A Systematic Investigation of Wimax and Its Standards, Development, Technology and Security
A Systematic Investigation of Wimax and Its Standards, Development, Technology and Security
A Systematic Investigation of Wimax and Its Standards, Development, Technology and Security
ABSTRACT intended to offer wireless broadband access for the long range
WiMAX is an emerging new technology that offers propagation. WiMAX is based on Wireless Metropolitan
opportunities to telecom operators for enhanced broadband Area Network (WMAN) which provides very high data
coverage and service offering. The broadband wireless throughput over long distance (20 or 30 miles) in Non-Line of
Technologies is based on IEEE 802.16. It is known as Site (NLOS) propagation [6]. This technology aims to provide
WiMAX (Worldwide Interoperability for Microwave Access). broadband wireless access as well as internet access. The
Broadband wireless access (BWA) is the hottest technology IEEE 802.16 standards have divided the WiMAX system
aims to deliver high data rate over the large distance and offer into two groups [6]. Fixed WiMAX (IEEE 802.16d-2004),
multimedia services in metropolitan areas with a simpler Mobile WiMAX (IEEE 802.16e-2005)
installation and low cost compared to the wired network.
WiMAX is nascent in the field of communication, operates in
1.1 Evolutions of WiMAX
MAC and physical layer. Nowadays, usages of the mobile In the recent years, the working group of IEEE 802.16 has
Internet have grown rapidly and required very high-speed developed some number of standards for WiMAX. The first
access to internet application. In this paper, we discuss on standard was published in 2001 and focused on the frequency
802.16 standards and its evolution with related issues. range between 10 to 66 GHz and required line-of-sight (LOS)
transmission between the sender and the receiver. This
Keywords reduces multipath distortion, thereby enhancing
communication efficiency. Theoretically, IEEE 802.16 can
Mobile WiMAX, Fixed WiMAX, IEEE 802.16, Security, provide single transmission data rates 10 to 75 Mbps on both
Mobile Station, Base Station the uplink and downlink. Service -Providers could use
1. INTRODUCTION multiple IEEE 802.16 channels for a single transmission to
provide bandwidths of up to 350 Mbps [12]. The line of sight
Today‟s broadband Internet connections are limited to wired
(LOS) transmission is fixed in nature so, cost-effective
infrastructure using digital subscriber line (DSL), T1 or cable-
deployment is not possible. Consequently, several versions
modem based connection. However, these wired
came with new features and techniques. The fixed WiMAX
infrastructures are considerably more costly and time-
(IEEE 802.16-2004), has been developed to enhance the scope
consuming to deploy than a wireless connection. Whenever,
to licensed and license-exempt bands from 2 to 10 GHz. Fixed
in undeveloped areas and developing countries, provide are
WiMAX specifies the air interface with including the Media
unwilling to install then required equipment including optical
Access Control (MAC) of wireless access for fixed operation
fibre or copper wire or etc. other for broadband services
in metropolitan area networks(MAN). Support for portable or
expecting the low profit. Broadband Wireless Access (BWA)
mobile devices is considered in IEEE 802.16e std., which is
has emerged as a promising solution for large distance access
published in 2005 (end of the year). WiMAX networks
technology to provide very high-speed connections. IEEE
consist of some Subscriber Stations and a central radio Base
802.16 standard for Broadband Wireless Access and its linked
Station. In the WiMAX network, Base station is fixed in
industry consortium, Worldwide Interoperability for
nature is connected to the public network and can handle
Microwave Access (WiMAX) Forum promise to offer high
multiple sectors simultaneously, and Subscriber station are
data rate over the large distance to a large number of
mobile. In this section, we describe the development phases of
customers, where broadband is unreachable. This is the first
IEEE 802 .16 extension from the beginning to last release. In
industry-wide standard that can be used for fixed wireless
this section we describe the development phases of IEEE 802
access (IEEE 802.16d) with substantially higher bandwidth
.16 extension from the beginning to last release [4, 7] of
than most cellular networks [13]. Development of this
WiMAX.
