首页> 美国政府科技报告 >Control Channel Vulnerability Analysis of the Institute of Electrical and Electronics Engineers 802.16m-2011 and 802.16- 2009 Standards.
【24h】

Control Channel Vulnerability Analysis of the Institute of Electrical and Electronics Engineers 802.16m-2011 and 802.16- 2009 Standards.

机译:电气和电子工程师协会802.16m-2011和802.16-2009标准的控制通道漏洞分析。

获取原文

摘要

The Institute of Electrical and Electronics Engineers (IEEE) 802.16 set of standards, known as Worldwide Interoperability for Microwave Access (WiMAX), is a family of standards widely deployed for wireless network access. Though WiMAX security vulnerabilities have been extensively analyzed, the IEEE 802.16m-2011 standard incorporates the new advanced air interface (AAI), which is substantially different from legacy standards and justifies reexamination on a clean slate. In this research, the vulnerabilities of IEEE 802.16m-2011 control channels are examined at the medium-access (MAC) and the physical (PHY) layers with proposed attack vectors. Methodologies are proposed to overcome challenges in terms of the timing and power associated with manipulating control channels. Attacks that manipulate the transmission power of mobile stations are examined in detail, while other attacks on IEEE 802.16m-2011, including multiple-input multiple-output (MIMO) disruption, network-entry disruption, and water-torture are also discussed. Out of fifteen vulnerabilities presented, thirteen were not previously identified for IEEE 802.16m-2011. Existing and new proposed vulnerabilities within legacy standards (specifically IEEE 802.16-2009) are also discussed, including transmission power manipulation, entry procedure attacks, water-torture attacks, and automatic repeat request attacks. Twelve of eighteen vulnerabilities presented were not previously discussed.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号