Monday, December 1, 2008

Is Wimax Secure

WiMAX is the broadband wireless access system designed by the IEEE 802.16 committee for carrying high-speed communication over long distances. Telecommunications services and Internet has become more attractive due to WiMAX. The main purpose of WiMAX is to guard the service provider from thievery of service, and to defend the patron from unofficial information revelation. WiMAX networks vulnerable to man from bother, revealing user to a range of privacy and possible attacks

The use of 802.16e amendment provides strong support to confidential data due to AES cipher. WiMAX offer good intentions to several potential attacks such as Rogue Base Stations that that imitates a justifiable entrée point, DoS Attacks enable a computer source occupied to its intentional users, Man-in-the-Middle Attacks which formulates sovereign links with the fatalities, and Network exploitation with spoofed supervision frames. WiMAX security ropes two quality encryptions as DES3 and AES are the leading edge with DOCSIS BPI and security protocol. WiMAX use CCMP with AES for broadcast security and data veracity substantiation. The use of PKM Extensible verification relies on the TLS standard of public key encryption.

The authentication structure of WiMAX based on (IETF) force which supports user name, password, smart cads, and digital certificate containing public key and MAC address. The use of PKM which is a client server protocol performs like a client. You can secure your messages with AES, CMAS, and HMAC. WiMAX offer privacy, data integrity, authentification, authorization and access control. WiMAX security has different layers within a system with different aspects of security with redundant mechanisms for example the link layer used to prevent over-the-air eavesdropping, network layer provide various method for security, transport layer also called SSL provide security to transport layer protocols and packets, application layer deal with the digital signatures, certificates, and digital rights management etc, physical layer handled both uploading and downloading of channels.

WiMAX technology use PKM Protocol to gain approval and passage material from the BS to sustain episodic reauthorization. The X.509 digital certificates DES used to make safe key between (SS) and (BS). In physical layer subscriber station research for download signals from the base station and synchronize with it. WiMAX technology in real test by wide-scale network deployments because it is mostly in use where research work is going through and moreover attackers in abundant. The fuzzing protocol of WiMAX facilitate attackers to further influence BSs or SSs and then WiMAX security is inadequate to conjecture

By: Shafqat Zia

Article Directory: http://www.articledashboard.com

By S Zia info@freewimaxinfo.com WiMAX Technology www.freewimaxinfo.com