standard provides the low cost equipment, ensure
interoperability, and reduce investment risk for operators. Table 1: Evolution of WiMAX standards [4]
WiMAX is one of the nascent and hottest broadband wireless
technologies around today. WiMAX systems are expected to IEEE Frequency Specific
Year
deliver broadband access services to residential and enterprise Std. Band features
users in an economical way. WiMAX would operate or work The Initial
similar to Wi-Fi, [8] but at higher speeds over larger distances version of
and for a greater number of customers. WiMAX can provide WiMAX based
service even in areas that are most difficult for wired on the single
infrastructure to reach and the capability to overcome the carrier physical
802.16 2001 10-66 GHz
physical limitations of traditional wired infrastructure. The layer and the
Wireless system is considered to be a perfect and attractive burst TDM
solution to provide high data rates over large distance MAC layer. Use
communications, particularly for mobile users. The IEEE (line of sight
802.16 standards are also known as WiMAX standards, are towers) to fixed
30
International Journal of Computer Applications (0975 – 8887)
Volume 160 – No 3, February 2017
31
International Journal of Computer Applications (0975 – 8887)
Volume 160 – No 3, February 2017
Domain Name Server (DNS): DNS translates the domain frequency bands. The IEEE.802.16 standard define MAC
name into IP address. layer, which is connection oriented and uses a Time Division
Multiplexing (TDM) for the downlink (DL) and a Time
Dynamic Host Configuration Protocol (DHCP): DHCP Division Multiple Access (TDMA) schemes for the uplink
provides IP to entities in the network (including subscriber) (UL). This reflects the Point to Multipoint (PMP)
dynamically. DHCP allow IPs to be assigned automatically to architecture[6].
the computer. Following key features of fixed WiMAX are described as;
1.8 Network Service Provider (NSP) Fixed WiMAX support fixed and nomadic
Network Service Provider uses Connectivity Service Network application.
for internet connectivity, authentication, authorization, Operate in the frequency band of 2GHz to 11GHz.
management of IP addresses, and roaming among the ASNs Provide the transmission range up to 75 Mbps for the
[7]. distance approx.30 miles (50kms).
SC (single-carrier) modulation is use.
1.9 Application service provider (ASP)
It is a system-based service to customers over a network; such 1.11.1.1 Applications
as access to a particular software application using a standard Fixed WiMAX include wireless E1 enterprise backhaul and
protocol (such as HTTP). residential „last mile‟ broadband access.
32
International Journal of Computer Applications (0975 – 8887)
Volume 160 – No 3, February 2017
All this features and enhancements in mobile WiMAX make mode or adopting a complex Code Division Multiple Access
it backwards compatible with the previous version. system. After all, the application of these methods is
restrictive. Officially, neither the expansion of bandwidth nor
K. Etemad [1] define a WiMAX can be deployed as a green the enhancement of modulation order is limitless, and the
field network without any unnecessary complexity due to channels of complex Code Division Multiple Access system
legacy circuit – switched system support. It can be deploy as are not orthogonal to each other perfectly. The Multiple Input
an overlay to existing fixed and mobile access network such Multiple Output (MIMO) systems was nascent at the right
as 2.5 G /3.5G cellular system and or cable/digital subscriber moment, by using Space Time Coding technology, it realises
line (DSL) by supporting different levels of interworking to space division multiplexing using the multi-element array,
ensure service continuity. which greatly improves the frequency band efficiency within
the limited bandwidth.
The Multiple Input Multiple Output (MIMO) using multiple
antennae at the transmitting and receiving terminals
respectively. The signals are transmitted and received by
multiple antennae at the transmitting and receiving terminals,
and accordingly the quality of service (QoS) is improved for
each end user. Compared with the traditional single-element
system, MIMO technology easily improves the unitization
rate of the frequency band, which allows the system to
transmit data with higher speed under limited bandwidth. The
block diagram of MIMO system with N transmitting antennae
and M receiving antennae was shown in Figure 3.
