“…Such an attack would also enable the rogue BS to impersonate name servers, allowing it to redirect user requests to computers with malware without easy detection. [6]. IEEE 802.16 multicast and initial network entry management messages do not add this digest.…”
Section: A Need Of Bs To Ss/ms Authenticationmentioning
Abstract:WiMAX is a recent technology in wireless communication that is based on IEEE 802.16 standard.It is a Wireless Metropolitan Area Network. The WiMAX trademark was coined by WiMAX Forum.This Forum defines the precise content and scope of WiMAX technology through technical specification. WiMAX provides many advantages over previous technologies like high data rates, scalability, quality of service and security. WiMAX provides many security techniques but still it is vulnerable to various threats.This paper exposes those threats and their countermeasures.
“…Such an attack would also enable the rogue BS to impersonate name servers, allowing it to redirect user requests to computers with malware without easy detection. [6]. IEEE 802.16 multicast and initial network entry management messages do not add this digest.…”
Section: A Need Of Bs To Ss/ms Authenticationmentioning
Abstract:WiMAX is a recent technology in wireless communication that is based on IEEE 802.16 standard.It is a Wireless Metropolitan Area Network. The WiMAX trademark was coined by WiMAX Forum.This Forum defines the precise content and scope of WiMAX technology through technical specification. WiMAX provides many advantages over previous technologies like high data rates, scalability, quality of service and security. WiMAX provides many security techniques but still it is vulnerable to various threats.This paper exposes those threats and their countermeasures.
“…In the admission control process, the reception of this message at Base Station initiates the cyclic authentication procedure. In Water-Torture attack, these triggering messages are captured and are transmitted in a loop to cause trigger flooding thus, employing one-way authentication [13]. Time Stamping model and the PKM v1 model are vulnerable to this type of infringement attempt.…”
Section: Water-torture Attackmentioning
confidence: 99%
“…DoS attacks such as unprotected network entry, unprotected management frame, unencrypted management communication, weak key sharing mechanism in multicast and broadcast operations and Reset-Command message [13]. Some DoS attacks are include the following:…”
Section: Denial Of Service Attackmentioning
confidence: 99%
“…The Auth-invalid is sent from a B.S to a M.S when AK shared between BS and M.S expires or B.S is unable to verify the HMAC/CMAC properly [13]. This message is not protected by HMAC and it has PKM identifier equal to zero and it can be used as DoS tool to invalidate legitimate SS.…”
Section: Dos Attacks Based On Authorization-invalid (Auth-invalid) Mementioning
confidence: 99%
“…This message is protected by HMAC but is still potential to be used to perform a DoS attacks. In order to prevent DoS attacks, first need to fix the vulnerabilities in the initial network entry & secure authentication technique [13].…”
Section: Dos Attacks Based On Reset Command (Res-cmd) Messagementioning
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.