29-08-2017, 09:25 AM
The initial network entry procedure is the first step in establishing a connection on an IEEE 802.16 (WiMAX) network. The process involves the transmission of unencrypted management messages, which constitutes a major security breach. The Man-InThe-Middle (MITM) attack exploits this weakness in the network by listening, intercepting and fabricating management messages, resulting in a breach of network-wide reliability. In this paper we analyze a modification of the proposed Diffie-Hellman key exchange protocol to mitigate the man-on-a-WiMAX attack by modeling the protocol in Promela. Verification is then performed by using the Spin model tester with the simultaneous interaction of an intrusive process to test or refute the validity of the protocol.
Global interoperability for microwave access (WiMAX-802.16) is an emerging standard that provides wireless broadband access with high bandwidths and transmission speeds. However, like all other wireless networks, WiMAX is vulnerable to network attacks that compromise the radio links between the communicating subscriber station (SS) and the service base station. With the integration of mobility in the Mobile WiMAX 802.16e 2005, complexities are introduced to ensure secure access to this network. Mobile WiMAX uses the privacy protocol and key management version 2 (PKMv2) that supports robust mutual authentication mechanisms, Advanced Encryption Standard (AES) and message confidentiality using Hashbased Message Authentication Code (HM) or Cipher based MAC (CMAC).
Global interoperability for microwave access (WiMAX-802.16) is an emerging standard that provides wireless broadband access with high bandwidths and transmission speeds. However, like all other wireless networks, WiMAX is vulnerable to network attacks that compromise the radio links between the communicating subscriber station (SS) and the service base station. With the integration of mobility in the Mobile WiMAX 802.16e 2005, complexities are introduced to ensure secure access to this network. Mobile WiMAX uses the privacy protocol and key management version 2 (PKMv2) that supports robust mutual authentication mechanisms, Advanced Encryption Standard (AES) and message confidentiality using Hashbased Message Authentication Code (HM) or Cipher based MAC (CMAC).