18.07.2013 Views

A comparison of wi-fi and wimax with case studies - Florida State ...

A comparison of wi-fi and wimax with case studies - Florida State ...

A comparison of wi-fi and wimax with case studies - Florida State ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.3.1.2.4.2. Overall Analysis<br />

Figure 4-5 Encryption Frame Structure <strong>and</strong> Process<br />

Learning from the experience from IEEE 802.11, the IEEE 802.16 working group faces<br />

security threats both in the MAC <strong>and</strong> PHY levels. 802.11 only has protections in the MAC level<br />

cannot present against attacks from PHY-Level. 802.16 progression has many good functions,<br />

however it also brings <strong>wi</strong>th it an increase <strong>of</strong> threats to users<br />

The initial st<strong>and</strong>ard IEEE 802.16-2001 requires an attacker to put real equipment between<br />

SS <strong>and</strong> BS <strong>and</strong> also operate at a frequency <strong>of</strong> 10 to 66 GHz. The IEEE 802.16e adds mobility to<br />

the st<strong>and</strong>ard; however it creates a security risk. Now, an attacker’s physical position is not really<br />

constrained <strong>and</strong> the management messages are much weaker than IEEE 802.11.<br />

With radio transmission, there is a great risk. Anyone who has a proper well located receiver<br />

can intercept the channel. So the designers have to establish a safety mechanism. The other threat<br />

is that anybody who has a correctly con<strong>fi</strong>gured radio transmitter can access the <strong>wi</strong>reless network.<br />

Through this weakness, an attacker can make up or modify frames from authorized organizations.<br />

Therefore there must be a procedure to protect the transmitting data. Furthermore, the<br />

interference <strong>and</strong> distance may also give attackers a chance to intrude the system or two systems<br />

which cannot connect to each other directly. Thus, how to protect a system <strong>and</strong> examine the<br />

received data are also very important to designers.<br />

52

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!