33
International Journal of Computer Applications (0975 – 8887)
Volume 160 – No 3, February 2017
Internet Access
Undoubtedly, Internet access will still be the major request in
WiMAX networks, especially when they are initially
deployed. To support Internet access, a basic method is to
Figure 4: Sub-channel of OFDMA provide a unicast link between Subscriber station and the Base
Function of mobile WiMAX with MIMO and Station, which has the link toward.
OFDMA Quality Guaranteed Applications
In the WiMAX 802.16e system, MIMO and OFDMA both are For many applications in WiMAX network, the network layer
combined to improve the network coverage and redouble the should provide a sufficient quality of service (QoS) guarantee,
WIMAX system capacity. Accordingly, the costs of network normally regarding of bandwidth, data rate, delay, and delay
construction and maintenance are reduced greatly, which jitter. However, wireless communications are indeed error-
promotes the development of mobile WiMAX. MIMO is prone. Thus it is difficult to provide such an assurance in a
applicable for all wireless communication technologies. In the wireless network.
WiMAX802.16e system, the perfect combination of MIMO
and OFDMA embodies the technical advantages of MIMO Group Communications
better. The MIMO system has the capacity of anti-multipath Since WiMAX networks can cover a relatively large area, it is
fading, but it cannot do anything about the selective fading of usual to think that many group communications, such as
frequency. Other communication systems adopt equalisation video-conferences, will be essential in WiMAX networks.
technique to solve this problem in the MIMO system. The Multicast is the key technology to support such kind of
OFDMA of WiMAX conquers the selective fading of communication scenarios. In WiMAX network, however,
frequency successfully. The next generation of mobile since all nodes are located inside, performing such group
communication system requires technologies with higher communication becomes possible.
frequency band utilisation rate, but the ability of OFDMA to
improve the frequency band utilisation rate is limited after all. Multi-servicing Applications
Combined with the MIMO, the frequency band efficiency has In WiMAX, multi-servicing is a technology that can provide
further improved without increasing the bandwidth of the services similar to those of multipath routing. The main
system. The MIMO + OFDMA technology not only offers difference between these two techniques is that in multi
higher data transmission speed but also achieves strong servicing, one subscriber station has two or more IP addresses
reliability and stability of the system by diversity. and generally has the same number of interfaces. Thus, the
station can have multiple paths to access the same resources.
Application In brief, the last layer of OSI reference model (i.e. application
layer) requirements must be addressed in the network layer
Network Coverage Ability Because of the higher frequency design.
range, the transmission loss of WiMAX802.16e is much
higher than other mobile communication systems. Expand the Metropolitan Area Distributed Service
network coverage is a challenge to WiMAX. The advantage With the deployment of mobile WiMAX networks, more and
of MIMO technology in the WiMAX system greatly improves more value-added services can be provided in a MAN area to
the network service coverage. In the diversity mode, MIMO efficiently support a huge number of customers, distributed
enhancing the coverage radius of residential areas by diversity services can be enabled. In other words, an end user can
gain. In the multiplexing mode, it enhancing the coverage access the service from any of the servers in the network in
radius by diversity gain obtained from the increase of speed at which these servers are distributed to serve the entire
the edges of the residential area. In the adaptive switching metropolitan area.
mode, the edges of residential area work in diversity mode,
and the coverage gain is identical to that of diversity mode. 2. WIMAX FORUM
WIMAX Forum is a (not- profit organization) which has
System Capacity thousands of members, comprising most of the WiMAX
The WiMAX802.16e system provides very high data network operators, component vendors and equipment
throughput and mobility, which keeps the users on-line at any vendors. It was established in Jun. 2001 and certifies wireless
time. The users can experience the right broadband service broadband equipment based on the IEEE802.16 and support
even if they are moving. In the multiplexing mode, the MIMO ETSI Hiper-MAN (European Telecommunications Standards
technology multiplies the system throughput and frequency Institute High-Performance Metropolitan Area Networks) by
band efficiency and also multiplies the peak speed of a single awarding equipment manufacturers‟ products with the
user. In the diversity mode, the system throughput and the WiMAX Forum Certified‟ label (Worldwide Interoperability
frequency band efficiency are improved by raising the for Microwave Access). We can discuss three function areas
proportion of High-Order Modulation (HOM). In the adaptive of development within the WiMAX Forum. Show in fig. 5.
switching mode, the centre of residential area works in Air interface Specification: focus on the first and second
multiplexing mode, and the edges work in diversity mode. layer of OSI reference model are based on IEEE 802.16.
