2009
DOI: 10.1002/sec.127
|View full text |Cite
|
Sign up to set email alerts
|

Collaborative attacks in WiMAX networks

Abstract: In this paper, we discuss security problems, with a focus on collaborative attacks, in the Worldwide Interoperability for Microwave Access (WiMAX) scenario. The WiMAX protocol suite, which includes but is not limited to DOCSIS, DES, and AES, consists of a large number of protocols. We present briefly the WiMAX standard and its vulnerabilities. We pinpoint the problems with individual protocols in the WiMAX protocol suite, and discuss collaborative attacks on WiMAX systems. We present several typical WiMAX atta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 40 publications
0
12
0
Order By: Relevance
“…Many studies in the literature have discussed WiMAX security vulnerabilities. Some of them have presented surveys and classifications for the target authentication process of attacks, such as DoS, replay, and MITM , whereas other studies have proposed solutions to prevent such attacks. In this section, we present some of such solutions.…”
Section: Enhancements Of Wimax Authentication Processmentioning
confidence: 99%
“…Many studies in the literature have discussed WiMAX security vulnerabilities. Some of them have presented surveys and classifications for the target authentication process of attacks, such as DoS, replay, and MITM , whereas other studies have proposed solutions to prevent such attacks. In this section, we present some of such solutions.…”
Section: Enhancements Of Wimax Authentication Processmentioning
confidence: 99%
“…Bhargava et al regarded the support to Data Encryption Standard as an important vulnerability in WiMAX standards because it can be broken by the collaborative attacks [1]. Second, attacks through the IEEE 802.16j standard include blackhole attacks [16], wormhole attacks [17], denial-of-message attacks [18], Sybil attacks [19], and so on.…”
Section: Related Workmentioning
confidence: 99%
“…Second, attacks through the IEEE 802.16j standard include blackhole attacks [16], wormhole attacks [17], denial-of-message attacks [18], Sybil attacks [19], and so on. Besides, the implementation bugs and the incompatibilities are also the potential sources of vulnerabilities [1].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations