Introduction to WIMAX broadband Technology

advertisement
Authentication model for security aspect in Wimax
Broadband technology
Abstract
In this proposal, I work on Wimax Broadband technology and its security aspect. In this
authentication model and tracking mechanism is considered for rightful use of this communication. I
will be discussing about some of basic architecture used in building wimax Broadband technology. I
also take further review of various authentication procedures done by various authors and put forward
some of methodologies and techniques by developing a model using MATLAB SIMULINK. In the
proposal I try to make up simulink model for tracking and monitoring of IP from external hackers.
Introduction to WIMAX broadband Technology
Wimax stands for Worldwide Interoperability for Microwave Access. Wimax technology
Enables ubiquitous delivery of wireless broadband service for fixed and/or mobile users, and became
a reality in 2006 when Korea Telecom started the deployment of a 2.3 GHz version of mobile
WiMAX service called WiBRO in the Seoul metropolitan area to offer high performance for data and
video. In a recent market forecast published in April 2008, WiMAX Forum Subscriber and User
Forecast (Cotanis, 2000)
Study, the WiMAX Forum projects a rather aggressive forecast of more than 133 million WiMAX
users globally by 2012 (WiMAX Forum, 2008c). The WiMAX Forum also claims that there are more
Than 250 trials and deployments worldwide. Its air interface specifications consist of four related
IEEE 802.16 Broadband Wireless Access Standards, that is, IEEE Standard 802.16-2004, IEEE
Standard 802.16-2004/Cor.1-2005, IEEE Standard 802.16e- 2005 and the IEEE Draft Standard
P802.16-2004/Cor.2. Not all of the optional features defined in these IEEE Standards are
implemented in WiMAX products and tested for certifications. Through extensive technical
investigation analysis to build up the best competitive products, the WiMAX Forum Technical
Working Group (TWG) published the first version of mobile WiMAX System Profile Release 1 In
early 2006 (WiMAX Forum, 2007). 1
Recognizing the importance of security, the 802.16 working groups designed several mechanisms to
Protect service provider from theft of service, and to protect customer from unauthorized information
disclosure. The standard includes state-of-the-art methods for ensuring user data privacy, and
preventing unauthorized access, with additional protocol optimization for mobility. A privacy sub
layer within the Wi.MAX MAC handles security. WiMAX provides a flexible means for
1
White paper. (2007). “A comparative Analysis of Mobile WiMAX. WiMAX Forum .
authenticating subscriber stations and users to prevent unauthorized use. The authentication
framework is based on the Internet Engineering Task Force (IETF) EAP, which supports a variety of
credentials, such as username/password, digital certificates, and smart cards. WiMAX terminal
devices come with built-in X.509 digital certificates that contain their public key and MAC address.
WiMAX operators can use the certificates for device authentication and use a username/password or
smart card authentication on top of it for user authentication
Aim
The main aim of this proposal is to implement authentication process module, and tracking and
monitoring of IP protocol details through Matlab Simulink Model.
Objectives:
The main objective include for taking up this proposal is given below
1) To discuss complete architecture of Wimax Broadband Technology
2) Discussing some persistent security loopholes in Wimax Internet Communication.
3) Using MATLAB SIMULINK model to showcase how security control can be enabled for this
loopholes
4) Developing an ip tracking tool for checking misuse of account holder’s privacy and other
benefits.
4. Literature Review
Broadband is a generic term used to describe high-speed networking services, that is a set of digital
communication technologies with the capacity to transmit significant amounts of data at a high rate,
Supporting the delivery of a range of digital services some or all of which can occur simultaneously.
It is usually a symmetrical service allowing fast in and outbound data capacity. Whilst there is still no
universally accepted definition of the term ‘broadband’, it is generally agreed that it applies to
services considerably faster than Integrated Services Digital Network (ISDN) or conventional dial-up
lines (Becta, 2003; OECD, 2003). 2
2
inglong Zhou, M. J. (2009). A Novel Link Quality Assessment Method for Mobile Multi-Rate Multi-Hop Wireless
Networks. Faculty of Electrical Engineering, Mathematics, and Computer Science .
Today, the telecommunication industry is undergoing two important developments with implications
on future architectural solutions. These are the irreversible move towards IP-based networking and
the deployment of broadband access in the form of diverse Digital Subscriber Line (DSL)
technologies based on optical fiber and high capacity cable but also the WiMAX access (IEEE 802.16
Worldwide Interoperability for Microwave Access) (wimax forum,2007). Overlay networks have
recently emerged as a viable solution to the problem of content distribution with multicasting and
QoS facilities. Overlay networks are networks operating on the interdomain level, where the edge
hosts learn of each other and, based on knowledge of underlying network performance, they form
loosely coupled neighboring relationships. These relationships are used to induce a specific graph,
where nodes are representing hosts and edges are representing neighboring relationships. Graph
abstraction and the associated graph theory can be further used to formulate routing algorithms on
overlay networks (popescu, 2005). 
Review of Wimax Application
Wimax is not the only solution for delivering broadband wireless services. Several proprietary
solutions are already in the market. At the same coin, wireless networks represent an important
example of such scenarios where capturing and forging packets is relatively easy; attacks against such
networked system are becoming more complex and powerful. Thus, security is essential in wireless
technologies to allow rapid adoption and enhance their maturity, while designing the standard, the
IEEE 802.16 working group has taken into consideration the security aspects to avoid mistakes of
IEEE 802.11. Standard security specifications can mainly be found within the MAC layer which is
called security sub layer. 3
The security sub layer lies above the physical layer and below the MAC CPS, which is encrypted,
authenticated and validated. However, header and control information added by the physical layer are
not encrypted or authenticated. Thus physical layer information attached to the higher layer packets is
vulnerable to analysis.