1.11.2.3 Applications Network Specification: apply to the upper layers and are not
Content-Based Distribution based on IEEE802.16 but developed within the WiMAX
This type of routeing scheme is a service-oriented forum.
communication technique. In this scheme, the sender of a
message does not need to explicitly specify its destination.
34
International Journal of Computer Applications (0975 – 8887)
Volume 160 – No 3, February 2017
Roaming Specification: deal with the roaming business 2.1.3 End users Benefits:
framework with a function for whole sale rating. Faster User mobility with the visited network: it has the
faster user mobility with the visited network because they use
Application Layer the same device when switching to or roaming on the network
WiMAX Network of another network operator.
Specification
Presentation Layer Increased end user confidence: the certified product will
certainly work with any network operator that uses certified
Session Layer products, with the same certification profile, so it increases
the confidence of end user.
Transport Layer 2.2 WiMAX Profiles
Based on the IEEE 802.16 and ETSI Hiper MAN standards,
Network Layer the WiMAX Forum developed system profiles, which define
mandatory and optional capabilities for WiMAX products.
The number of features that are mandatory and optional in the
Data Link Layer WiMAX Air standards may be tested by the WiMAX Forum Certified TM
IEEE Interface program, but does not include any new feature that is not
802.16 Specification included in the standards [7]. Within the WiMAX Forum,
Physical Layer
there is currently two system profiles: the first system profile
that are based on IEEE Std 802.16-2004 known as the Fixed
Figure 5: Relationship between IEEE802.16 and WiMAX, using the Wireless MAN-OFDM physical layer
WIMAX, on the OSI reference model specifications with 256 carriers, and Second WiMAX system
profile that are based on the IEEE Std 802.16e-2005 known as
2.1 Benefits of Certification the Mobile WiMAX, it using the Wireless MAN-OFDMA
A vendor can make a system with a different subset of the
physical layer specifications. Table 2 show some key ieee std
IEEE 802.16 standard or even with the same subset but
802.16-2009 parameters values and the Subset of values that
neglect to certify his products by the WiMAX Forum. Thus, if
are mandatory in mobile WiMAX Release 1.5, indicated in
the vendor etc. other wants to use the „WiMAX Forum
bold
Certified‟ label for its product, it requires permission of the
Forum, to prevent legal proceedings for trademark Table 2: Some key IEEE STD 802.16-2009 parameters
infringement. The WiMAX Forum only grants this permission values and the Subset of values that are mandatory in
of their logo, if the vendor‟s product is certified by the mobile WiMAX Release 1.5
WiMAX Forum [7]. Therefore, the vendors themselves are
willing to certify their products to obtain this label, without PARAMETER IEEE STD 802.16-2009 AND
any external obligation as this has many benefits for vendors, MOBILE WIMAX
network operators and end users [18]. RELEASE 1.5 VALUES
Air interface Wireless MAN-SC, Wireless
2.1.1 Vendors Benefits: MAN-OFDM,
Improvement in cost: specialisation in the specific Wireless MAN-OFDMA,
component can lead to lower-cost modules which can be Wireless HUMAN
integrated into the vendor‟s devices. Cyclic prefix 1/4, 1/8, 1/16, 1/32,1/64
Frame length [ms] 2, 2.5, 4, 5, 8, 10, 12.5, 20
Innovation faster: there is no need to focus on a complete
Convolutional code Tail biting, Zero tail
end-to-end product line, as with proprietary broadband
wireless access systems. Vendors can specialize in specific Downlink QPSK, 16-QAM, 64-QAM
components, allowing faster development cycles. modulation
Uplink modulation QPSK, 16-QAM, 64-QAM
Easier and fastest targeting of the global market: it
provides easier and fastest targeting of global market by using
certification label which has a worldwide reputation.
