TY - CHAP
T1 - Security in Wireless Metropolitan Area Networks
AU - Chen, Lei
AU - Shashidhar, Narasimha
AU - Yuan, Shengli
AU - Yang, Ming
N1 - Wireless Metropolitan Area Networks (WMANs) provide wireless communications at acceptable bandwidth over much larger geographical areas compared to Wireless Local Area Networks (WLANs). Also known as...
PY - 2013
Y1 - 2013
N2 - Wireless Metropolitan Area Networks (WMANs) provide wireless communications at acceptable bandwidth over much larger geographical areas compared to Wireless Local Area Networks (WLANs). Also known as Wireless Local Loop (WLL), WMANs are based on the IEEE 802.16 standards with commercial name Worldwide Interoperability for Microwave Access (WiMAX). With its global market growing eighty-five percent in 2010 to 1.7 billion U.S. dollars, WiMAX is becoming a major competitor among the prevailing wireless communications technologies. While improved IEEE 802.16 standards and amendments were published and adopted in almost every year of the past decade, existing standards still contain a number of security vulnerabilities inherent from deprecated versions. This chapter starts with an introduction to and overview of Metropolitan Area Networks (MANs), WMANs, WiMAX and IEEE 802.16 standards, then discusses the technical details of WiMAX and IEEE 802.16 security aspects such as confidentiality, integrity, key generation and management, as well as security vulnerabilities, treats, and countermeasures.
AB - Wireless Metropolitan Area Networks (WMANs) provide wireless communications at acceptable bandwidth over much larger geographical areas compared to Wireless Local Area Networks (WLANs). Also known as Wireless Local Loop (WLL), WMANs are based on the IEEE 802.16 standards with commercial name Worldwide Interoperability for Microwave Access (WiMAX). With its global market growing eighty-five percent in 2010 to 1.7 billion U.S. dollars, WiMAX is becoming a major competitor among the prevailing wireless communications technologies. While improved IEEE 802.16 standards and amendments were published and adopted in almost every year of the past decade, existing standards still contain a number of security vulnerabilities inherent from deprecated versions. This chapter starts with an introduction to and overview of Metropolitan Area Networks (MANs), WMANs, WiMAX and IEEE 802.16 standards, then discusses the technical details of WiMAX and IEEE 802.16 security aspects such as confidentiality, integrity, key generation and management, as well as security vulnerabilities, treats, and countermeasures.
KW - Advance encryption standard
KW - Data encryption standard
KW - Extensible authentication protocol
KW - Mobile station
KW - Security association
UR - https://doi.org/10.1007/978-3-642-36511-9_4
U2 - 10.1007/978-3-642-36511-9_4
DO - 10.1007/978-3-642-36511-9_4
M3 - Chapter
BT - Wireless Network Security: Theories and Applications
ER -