WiMAX Security and Quality of Service: An End-to-End Perspective

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. WiMAX Security and Quality of Service , focuses on the interdisciplinary subject of advanced Security and Quality of Service (QoS) in WiMAX wireless telecommunication systems including its models, standards, implementations, and applications. Split into 4 parts, Part A of the book is an end-to-end overview of the WiMAX architecture, protocol, and system requirements. Security is an essential element in the wireless world and Part B is fully dedicated to this topic. Part C provides an in depth analysis of QoS, including mobility management in WiMAX. Finally, Part D introduces the reader to advanced and future topics.

  • One of the first texts to cover security, QoS and deployments of WiMAX in the same book.
  • Introduces the primary concepts of the interdisciplinary nature of WiMAX security and QoS, and also includes discussion of hot topics in the field.
  • Written for engineers and researchers, answering practical questions from industry and the experimental field in academia.
  • Explains how WiMAX applications’ security and QoS are interconnected and interworked among the cross layers.

Author(s): Seok-Yee Tang, Peter Muller, Hamid Sharif
Publisher: Wiley
Year: 2010

Language: English
Pages: 418
Tags: Связь и телекоммуникации;Мобильная связь;

WiMax Security and Quality of Service......Page 5
Contents......Page 7
Preface......Page 17
Acknowledgement......Page 21
List of Contributors......Page 23
List of Acronyms......Page 27
List of Figures......Page 37
List of Tables......Page 41
Part A Introduction......Page 43
1.1 Introduction......Page 45
1.2.2 Wireless Technologies......Page 46
1.2.3 Performance Parameters of Wireless Networks......Page 47
1.3 Introduction to WiMAX Technology......Page 48
1.3.1 Operational Principles......Page 49
1.3.2 WiMAX Speed and Range......Page 50
1.3.3 Spectrum......Page 51
1.4.1 Overview of Mobile WiMAX......Page 52
1.4.2 Handover Process in Mobile WiMAX......Page 53
1.5 Overview of End-to-End WiMAX Network Architecture......Page 54
1.6.1 Overview......Page 58
1.6.2 802.16e-2005 Technology......Page 59
1.7 Interoperability Issues in WiMAX......Page 61
1.8 Summary......Page 63
References......Page 64
Part B Security......Page 65
2.1 Introduction......Page 67
2.2.1 IEEE 802.16 Standards and Connectivity Modes......Page 68
2.2.2 Network Architecture......Page 70
2.2.3 Protocol Architecture......Page 73
2.2.4 Network Entry Procedure......Page 74
2.3 Security Requirements for Broadband Access in WMAN Networks......Page 75
2.4.1 Security Associations......Page 77
2.4.2 Use of Certificates......Page 79
2.4.4 PKM Authorization......Page 80
2.4.5 Privacy and Key Management......Page 83
2.5 Analysis of Security Weaknesses in Initial Versions of 802.16......Page 84
2.5.1 Physical-Level Based Attacks......Page 85
2.5.2 Attacks on Authentication......Page 86
2.5.3 Attacks on Key Management......Page 87
2.5.5 Attacks on Availability......Page 89
2.6.1 Authorization, Mutual Authentication and Access Control......Page 90
2.6.2 TEK Three-Way Handshake......Page 92
2.6.3 Encryption and Key Hierarchy......Page 93
2.6.4 Multicast and Broadcast Service (MBS)......Page 94
2.6.5 Security of Handover Schemes......Page 95
2.7.1 Attacks on Authorization......Page 96
2.7.3 Vulnerability to Denial of Service Attacks......Page 98
2.7.4 Broadcasting and Multicasting Related Weaknesses......Page 100
2.8 Further Reading......Page 101
References......Page 102
3.1 Introduction......Page 105
3.2 Privacy Key Management Protocol......Page 106
3.3 PKM Version 1......Page 107
3.4 PKM Version 2......Page 109
3.4.2 Authentication/Authorization......Page 110
3.4.3 Key Derivation and Hierarchy......Page 112
3.4.4 Three-Way Handshake......Page 114
3.4.5 Key Delivery......Page 116
3.5 Vulnerabilities and Countermeasures......Page 117
