that the IEEE 802.16 is considerations. The list of vulnerabilities is given and also
still on paper and some of its methods are under the security infrastructure for these issues is described in
development stages. The physical layer and MAC layer of detail. The security threats of WiMAX are the same as the
WiMAX has been discussed. Firstly the MAC and physical threats in Converged network.
TABLE I. SUMMARIZED TABLE OF THE REVIEW
374
The author describes that if we use secure devices by the security. A few threats are there like; DDoS attack that is too
WiMAX then the communication can be secure. Application tough to detect and countermeasure.
level security is needed to secure the communication. The An analysis of the security attacks on the WiMAX and
strength of this paper is that a detail and a great security architecture has been conducted. Main focus is on the threats
infrastructure is provided, that how to secure the analysis of Physical and MAC layer. Intrusion Detection
communication. Here [9] describes the mechanism for the System is advised to be used for handling some of the
detection of DoS attack; that the (SBC) session border threats. Jamming, Scrambling, DDoS, Rouge BS creation,
controller can be used to detect the DoS attack. It is a general compromising of X.509 digital certificates are some the
paper and the limitations were not so specific in this paper. common attacks on WiMAX technology. The techniques
The security infrastructure define by the author is so much used to countermeasure these attacks/threats are spread
secure but its cost will be too high in deployment. So the cost spectrum scheme, Strong Encryption techniques.
is making a main issue here. Communication keys security and Mutual Authentication but
[10] Introduces the basic improvements between the still the threats are there. Three options for authentication are
Mobile WiMAX and Fixed WiMAX along with the elements discussed, but all the three can be compromised by an
of the WiMAX security. The security mechanisms; attacker.
Authentication, Authorization and Encryption are studied in [9] Describes threats like Client and server
detail for the Base Station (BS) and Mobile Station (MS) in impersonation, Message tampering, Session
different phases. The focus is on the two essential phases tampering/hijacking, Signaling request resulting in DoS
which have shortcomings: Authentication Phase and Key attack and has proposed the security services like Firewalls
Material Exchange Phase. In last the comparison of fixed and NAT traversal, topology hiding, DoS and flood attack
and mobile WiMAX and the encryption of data and keys in detection, Signaling and media security, theft of service
both the technologies. The strength of this paper is that the prevention, Granular access control, Session admission
methodology used by the Authors is changed from others. control, Firewalls specially designed for application-specific
They have explained every main aspect of the threats or gateways, IDS and IPS. But the problem arise here that the
countermeasure to these threats of WiMAX. The limitation security infrastructure define by the author is so much secure
of this paper is that the authors have suggested that but its cost too much in deployment the given services for
authorization of BS and MS is done by an authorization key security. So the cost and security are proportional to each
(AK) if that key is compromised the whole communication is other.
compromised. One of the main points for secure and
authorize communication discussed is X.509 certificates IV. CONCLUSION
which may also be compromised. The security threats to the converged network are merely
similar to that of WiMAX network infrastructure. WiMAX is
III. CRITICAL EVALUATION designed with a lot of security mechanisms to make it secure
In this section the evaluation of review is done form the threats, but still not so secure from threats. The
critically. Table 1 contains the tabular format of a security of WiMAX was described by keeping in mind the
summarized review of the literature. What are the challenges Data link Layer. The Physical layer is having an open access
to the converged network and WiMAX? & what are the which is easy to be attacked. Threats to the security of
solutions for these challenges. Every author has its own WiMAX were analyzed. These threats were having five
view. The limitations found in the reviewed papers are also classes: interception attack, fabrication attack, modification,
mentioned in this table. replay attack, reaction attack, interruption attack and
In previous section the review of converged repudiation attack. Security mechanisms are also provided to
network and WiMAX is described along with their security make WiMAX secure from the threats.
threats and measure. Different security threats are given and A lot of wireless attacks could be countermeasure by
then solutions for these threats are also discussed by different using wireless protocols and strong encryption techniques.
authors. A lot of solutions are given for the problems but still One of the dangerous threats is eavesdropping of
any of the networking technology is not secure from threats. management messages, which enables the attacker to capture
If we compare the threats of both the technologies important data when the network is using weak encryption
(Converged Network & WiMAX) we get that threats techniques. Other serious threat is DOS attack which is done
described by all authors having some sort of similarity with on availability, this attack could also be countermeasure but
each other. And the countermeasures for these attacks the DDOS Distributed DOS attack is not easy to
are also the same, but every researcher has its own way countermeasure.
of research and presenting of idea. The methodology Converged networks are also vulnerable to security
used by every author is not the same. threats. End-to-end secure communications can be achieved
When voice applications are deployed on the converged by keeping security in mind. The security threats to a
network it become vulnerable to threats like disclosure, converged network were studied and security mechanisms
integrity, and denial of services. So these threats can be for these threats were also discussed. In addition, three steps
solved by Authentication, digital signature, Signing and are also discussed for securing a converged that are; first to
verifying & Encryption techniques but still unable to provide secure the enterprise infrastructure, second to secure the
communication applications of converged networks and third
375
to secure the services and maintenance access. That leads
towards a secure converged network.
WiMAX security in converged network is also a main
concern. WiMAX provides a robust security, but still have
threats. By deploying WiMAX in converged network,
security should be the main agenda. There is the security of
converged network plus the security of WiMAX but some
extra security measures should also be taken to make the
new infrastructure secure. The security measure can be
software based or hardware based. By deploying secure
devices for WiMAX we can secure the communication at
application layer. But then the problem of cost occurs,
because robust security providence leads to higher cost.
FUTURE WORK
After studying different aspects of the study about the
Converged Network and WiMAX and their security
measures, we came to an end that a lot of security services
are provided to secure the communication but still not
secure. A lot of security concerns should be provided, so
future work is needed in this area to secure the
communication and countermeasure the security threats/
attacks.
REFERENCES
376