3. RELATED WORK
Easy and fast Troubleshooting: due to easy troubleshooting, In 2007, J. D. Kenneth al. discussed [12], To understand the
Interoperability problem detection before commercialization. working of WiMAX system and the role of various
parameters on the system performance, the simulation model
2.1.2 Network operators Benefits: of WiMAX physical layer using MatLab 7.5 version has been
Easy Support of any subscriber device: all certified end developed. Jagdish D. Keneet al. define Efforts are taken to
devices are instantly supported, as well as roaming support for understand the effect of various Modulation techniques,
end devices that originate from another network operator, Coding rates, cyclic prefix factors and FFT size on the system
with the same certification profile. performance. From the simulation results analysis conclude
that BPSK modulation consumes less signal power (4dB)
Fast Backward compatibility: certified products are
compared to higher ordered 64 QAM (20.5dB) modulations.
guaranteed to be backward compatible.
Hence system performance is optimised with adaptive
Fast and easy deployments: there is no vendor lock-in, and a modulation. For good propagation conditions, a high order
multivendor network can be deployed in a more cost efficient modulation scheme with low coding redundancy such as 64
and faster way. QAM is used to increase the transmission data rate. During
fading signal, the system selects an energy efficient
modulation scheme such as BPSK or QPSK. BPSK or QPSK
making efficient use of the bandwidth and increases overall
35
International Journal of Computer Applications (0975 – 8887)
Volume 160 – No 3, February 2017
system capacity. In addition, higher values of cyclic prefix average CRN perform better than AODV. It has a less average
factor help to improve the signal strength up to 7.9dB for end to end delay. However, for other metrics (packet delivery
QPSK ¾ modulation scheme. Apart from 256, the higher size ration and throughput), AODV demonstrate poor
of FFT can also be chosen to upgrade the performance of the performance.
system in concern with system complexity.
In 2014, P. Dattaet et al. discussed [13], A detailed analysis of
In 2008, K. Etemad al. discussed [1], this paper provides a different 4G technologies, e.g. WiMAX and LTE network is
review of mobile WiMAX technology and its evolution from presented in this paper. The author also presents a discussion
both radio and network perspectives. The technology utilises about the architecture of LTE network and various issues
advanced PHY and MAC techniques in radio to provide high faced in LTE technology. Successfully results found that LTE
spectrum efficiency and QoS control as well as IP-based flat is advantageous over WiMAX in every aspect. In LTE
network architecture supporting multivendor plug and play architecture consists of two networks- the access network, i.e.,
deployments. Mobile WiMAX has defined the technology E-UTRAN network and the core network, i.e., EPC network.
evolution roadmap for the next few years, which includes, but In which author also discussed some challenging issues for
goes beyond, further improvements in system efficiency and research in LTE networks.
user experience.
In 2014, V. j Singh et al. discussed [4],in this author
In2008, P. Taaghol, et al. discussed [17], the authors describe, concentrate on the physical layer threats (i.e. scrambling and
the wireless industry makes its way to the next generation of jamming), MAC layer threats ( i.e. user authentication and
mobile systems, in which it describe important of enabling data confidentiality) and routing layer threats ( i.e. black-hole
the seamless integration of emerging 4G access technologies attack and other miscellaneous attacks e.g. Man-in-th e-
within the currently deployed or evolved 2G/3G Middle (MITM), Denial of Service (DoS) and Bandwidth
infrastructures. In this paper the authors address a specific Spoofing). In this paper author observed that eavesdropping
case of such a seamless integration that of mobile WiMAX in of management messages jamming attack are the most
evolved 3GPP networks. In this article, they investigate the destructive attacks on WiMAX network. Successfully results
architecture and the key procedures that enable this found that like other wireless networks, WiMAX network is
integration, and they also introduce a novel handover also uncovered to many of the security flaws at both the
mechanism that enables seamless mobility between legacy protocol layers i.e. Physical Layer and MAC Layer. This
3GPP access, and mobile WiMAX such as UTRAN or survey paper categorises the security threats related to the
GERAN. The main features of this novel handover WIMAX and presents them along with the proposed solutions
mechanism are that subscriber station does not need to for the ease of new researchers.