3.5.2 Key Derivation......Page 118
3.5.4 Key Delivery......Page 119
3.5.5 Attacks on Confidentiality......Page 120
3.5.6 MBS Attacks......Page 121
3.5.7 Mesh Mode Considerations......Page 122
3.6 Comparisons with 802.11/UMTS......Page 123
3.7 Summary......Page 126
References......Page 127
4.1 Introduction......Page 129
4.2 WiMAX Network Reference Model......Page 130
4.2.1 Functional Entities......Page 131
4.2.3 Reference Points......Page 132
4.2.4 ASN Profiles......Page 133
4.3 The RADIUS Server......Page 134
4.3.1 Authentication in WiMAX Infrastructure......Page 135
4.4.1 Handover Procedure......Page 137
4.4.2 DHCP......Page 139
4.4.3 Security Issues......Page 140
4.4.4 Mobile IP Protocol......Page 141
4.4.5 PMIP......Page 142
4.4.6 PMIP Security Considerations......Page 143
4.4.7 CMIP......Page 144
4.4.8 CMIP Security Considerations......Page 145
4.4.10 A Complete Authentication Procedure......Page 146
4.5 Further Reading......Page 147
4.6 Summary......Page 148
References......Page 149
Part C Quality of Service......Page 151
5.1 Introduction......Page 153
5.3 QoS Mechanisms Offered by IEEE 802.16......Page 154
5.3.1 Cross-Layer QoS Architecture......Page 155
5.3.2 MAC Layer Point of View......Page 157
5.3.3 Offering QoS in PMP Mode......Page 159
5.3.4 QoS Introduction in Mesh Mode......Page 163
5.3.5 QoS Application on Packet by Packet Basis......Page 165
5.3.6 PHY Layer Point of View......Page 166
5.3.7 ACM: Adaptive Coding and Modulation......Page 167
5.3.8 Mobility Support in IEEE 802.16......Page 168
5.4.1 Absences in the MAC Layer......Page 170
5.4.2 Scheduling Algorithm......Page 171
5.4.3 Call Admission Control Algorithm......Page 174
5.4.5 QoS Based ACM Algorithm......Page 175
5.5.1 End-to-End QoS in the IP World......Page 176
5.5.3 Game Theory in the WiMAX Scenario......Page 178
5.5.4 Fuzzy Logic: What Idea to Guarantee QoS?......Page 180
5.5.6 How to Extend QoS Mechanisms......Page 182
References......Page 183
6.1 Introduction......Page 187
6.2.1 QoS-Related Challenges......Page 188
6.2.2 Architectural Requirements......Page 190
6.3 Mobile WiMAX Service Flows......Page 191
6.3.1 Service Flows......Page 192
6.3.2 Scheduling Services Supporting Service Flows......Page 193
6.3.3 QoS Parameters......Page 195
6.4.1 MAC Layer Connections......Page 196
6.4.2 Bandwidth Request Procedures......Page 198
6.4.3 Bandwidth Allocation Procedures......Page 200
6.5.1 Scheduling Architecture in Mobile WiMAX......Page 202
6.5.2 Packet Schedulers Overview......Page 204
6.6.1 WiMAX Handover Schemes......Page 207
6.6.2 Optimizing Handover to Maintain the Required QoS......Page 210
6.7 Enhancing WiMAX QoS Issues: Research Work......Page 212
6.7.2 The WEIRD Project......Page 213
6.7.3 WiFi and WiMAX QoS Integration......Page 215
6.8 Further Reading......Page 217
References......Page 218
7 Mobility Management in WiMAX Networks......Page 221
7.1 Mobile WiMAX Architecture......Page 222
7.2.1 Network Topology Acquisition......Page 225
7.2.2 Handover Process......Page 228
7.2.3 Fast BS Switching (FBSS) and Macro Diversity Handover (MDHO)......Page 229
7.3 Optimized 802.16e Handover Schemes......Page 230
7.3.2 L2-L3 Cross-Layer Handover Schemes......Page 232
7.3.3 Mobile IPv6 Fast Handovers Over IEEE 802.16e Networks......Page 233
7.4 Vertical Handover......Page 237
7.4.1 Vertical Handover Mechanisms Involving 802.16e Networks......Page 238
7.4.2 IEEE 802.21, Media-Independent Handover Services......Page 239
7.5 Roaming......Page 242
7.5.2 The Roaming Process......Page 245
7.6 Mobility Management in WiMESH Networks......Page 246
7.8 Summary......Page 249
References......Page 250
Part D Advanced Topics......Page 253
8.1 Introduction......Page 255
8.2 Handover in WiMAX......Page 256
8.3.1 The Network Entry Procedure......Page 257
8.3.2 Network Topology Advertising and Acquisition......Page 260
