New publication offers security tips for WiMAX networks

Oct 07, 2009

Government agencies and other organizations planning to use WiMAX -- Worldwide Interoperability for Microwave Access—networks can get technical advice on improving the security of their systems from a draft computer security guide prepared by the National Institute of Standards and Technology.

WiMAX is a wireless protocol that can cover an area that incorporates a few miles such as a campus or small town. It has a larger reach than the more familiar "WiFi" networks used in offices or homes, but smaller than wireless areas covered by cell phones. The technology, guided by standards issued by IEEE, originally was designed to provide last-mile broadband wireless access as an alternative to cable, digital subscriber line (DSL) or T1 service. In recent years its focus has shifted to provide a more cellular-like, mobile architecture to serve a broader audience.

was used after the December 2004 tsunami in Aceh, Indonesia after the communication infrastructure was destroyed and also after Hurricane Katrina along the coast of the Gulf of Mexico.

Special Publication 800-127 "Guide to for WiMAX Technologies" discusses WiMAX technology's topologies, components, certifications, security features and related security concerns. It covers the IEEE 802.16 standard for WiMAX and its evolution up to the 2009 version.

The main threat to WiMAX networks occurs when the radio links between WiMAX nodes are compromised. The systems are then susceptible to denial of service attacks, eavesdropping, message modification and resource misappropriation.

SP 800-127 recommends taking advantage of built-in security features to protect the data confidentiality on the network. It also suggests that organizations using WiMAX technology should:

  • Develop a robust WiMAX security policy and enforce it.
  • Pay particular attention to WiMAX technical countermeasure capabilities before implementing WiMAX technology.
  • Use WiMAX technology that supports Extensible Authentication Protocol methods as recommended in NIST SP 800-120 (available at http://www.csrc.nist.gov/publications/PubsSPs.html#800-120.)
  • Implement Federal Information Processing Standards-validated encryption to protect their data communications.
More information: The draft version of NIST SP 800-127 is open for public comment through October 30, 2009. The document is available online at csrc.nist.gov/publications/PubsDrafts.html#800-127

Source: National Institute of Standards and Technology (news : web)

Explore further: FX says overnight ratings becoming meaningless

add to favorites email to friend print save as pdf

Related Stories

Intel, Motorola push IEEE WiMax standards

Oct 27, 2005

Industry heavyweights Intel and Motorola joined forces to advance WiMax technology based on proposed uniform broadband access standards known as IEEE 802.16e.

Wake-up call: Draft security pub looks at cell phones, PDAs

Jul 10, 2008

In recent years cell phones and PDAs—"Personal Digital Assistants"—have exploded in power, performance and features. They now often boast expanded memory, cameras, Global Positioning System receivers and the ability to ...

Mobile WiMAX comes sooner rather than later

May 31, 2005

Conventional wisdom says that until the advent of 802.16e mobile WiMAX systems - still some time in the future - the wireless broadband standard will be more or less confined to the great outdoors. Some "near-outdoor" systems ...

Recommended for you

T-Mobile deal helps Rhapsody hit 2M paying subs

1 hour ago

(AP)—Rhapsody International Inc. said Tuesday its partnership with T-Mobile US Inc. has helped boost its number of paying subscribers to more than 2 million, up from 1.7 million in April.

Airbnb woos business travelers

1 hour ago

Airbnb on Monday set out to woo business travelers to its service that lets people turn unused rooms in homes into de facto hotel space.

Google searches hold key to future market crashes

13 hours ago

A team of researchers from Warwick Business School and Boston University have developed a method to automatically identify topics that people search for on Google before subsequent stock market falls.

Lenovo's smart glasses prototype has battery at neck

15 hours ago

China's PC giant Lenovo last week offered a peek at its Google Glass-competing smart glass prototype, further details of which are to be announced in October. Lenovo's glasses prototype is not an extreme ...

User comments : 0