support simultaneous transmission on both 3GPP accesses and
WiMAX; therefore, it mitigates the RF coexistence issues that 4. CHALLENGES & SECURITY OF
exist otherwise and improves handover performance. MOBILE WIMAX
In 2010, K. Etemad, et. al. discussed [16], in this paper the 4.1 Challenges
author define Introduction of WiMAX with its Basic There are various challenges of WiMAX which are defined
Network Reference Model and its component and WiMAX here:
Network Roadmap: different release (1.0, 1.5, 1.6, 2.0),
Overview of Major Features in Release 1.0, Overview of Confidentially: Confidentiality is essential to ensure that
Major Features in Release 1.5, Major Features in Network important information is well protected and not revealed to
Release 1.6, Comparison of Mobile WiMAX and 3GPP/SAE unauthorized third parties. The objective of confidentiality is
Network Architecture. required in a mobile WiMAX network environment to protect
information moving between different stations, since an
In 2011, S. Tang discussed [15], the authors describe they opponent having the appropriate equipment may eavesdrop on
propose an analytic model using WiMAX as backhaul support the communication.
for Wi-Fi traffic and evaluate the system performance. One
unique feature is that the Wi-Fi traffic completely reflects the Authentication: As in traditional systems, authentication
realistic user behaviour. The author also describes how Wi-Fi techniques verify the identity of the users in communication,
user may be overflowed to its overlaid WiMAX cell when it is thus distinguishing legitimate users from the attacker.
rejected at the Wi-Fi cell. In which the Wi-Fi user may also Integrity: By integrity, we mean that there is a risk that
work for some time duration in the Wi-Fi cell and then make a information could be modified when transferred over insecure
vertical handoff to its overlaid WiMAX cell when it needs to networks. Lack of integrity could result in various problems,
move from its current Wi-Fi cell (e.g., office) to its target Wi- because the consequences of using inaccurate or incomplete
Fi cell (e.g., airport). The target Wi-Fi cell may be located at information could be harmful. Integrity controls must be
another place in the same WiMAX cell, or at a different implemented to ensure that information will not be modified
WiMAX cell. in any unexpected manner.
In 2012, Khokhar al. discussed [14], In this paper use of Availability: Availability will be a major security issue in a
cognitive radio network composed of wireless devices able to wireless network since an attacker can launch a malicious
opportunistically access the shred radio resource. The core of attack to block a legitimate user‟s access to the network.
such networking paradigm has the capability of cognitive
radio to monitor band occupation to exploit band holes for the 4.2 Layer Architecture and Security
transition. In this extensive simulations are conducted under To understand WiMAX related security issues, we first need
MATLAB and analysis the performance of our routing to understand WiMAX architecture, its component and how
protocol with Ad-hoc On Demand Distance Vector (AODV) securities specifications are addressed in WiMAX. In this
for Mobile WiMAX environment. The proposed algorithm section we describe the layer architecture of mobile
shows high throughput, reduce end to end delay, and increase WiMAX show in fig. 4 and security &security attacks.
packet delivery ratio. Successfully results found that on an
36
International Journal of Computer Applications (0975 – 8887)
Volume 160 – No 3, February 2017
Service Specific Convergence Layer IP Packet ATM Cell PKM Control Management
MAC Layer
MAC Common Part Sub-Layer MAC Service Data Unit Traffic Data Control Message
Encryption Processing
Authentication Message
Security Sub-Layer MAC Protocol Data Unit Processing Authentication
Physical SAP
Physical Layer Physical Frame Figure 7: IEEE 802.16 MAC security sub-layer
Figure 6: IEEE 802.16 protocol architecture Security sub-layer applies three steps to support WiMAX
security [4].
