Você está na página 1de 38

WiMAX Security

WiMAX Network

WiMAX Network

ITMC Proposed Network

ytirgetnI

ytilibaliavA lennosrep dezirohtua yb dedeen nehw dessecca eb nac smetsys dna noitamrofni taht serusnE
lennosrep dezirohtua yb ylno deifidom si noitamrofni taht serusnE lennosrep dezirohtua yb ylno dessecca si noitamrofni taht serusnE

.ytilibaliavA .ytirgetnI

ytilaitnedifnoC

.ytilaitnedifnoC

Security Concept

na sesuac dnA egamad naC taerhT ot sdaeL ytilibarenluV stiolpxE tessA

a yb derusaem retnuoc eb naC erusopxE draugefaS

stceffa yltceriD

ksiR

Security Risks

Risk Evaluation

Layers Security

WiMAX Layers

Physical Layer

Mac Layer

noitcennoc slocotorp level hgiH noitpyrcnE tnemeganaM yeK noitacitnehtuA tnemeganaM htdiwdnaB noitcennoC

ecnegrevnoC ytiruceS

traP nommoC

Mac Sublayers

cte ,skcatta SOD ,snoitatS esaB eguoR ,noitacifidom tnetnoC ,gnidareuqsaM ,gniffinS

krowten sseleriw yna fo staerht lacipyT gnimmaJ gnilbmarcS

staerht CAM staerht YHP

WMAN Threat Model

seuqinhcet gnidaerpS , rewop langis gnisaercnI : noituloS

yticapac lennahc ecudeR :

tceffE

esion gnortS :

ecruoS

Risk Evaluation for Jamming

Risk Evaluation for Jamming

htdiwdnab ecudeR :

tceffE

esioN :

ecruoS

Risk Evaluation for Scrambling

Risk Evaluation for Scrambling

Identification Theft

Identification Theft

Eavesdropping

Risk Analysis

WiMAX Security

Security Process Authentication

Authentication

Security Process Key Exchange

Key Management

)46C5 rox )440|KA((1AHS = yek CAMH knilpU )46A3 rox )440|KA((1AHS = yek CAMH knilnwoD

)4635 rox )440 |KA(((1AHS(821-etacnurT = KEK

Key Derivation

Data Key Exchange

)noitamrifnoc KA dna ytirgetnI egasseM sedivorp( 1AHS-CAMH yb detacitnehtua si egassem egnahcxE ye K htiw detpyrcne si KET ylmodnar SB yb detareneg si KE T )KET( yeK noitpyrcnE ciffarT
)KEK stib 821 esu( SEA )yek cilbup sSS esu( ASR )KEK stib 821 esu( SED-elpirT

Data Key Exchange

Security Process Data Encryption

noitcetorP yalpeR oN noitceteD ytirgetnI egasseM oN )KET( yek SED tib 65

edoM CBC ni SED egassem tnemeganam ton egassem atad ylno tpyrcnE

Data Encryption

BCE-SED-elpirT htiw detpyrcne :KET AS wen a etaerc ro ,AS atad a yeker ot :1M )3(CAMH | KETweN| KETdlO | DIAS | oNqeS :SS SB :3 egasseM )2(CAMH | DIAS | oNqeS :SB SS :2 egasseM )1(CAMH | DIAS | oNqeS :SS SB :1 egasseM

Key Management

egasu yeK

,noitavired yeK ,noitcetorp yek ,tropsnart yek ,noitareneg yeK

smsinahcem ytiruceS SB dna SS neewteb snoitcennoc gnitpyrcne yb detnemelpmI secivres tropsnart atad eht ot ssecca dezirohtuanu tsniaga tcetorP krowten sseleriw dnabdaorb dexif eht ssorca ycavirp htiw srebircsbus sedivorP
.krowten eht ssorca swolf ecivres detaicossa eht tpyrcnE

tnemeganam yeK noitcetorp yalper egasseM )ytirgetnI( noitceted noitacifidom egasseM noitpyrcne egasseM lortnoc sseccA noitacitnehtuA

Solution

Solution

kcehC weiveR & rotinoM tcA evorpmI & niatniaM ti etarepO & tnemelpmI oD

SMSI hsilbatsE nalP

99771 OSI 9977 SB 20072 CEI/OSI

Conclusion

tseT )4

yciloP ytiruceS etaroproC )1

dnopseR dna rotinoM )3

evorpmI dna eganaM )5

ksiR eganaM dna eziminiM ot esirpretnE na elbanE naC noituloS ytiruceS detargetnI ,evisneherpmoC A
Comprehensive solution

eruceS )2

Glossary

Você também pode gostar