Security Vulnerabilities and Solutions in Mobile WiMAX

被引:0
|
作者
Deininger, Andreas [1 ]
Kiyomoto, Shinsaku [1 ]
Kurihara, Jun [1 ]
Tanaka, Toshiaki [1 ]
机构
[1] KDDI R&D Labs, 2-1-15,Ohara, Saitama 3568502, Japan
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2007年 / 7卷 / 11期
关键词
IEEE 802.16e security; multi- and broadcast service; shared key vulnerability; hash chaining solution;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article shows different security vulnerabilities found in IEEE 802.16e and gives possible solutions to eliminate them. These vulnerabilities are the possibilities to forge key messages in Multi- and Broadcast operation, some unauthenticated messages which are susceptible to forgery and the unencrypted management communication which reveals important management information.
引用
收藏
页码:7 / 15
页数:9
相关论文
共 50 条
  • [21] Investigating the Security of OpenPLC: Vulnerabilities, Attacks, and Mitigation Solutions
    Alsabbagh, Wael
    Kim, Chaerin
    Langendoerfer, Peter
    IEEE ACCESS, 2024, 12 : 11561 - 11583
  • [22] Hardware Security in Emerging Technologies: Vulnerabilities, Attacks, and Solutions
    Karimi, Naghmeh
    Basu, Kanad
    Chang, Chip-Hong
    Fung, Jason M.
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2021, 11 (02) : 223 - 227
  • [23] A SURVEY OF SECURITY IN ROBOTIC SYSTEMS: VULNERABILITIES, ATTACKS, AND SOLUTIONS
    Archibald, Christopher
    Schwalm, Luke
    Ball, John E.
    INTERNATIONAL JOURNAL OF ROBOTICS & AUTOMATION, 2017, 32 (02): : 151 - 157
  • [24] Security Issues in Mobile WiMAX (IEEE 802.16e)
    Frank, A. Ibikunle
    MWS: 2009 IEEE MOBILE WIMAX SYMPOSIUM, 2009, : 117 - 122
  • [25] Hybrid Firmware Analysis for Known Mobile and IoT Security Vulnerabilities
    Sun, Pengfei
    Garcia, Luis
    Salles-Loustau, Gabriel
    Zonouz, Saman
    2020 50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2020), 2020, : 373 - 384
  • [26] On the security vulnerabilities of the virtual force approach to mobile sensor deployment
    Bartolini, N.
    Bongiovanni, G.
    La Porta, T.
    Silvestri, S.
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2418 - 2426
  • [27] Cyber Physical Sensors System Security: Threats, Vulnerabilities, and Solutions
    Essa, Areej
    Al-Shoura, Tariq
    Al Nabulsi, Ahmad
    Al-Ali, A. R.
    Aloul, Fadi
    2018 2ND INTERNATIONAL CONFERENCE ON SMART GRID AND SMART CITIES (ICSGSC 2018), 2018, : 62 - 67
  • [28] Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison
    Tank D.
    Aggarwal A.
    Chaubey N.
    International Journal of Information Technology, 2022, 14 (2) : 847 - 862
  • [29] A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions
    Aslan, Omer
    Aktug, Semih Serkant
    Ozkan-Okay, Merve
    Yilmaz, Abdullah Asim
    Akin, Erdal
    ELECTRONICS, 2023, 12 (06)
  • [30] Scalable Static Analysis to Detect Security Vulnerabilities: Challenges and Solutions
    Gauthier, Francois
    Keynes, Nathan
    Allen, Nicholas
    Corney, Diane
    Krishnan, Padmanabhan
    2018 IEEE CYBERSECURITY DEVELOPMENT CONFERENCE (SECDEV 2018), 2018, : 134 - 134