MAC layer consists of three sub-layers: [4, 9]
1. Subscriber Authentication (At the time of entry in
Service Specific Convergence Sub-layer (CS) the network)
2. subscriber Authorization (if the subscriber is
Common Part Sub-layer (CPS)
provisioned by the NSP)
Security Sub-layer 3. Encryption (for the secure key exchange and data
traffic)
Service Specific Convergence Layer (CS): Service-specific
convergence layer is first sub-layer in MAC layer. Which Component protocol at security sub-layer guarantees the
maps higher level data services to MAC layer service flow authorization and confidentiality at the time of link
and connections. establishment between the authorized parties (service provider
and subscriber). Two main entities in WiMAX, including
Common Part Sub-layer (CPS): This common part sub-layer Base Station (BS) and Subscriber Station (SS), are protected
(CPS) is the base of the standards and it is tightly integrated by the following WiMAX security features:
with the security sub-layer. It also defines the rules and
mechanisms for bandwidth allocation, system access and a) Security association [4, 9]: the first security feature of
connection management. The Media Access Control (MAC) WiMAX is SA, which has its own identifier (SAID) and
protocol data units are designed in common part sublayer. also contains a cryptographic suite identifier (for selected
algorithms), initialization vectors and traffic encryption
Security Sub-layer: Security Sub-layer which lies between keys (TEKs).
the Media Access Control (MAC), Common Part Sub-layer
(CPS), and the Physical layer, addressing the authentication,
encryption, key establishment and exchange, and decryption
of data exchanged between Media Access Control (MAC),
and Physical layers.
Physical Layer: In IEEE 802.16 Protocol architecture, the
Physical layer provided a two-way mapping between Media
Access Control protocol data units and the Physical layer
frames received and transmitted through coding and
modulation of radio frequency signals. Figure 8: EAP based authentication [9]
The WiMAX network, which is based on the IEEE 802.16e b) Public key infrastructure: WiMAX uses the Privacy and
standard, In which, most of security issues are addressed and Key Management Protocol (PKM) in public key
handled in the MAC layer, and it also provides strong support infrastructure for secure key management, transfer and
for authentication, control and management of plain text exchange between mobile stations, and also authenticates
protection, key management, encryption and decryption, and a Subscriber Station to a Base Station. The PKM
security protocol optimization security sub-layer. Fig.7 show protocol uses X.509 digital certificates, a strong
all the security specification related to IEEE802.16 standard. encryption algorithm Advanced Encryption Standard
(AES) and RSA (Rivest-Shamir-Adleman) public-key
algorithm. The starting version of WiMAX uses Public
key infrastructure -version1 (PKM-Vi), in which it
provide one-way authentication method and has a risk for
Man-In-The-Middle (MITM) attack. To deal with this
type of issue, in the latest version (802.16e) mobile
WiMAX, the PKMv2 was used to provide the two-way
authentication mechanism.
c) Device/User Authentication: WiMAX supports three
types of authentication which are handled in the security
sub-layer.
37
International Journal of Computer Applications (0975 – 8887)
Volume 160 – No 3, February 2017
RSA-based authentication: This applies X.509 [5] Web Site: Http://enwikipedia.corg/wiki/ WIMAX.
certificates together with RSA encryption.
[6] D. kene , D.kulat, Jagdish , “Performance evaluation of
EAP (Extensive Authentication Protocol): The network IEEE 802.16e WIMAX physical layer”, institute of
operator can select three types of EAP. technology ,NIRMA University, AHEMDABAD
382481, 08-10 DEC.2011.
