WIMAX Security IssuesThreats to WIMAXSome of the WIMAX threats are: rogue base stations, DoS attacks, Man-in-the-middle attacks and network manipulation with spoofed management frames, threats in 'physical environment layer.Rogue base stationsIt is defined as an attacker, who copies a legitimate base station. It allows hackers to confuse subscribers. WiMAX uses time-division multiple access, so the rogue base station must transfer at higher power at the same time as the legitimate station transfers. The authentication protocols (EAP protocol) used in WiMAX help alleviate this threat. (The EAP protocol enforces mutual authentication, so the subscriber station would send an authentication message to the unauthorized base station. This does not completely alleviate the threat of unauthorized base stations, but it makes it more difficult.) Denial of Service Attacks (DoS) DoS attacks are defined as an attempt to make a computer resource unavailable to its users. (Hackers usually use this type of attack on bank web servers, credit card payment gateways, or DNS root servers.) A DoS attack uses the IP address to flood the user's network and hinder communication between the intended user and the victim. It has been proposed that a Shared Authentication Information (SAI) protocol can be used to provide a defense mechanism against DoS attacks, without incurring overhead to the ASN gateway and base station. Man-in-the-middle attacksThese are some forms of snooping. The hacker finds separate connections between two victims and transmits messages between them. The hacker breaks the public key of one of the victims and sends his own public key to the proposed victim. After responding, the hacker will have that public key. I...... half of the paper ......ch an attacker resends valid frames that the attacker intercepted during forwarding. MAC Layer Threats MAC Layer Connections: Management connections and data transport connections are two connections in this layer. Management connections are of three types: basic, primary and secondary. A basic connection and a primary connection are created for each member state when it joins the network. A basic connection is used for short, time-sensitive management messages. Additionally, a primary connection is used for delay-tolerant management messages. The secondary connection is used for IP summary management messages such as Dynamic Host Configuration Protocol [DHCP] and Simple Network Management Protocol [SNMP]. Transport links can be provided or recognized upon request. They are used for user traffic flows. Unicast or multicast can be used for transmission.
tags