Security issues of WiMAX
Broadband access technology has significant influences in the telecommunication industry. Worldwide interoperability for microwave access (WiMAX) is a broadband wireless technology which brings broadband experience into a wide range of wireless networks with dramatically high data rate of informatio...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/38753 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-38753 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-387532023-07-07T15:52:31Z Security issues of WiMAX Tan, Yong Qi. Chan Choong Wah School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Wireless communication systems Broadband access technology has significant influences in the telecommunication industry. Worldwide interoperability for microwave access (WiMAX) is a broadband wireless technology which brings broadband experience into a wide range of wireless networks with dramatically high data rate of information transfer. Data security has become a major issue in most network protocols. This is due to the increasing importance of information. Due to this importance, different security mechanism were designed, and deployed. In IEEE 802.16 (WiMAX), security has been considered as the main issue during the design of the protocol. However, security mechanism of the WiMAX still remains a question. WiMAX is relatively a new technology; not deployed widely to justify the evidence of threats, risk and vulnerability in real situations. This paper will address the security mechanisms defined in WiMAX and explain the security vulnerabilities and threats mentioned in the available literature with possible solutions. It will also illustrate the basics of WiMAX security including architecture, protocols, and cryptography algorithms defined by the IEEE802.16 working group. This paper will also illustrates the basics Public Key Management (PKM) protocol, authentication, authorization, security associations, and traffic securing corresponding to version 1 and version 2 of PKM protocol. Bachelor of Engineering 2010-05-18T04:42:45Z 2010-05-18T04:42:45Z 2010 2010 Final Year Project (FYP) http://hdl.handle.net/10356/38753 en Nanyang Technological University 109 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Electrical and electronic engineering::Wireless communication systems |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering::Wireless communication systems Tan, Yong Qi. Security issues of WiMAX |
description |
Broadband access technology has significant influences in the telecommunication industry. Worldwide interoperability for microwave access (WiMAX) is a broadband wireless technology which brings broadband experience into a wide range of wireless networks with dramatically high data rate of information transfer.
Data security has become a major issue in most network protocols. This is due to the increasing importance of information. Due to this importance, different security mechanism were designed, and deployed. In IEEE 802.16 (WiMAX), security has been considered as the main issue during the design of the protocol. However, security mechanism of the WiMAX still remains a question. WiMAX is relatively a new technology; not deployed widely to justify the evidence of threats, risk and vulnerability in real situations.
This paper will address the security mechanisms defined in WiMAX and explain the security vulnerabilities and threats mentioned in the available literature with possible solutions. It will also illustrate the basics of WiMAX security including architecture, protocols, and cryptography algorithms defined by the IEEE802.16 working group. This paper will also illustrates the basics Public Key Management (PKM) protocol, authentication, authorization, security associations, and traffic securing corresponding to version 1 and version 2 of PKM protocol. |
author2 |
Chan Choong Wah |
author_facet |
Chan Choong Wah Tan, Yong Qi. |
format |
Final Year Project |
author |
Tan, Yong Qi. |
author_sort |
Tan, Yong Qi. |
title |
Security issues of WiMAX |
title_short |
Security issues of WiMAX |
title_full |
Security issues of WiMAX |
title_fullStr |
Security issues of WiMAX |
title_full_unstemmed |
Security issues of WiMAX |
title_sort |
security issues of wimax |
publishDate |
2010 |
url |
http://hdl.handle.net/10356/38753 |
_version_ |
1772829128644362240 |