EAP-AKA (Authentication and Key Agreement)
[7] D. Pareit, B. Lannoo, J. Moerman,” The history of
EAP-TLS (Transport Layer Security) WIMAX: A complete survey in certification and
EAP-TTLS MS-CHAP v2 (Tunneled Transport standardization for IEEE 802.16 and WiMAX”. IEEE
Layer Security with Microsoft Challenge- communication surveys & tutorials, Vol 14, No. 4 fourth
Handshake Authentication PV2). quarter 2012.
The security sub-layer supports is the RSA-based [8] Web Site: https://www.tutorialspoint.com/
authentication followed by EAP authentication. WIMAX/index.html
d) Data privacy and integrity: WiMAX uses the AES [9] Web Site: http://www.cs.wustl.edu/~jain/cse571-09/ftp/
algorithm for encryption. V. Kumar, J. Walker et. al. [2, WIMAX2/index.html#Bogdanoski08
4, 9], is deeply described this section in WiMAX security [10] B. Li, Y. Qin and C. Ping Low, Choon Lim Gwee,” A
threats and solution are not describe here, to know more Survey on Mobile WIMAX”, IEEE Communications
about it paper [9][3][2][6][4] presented more detailed Magazine ,December 2007
about it.
[11] IEEE 802.16-2004, “Local and Metropolitan Networks -
5. CONCLUSION Part 16: Air Interface for Fixed Broadband Wireless
In this paper, we can do a systematic investigation of Access Systems,” 2004.
WiMAX and its standards, development, technology, and
[12] M Azizul Hasan, “Performance Analysis of
security. WiMAX techniques and its security issues. Mobile
WIMAX/IEEE 802.16 OFDM Physical Layer” , Helsinki
WiMAX is next generation technology it could facilitate new
University of Technology, Finland 2007.
deployments and developments that can offer the best
opportunities to telecom operators. The mobile WiMAX [13] P. Dattaet et al. presented [13],” Exploration and
utilize advanced PHY and MAC technique in radio to provide Comparison of Different 4G Technologies
high spectrum efficiency and QoS(quality of service) control. Implementations: A Survey”, 2014 RAECS UIET Panjab
A wireless network system makes the use of an open and University Chandigarh, 06-08 March, 2014.
insecure radio channel with different kind of security issues
(traffic confidentially, integrity) and network attack .Security [14] R. Hafeez Khokhar al. presented [12] ,”On QoS Routing
plays an important role in performance &reliability of a in Mobile WIMAX Cognitive Radio Networks” ,
network. In our future work, we focus on QoS of different International Conference on Computer and
routing protocol for WiMAX network by using a different Communication Engineering (ICCCE 2012), 3-5 July
parameter. 2012, Kuala Lumpur, Malaysia.
[15] S.Tang," Performance analysis of an integrated wireless
6. REFERENCES network using WIMAX as backhaul support for WiFi
[1] K. Etemad, Intel Corporation,” Over View of Mobile traffic", Ieee, Military Communications Conference,
WIMAX Technology and Evolution” IEEE 2011 - Milcom .
Communication Magazine Oct 2008.
[16] K..Lai, M, Etemad ,"Overview of WiMAX Network
[2] D. Johnston, J .Walker,” Over view of IEEE 802.16 Architecture and Evolution", Wiley-IEEE Press,
security & privacy”, IEEE, 2004, PP, 40-48. WIMAX Technology and Network Evolution,2010
[3] H. Yang, K. Alimgeer, “improved secure network [17] P.Taaghol,; Salkintzis, A.K.; Iyer, J.,"Seamless
authentication protocol for IEEE 802.16”,the integration of mobile WIMAX in 3GPP networks",
international conference on information and IEEE, Communications Magazine, IEEE,2008
communication technologies (ICICT‟09), IEEE, 2009.
PP-101 – 105. [18] R. Prasad and F. J. Velez,” WiMAX Networks -
Techno-Economic vision and challenges”, Springer,
[4] V. K Jatav, V.J Singh,” Mobile WiMAX network 2010, no. ISBN 978-90-481-8751-5.
security threat and solution: A survey”, 2014 5th
international conference on computer and
communication technology.
IJCATM : www.ijcaonline.org
38