Assessing the Effect of WiMAX System Parameter Settings on MAC-level Local DoS Vulnerability

نویسندگان

  • Juan Deng
  • Richard R. Brooks
  • James Martin
چکیده

The research community has established that WiMAX networks suffer from Denial of Service (DoS) vulnerabilities. In this paper, we analyze how WiMAX system parameter settings increase or decrease DoS vulnerabilities of WiMAX networks. The behavior of the WiMAX MAC level protocol is sensitive to the settings of core system parameters. Unlike traditional network-based DoS attacks, attacks resulting from parameter misconfiguration are difficult for network operators to detect. We focus on bandwidth contention resolution aspects of the WiMAX MAC protocol. Simulations are performed using the ns-2 simulator. Analysis of Variance (ANOVA) techniques on the resulting simulation data identify which bandwidth contention resolution parameter combinations are crucial for configuring WiMAX to be less vulnerable to DoS attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessing the socio-economic vulnerability of rangeland beneficiaries and the convergence of opinions of experts and beneficiaries on its effective factors in Yazd province

Backgrounds: The conditions in which an individual or society is under tension due to social, economic, and environmental changes are called vulnerability. Vulnerability of rangeland beneficiaries and subsequent poverty of beneficiaries has caused unsustainable operation of rangelands. On the other hand, the degree pf vulnerability of rangeland beneficiaries in areas with more rainfall restrict...

متن کامل

Global Journal of Computer Science and Technology

Data security has become a major issue in most network protocols. For wireless system, security support is even more important to protect the users as well as the network. Due to this importance, different protocol were designed & deployed with network standards in order to add the security. The security sub layer of IEEE 802.16 employs an authenticated client/server key management protocol in ...

متن کامل

New cryptanalysis and modelling for wireless networking

High data rates and interoperability of vender devices have made WiMAX a prime desire for use worldwide. WiMAX is based on the IEEE 802.16 standard. IEEE 802.16a, b, c & d versions were updated within three years of the first launch of WiMAX. However, during those early years reports were published that highlighted the security weaknesses of the standard. These weaknesses prompted the IEEE to i...

متن کامل

Optimal Location and Parameter Settings of UPFC Device in Transmission System based on Imperialistic Competitive Algorithm

In this paper, we present a new method to determine the optimal location and parameter settings of UnifiedPower Flow Controller (UPFC) for removing voltage violations and transmission lines overloading. UPFC isconsidered as the most powerful member of the FACTS devices, that it can control shunt and series power flow.This option gives to UPFC the power to control the voltage profile and transmi...

متن کامل

The Impact of Channel Bandwidth with Network Asymmetry in WiMAX Network Using TCP New Reno

The World Wide interoperability for microwave access (WiMAX) technology support to the flexible channel sizes and different countries use different channel it depends on the rule and regulation of countries and their environment. The WiMAX network asymmetry is largely depends on DL:UL ratio. This paper investigates the effect of channel bandwidth in WiMAX network with network asymmetry using TC...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011