IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

End-to-End (E2E) Security Approach in WiMAX: A Security Technical Overview for Corporate Multimedia Applications

End-to-End (E2E) Security Approach in WiMAX: A Security Technical Overview for Corporate Multimedia Applications
View Sample PDF
Author(s): Sasan Adibi (University of Waterloo, Canada), Gordon B. Agnew (University of Waterloo, Canada)and Tom Tofigh (WiMAX Forum, USA)
Copyright: 2008
Pages: 12
Source title: Handbook of Research on Wireless Security
Source Author(s)/Editor(s): Yan Zhang (Simula Research Laboratory, Norway), Jun Zheng (City University of New York, USA)and Miao Ma (National Institute of Information & Communications Tech, Singapore)
DOI: 10.4018/978-1-59904-899-4.ch047

Purchase


Abstract

An overview of the technical and business aspects is given for the corporate deployment of services over worldwide interoperability for microwave access (WiMAX). WiMAX is considered to be a strong candidate for the next generation of broadband wireless access; therefore its security is critical. This chapter provides an overview of the inherent and complementary benefits of broadband deployment over a long haul wireless pipe, such as WiMAX. In addition, we explore end-to-end (E2E) security structures necessary to launch secure business and consumer class services. The main focus of this chapter is to look for a best security practice to achieve E2E security in both vertical and horizontal markets. The E2E security practices will ensure complete coverage of the entire link from the client (user) to the server. This is also applicable to wireless virtual private network (VPN) applications where the tunneling mechanism between the client and the server ensures complete privacy and security for all users. The same idea for E2E security is applied to client-server-based multimedia applications, such as in Internet protocol (IP) multimedia subsystem (IMS) and voice over IP (VoIP) where secure client/server communication is required. In general, we believe that WiMAX provides the opportunity for a new class of high data rate symmetric services. Such services will require E2E security schemes to ensure risk-free high data-rate uploads and downloads of multimedia applications. WiMAX provides the capability for embedded security functions through the 802.16 security architecture standards. IEEE 802.16 is further subcategorized as 802.16d (fixed-WiMAX) and 802.16e (mobile-WiMAX). Due to the mobility and roaming capabilities in 802.16e and the fact that the medium of signal transmission is accessible to everyone, there are a few extra security considerations applied to 802.16e. These extra features include: privacy key management version 2 (PKMv2), PKM-extensible authentication protocol (EAP) authentication method, advanced encryption standard (AES) encryption wrapping, and so forth. The common security features of 802.16d and 802.16e are discussed in this chapter, as well as the highlights of the security comparisons between other broadband access, third-generation (3G) technologies, and WiMAX.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom