Guide to Security for WiMAX Technologies (Draft)

This document discusses security in WiMAX technology and the technical details. … recommendations for constructing measures to improve security WiMAX. ….

More PDF Content

Guide to Security for WiMAX Technologies (Draft)
Executive Summary…ES-1
1. Introduction…1-1
1.1 Authority…1-1
1.2 Purpose and Scope…1-1
1.3 Audience…1-1
1.4 Document Structure…1-2
2. Overview of WiMAX Technology…2-1
2.1 Fundamental WiMAX Concepts…2-1
2.2 Operating Topologies…2-2
2.2.1 Point-to-Point (P2P)…2-2
2.2.2 Point-to-Multipoint (PMP)…2-3
2.2.3 Multi-Hop Relay…2-3
2.2.4 Mobile…2-4
2.3 Evolution of the IEEE 802.16 Standard…2-5
3. WiMAX Security Features…3-1
3.1 Security Associations…3-2
3.2 Authentication and Authorization…3-3
3.2.1 IEEE 802.16-2004 Authentication and Authorization…3-4
3.2.2 IEEE 802.16e-2005 and 802.16-2009 Authentication and Authorization…3-5
3.3 Encryption Key Establishment…3-8
3.4 Data Confidentiality…3-10
3.5 IEEE 802.16j-2009 Multi-Hop Relay Security Architecture…3-11
4. WiMAX Vulnerabilities, Threats, and Countermeasures…4-1
4.1 Vulnerabilities…4-1
4.2 Threats…4-2
4.3 Countermeasures…4-3
4.3.1 Management Countermeasures…4-3
4.3.2 Operational Countermeasures…4-5
4.3.3 Technical Countermeasures…4-6
4.4 Vulnerabilities, Threats, and Countermeasures Summary Table…4-9
Figures

  • Figure 2-1. P2P Topology…2-2
  • Figure 2-2. PMP Topology…2-3
  • Figure 2-3. Multi-Hop Topology…2-4
  • Figure 2-4. Mobile Topology…2-5
  • Figure 3-1. WiMAX Security Framework…3-2
  • Figure 3-2. PKMv1 Authorization…3-5
  • Figure 3-3. PKMv2 RSA Device Mutual Authorization…3-6
  • Figure 3-4. PKMv2 RSA-Only AK Derivation…3-7
  • Figure 3-5. EAP after RSA Device Mutual Authorization…3-8
  • Figure 3-6. TEK Three-Way Handshake…3-9
  • Figure 3-7. Multi-Hop Distributed Security Architecture…3-12
  • Figure 4-1. Encryption Overlay Solution…4-7

Tables

  • Table 2-1. Additional IEEE 802.16 Standards and Amendments…2-6
  • Table 4-1. Vulnerabilities, Threats, and Countermeasures Summary…4-10

 

Download Guide to Security for WiMAX Technologies (Draft) pdf from csrc.nist.gov, 46 pages, 1995.28KB.
Related Books

Leave a Reply