Security Vulnerabilities and Solutions in Mobile WiMAX

被引:0
|
作者
Deininger, Andreas [1 ]
Kiyomoto, Shinsaku [1 ]
Kurihara, Jun [1 ]
Tanaka, Toshiaki [1 ]
机构
[1] KDDI R&D Labs, 2-1-15,Ohara, Saitama 3568502, Japan
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2007年 / 7卷 / 11期
关键词
IEEE 802.16e security; multi- and broadcast service; shared key vulnerability; hash chaining solution;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article shows different security vulnerabilities found in IEEE 802.16e and gives possible solutions to eliminate them. These vulnerabilities are the possibilities to forge key messages in Multi- and Broadcast operation, some unauthenticated messages which are susceptible to forgery and the unencrypted management communication which reveals important management information.
引用
收藏
页码:7 / 15
页数:9
相关论文
共 50 条
  • [41] Security Solutions in Mobile Autonomic Networks
    Aljnidi, Mohamad
    Leneutre, Jean
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2101 - 2106
  • [42] Security of current mobile IP solutions
    Jacobs, S
    Cirincione, G
    MILCOM 97 PROCEEDINGS, VOLS 1-3, 1997, : 1122 - 1128
  • [43] Security solutions for a mobile enterprise workforce
    Ronarch, JL
    See, M
    Smith, J
    ALCATEL TELECOMMUNICATIONS REVIEW, 2006, (01): : 28 - 32
  • [44] Security of current mobile IP solutions
    Jacobs, S
    ADVANCES IN DATABASE TECHNOLOGIES, 1999, 1552 : 323 - 334
  • [45] Exploring Security Solutions and Vulnerabilities for Embedded Non-Volatile Memories
    Tisha, Zakia Tamanna
    Muldavin, Jeremy
    Guin, Ujjwal
    2024 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, ISVLSI, 2024, : 361 - 366
  • [46] Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services
    Zuo, Chaoshun
    Wang, Wubing
    Wang, Rui
    Lin, Zhiqiang
    23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [47] Mobile Health Requires Mobile Security: Challenges, Solutions, and Standardization
    Pharow, Peter
    Blobel, Bernd
    EHEALTH BEYOND THE HORIZON - GET IT THERE, 2008, 136 : 697 - 702
  • [48] SECURITY SYSTEM VULNERABILITIES
    Constantinescu, Nicolae
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (02): : 175 - 179
  • [49] Android Vulnerabilities and Security
    Yadav, Saurav
    Apurva, Aviral
    Ranakoti, Pranshu
    Tomer, Shashank
    Roy, Nihar Ranjan
    2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 204 - 208
  • [50] Moodle Security Vulnerabilities
    Galan Hernandez, Juan Carlos
    Leon Chavez, Miguel Angel
    2008 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE 2008), 2008, : 199 - 204