8.3.3 The Association Procedure......Page 262
8.3.4 Handover Stages in the IEEE 802.16 Standard......Page 263
8.3.5 Handover Execution Methods......Page 267
8.4 The Media Independent Handover Initiative – IEEE 802.21......Page 269
8.4.2 MIH Scope and Limitations......Page 271
8.5.1 Fast Ranging Mechanism......Page 272
8.5.2 Seamless Handover Mechanism......Page 273
8.5.4 Initiatives in the Execution Stage......Page 274
8.6 Handover Scheduling......Page 275
8.7 Handover Performance Analysis......Page 276
References......Page 280
9.1 Introduction......Page 283
9.2.1 The Medium Access Control Layer – MAC......Page 284
9.2.2 The Physical Layer – PHY......Page 285
9.3 System Model......Page 290
9.4.1 Multiuser Diversity......Page 291
9.4.3 Capacity Analysis – Time and Frequency Domain......Page 292
9.5 Cross-Layer Resource Allocation in Mobile WiMAX......Page 294
9.6.1 System Model......Page 295
9.6.2 Channel Aware Class Based Queue (CACBQ) Framework......Page 297
9.7 Summary and Conclusion......Page 299
References......Page 300
10.1 Introduction......Page 303
10.1.1 Motivation......Page 304
10.2 Multimedia Traffic......Page 305
10.2.1 Voice Codecs......Page 306
10.2.2 Video Codecs......Page 307
10.2.3 QoS Specifications......Page 309
10.2.4 QoS Effectiveness Measures......Page 310
10.3.1 Limitations of Wireless LAN Technologies......Page 311
10.3.2 WiMAX MAC Layer......Page 312
10.3.3 QoS Architecture for WiMAX......Page 314
10.4 QoS Scheduling in WiMAX Networks......Page 315
10.4.2 Deficit Fair Priority Queue......Page 316
10.4.4 Weighted Fair Priority Queuing......Page 317
10.5.1 Lee’s Algorithm......Page 318
10.5.3 Extended-rtPS Scheduling......Page 319
10.5.4 Multi-Tap Scheduling......Page 320
10.6.1 Opportunistic Scheduling......Page 321
10.6.2 Opportunistic DRR......Page 323
10.7 Introduction to WiMAX MMR Networks......Page 324
10.7.1 How WiMAX MMR Networks Work......Page 326
10.7.2 Performance Impact......Page 328
10.7.3 Radio Resource Management Strategies......Page 329
10.8.1 Objectives of Scheduling......Page 330
10.8.2 Constraints on Scheduling......Page 331
10.9.1 Round Robin Scheduling......Page 332
10.9.3 Extension for Multi-Hop Case......Page 333
10.9.5 Extension for Multi-Hop Case......Page 334
10.9.7 The PFMR Scheduling Algorithm......Page 335
10.10.1 The Scheduling Problem......Page 336
10.10.2 The GenArgMax Scheduling Algorithm......Page 337
10.10.3 The TreeTraversingScheduler Algorithm......Page 339
10.10.4 The FastHeuristic16j Scheduling Algorithm......Page 341
10.10.5 Improved Hop-Specific Scheduling Algorithms......Page 342
10.10.6 Performance Evaluation......Page 344
10.11 Further Reading......Page 346
References......Page 347
11.1 Introduction......Page 351
11.2.2 Deployment Modularity and Flexibility......Page 352
11.3 WiFi/Mobile WiMAX Interworking Architecture......Page 353
11.4 Network Discovery and Selection......Page 355
11.5.1 General Network Access Control Architecture......Page 356
11.5.2 EAP and PANA......Page 358
11.5.3 RADIUS and Diameter......Page 359
11.6.1 Security in WiFi......Page 360
11.6.2 Security in WiMAX......Page 361
11.6.3 Security Consideration in WiFi-WiMAX......Page 362
11.6.4 WiFi-WiMAX Interworking Scenarios......Page 363
11.7 Mobility Management......Page 366
11.7.2 Cell Selection......Page 367
11.7.4 Session Initiation Protocol for Mobility Management......Page 368
11.7.5 Identity Based Mobility......Page 370
11.8.1 End-to-End QoS Interworking Framework......Page 372
11.8.2 QoS Considerations......Page 374
References......Page 377
12.1 Introduction......Page 379
12.2.2 OPNet Modeler......Page 380
12.3.1 Performance Comparison Between Different Services......Page 381
12.3.2 Mobility Support......Page 386
12.4.1 Fixed SSs......Page 395
12.5.1 System Model......Page 398
12.5.2 Simulation Result......Page 402
References......Page 405
Appendix List of Standards......Page 407
Index......Page 413