3
Guruprasad, B. W. (2002). Lowering the Barrier to Wireless and Mobile Experimentation.
Computer Communications Review .
Designed by the IEEE 802.16 committee, WiMAX was developed after the security failures that
plagued early IEEE 802.11 networks. Recognizing the importance of security, the 802.16 working
groups designed several mechanisms to protect the service provider from theft of service, and to
protect the customer from unauthorized information disclosure. The standard includes state-of-the-art
methods for ensuring user data privacy and preventing unauthorized access, with additional protocol
optimization for mobility. A privacy sub layer within the WiMAX MAC handles security. In this
proposal, we try to discuss issues pertaining to various authentication processes and how to build a
model using MATLAB simulink and also develop a tracing module which can record theft of account
usage in internet usage. It also find out, where it getting accessed.
Support for privacy: User data is encrypted using cryptographic schemes of proven robustness to
provide privacy. Both AES (Advanced Encryption Standard) and 3DES (Triple Data Encryption St
inward) are supported. Most system implementations will likely use AES, as it is the new encryption
In our thesis work we have implemented a Wimax transmitter & receiver using MATLAB. Here we
also connect a control system and a sensor to our transmitter for security purpose. Here is the whole
scenario of simulation overview. By using this architectural used in research, we would develop
another authentication model based on this simulation figure given below.
Figure 1: Example simulink architecture for authentication model (Amin, 2008)
SIMULINK implementation:
Our SIMULINK has 4 major parts. They are:

Security

Transmitter

Channel

Receiver
Security For our home security purpose we have used here:

Sensor

Control Unit
Deliverables:
By doing this proposal, I can able to know what are the futuristic roadblocks for wimax broadband
technology, and aspects of previous methodologies proposed by various authors. Taking of analysis of
each process of authentication and knowing few loopholes in communication through this. For this, I
develop up a model using MATLAB SIMULINK and also use a model for tracking and monitoring
interference which break security architecture of Wimax.
From proposal, we can able to conclude that, issues on security for wimax technology can be
addressed. Mainly; we address security aspect in respect authentication of user and tracking the theft
done by another individual and monitoring it. As in broadband there is no limit of whose subscriber
is, any individual with laptop enabled with pcmci card can used the internet. The main proposed work
is making authentication of these wimax connection through MAC address and trying to track if other
person trying to interfere and use the service. In this proposal, we build up a model using mat lab
simulink for authentication and tracking ip configuration.
Works Cited
Amin, A. A. (2008). Study of WiMAX Simulation. Department of Computer Science and
Engineering .
Anon. (2007). Broadband Technology. Retrieved 06 20, 2010, from Wikipedia.
Cotanis, N. D. (2000). Estimating Radio Coverage for New Mobile Wireless Services Data Collection
and Pre-processing. IEEE paper .
D. Couto, D. A. (2005). “A high-throughput path metric for multi-hop wireless routing,”. Wireless
Networks .
Hasan, M. A. (2007). Performance Evaluation of WiMAX/IEEE 802.16 OFDM Physical Layer.
HELSINKI UNIVERSITY OF TECHNOLOGY .
Roca, A. (2007). Implementation of a WiMAX simulator in Simulink. Diplom-Ingenieurs unter
Leitung von .
The Matlab help: Communications Blockset. (2007). Retrieved 2010, from Communications Blockset:
http://www.mathworks.com
White paper. (2007). “A comparative Analysis of Mobile WiMAX. WiMAX Forum .
Wicker, S. B. (1995). Error Control Systems for Digital Communication and Storage. School of
Electrical and Computer Engineering .
Milestones
1) What you have achieved?
As per the project, my work on this project gave me a whole new perspective of
Broadband technology and its working. I got study and know, major hurdles in
authentication procedures and communication through various addressing protocol. I
was able to analyze work of Wimax connectivity model and was able to build model
to track interference and trace the ip. I got know various work related issue and
practically worked on it. What if an obstacle does at a point of wave propagation?
2) What has gone to plan?
In knowing the facts for this work, I have gone through various studies and
methodologies of wimax Broadband technology .I analyzed various authentication
procedures and models developed by authors. I developed a security model which can
overcome future security authentication attacks and monitor ip and track interference of
ip by other source. I built up a simulink model using MATLAB, which can make out
better authentication and tracking mechanism.
3) What you have to change?
From my aspect, I had to work on some basic technical authentication procedures,
worked on it empirically and designed a model. It was able to reduce the hindrance
scale. I used Matlab tool in knowing better performance analysis.
3) Mostly, the project was more of practical work on authentication procedures. It
made me to further research in making better and safe connectivity.
Download