ABSTRACT

CONTENTS 11.1 Introduction ............................................................................................. 206

11.1.1 Standardization and Certification .......................................... 206 11.1.2 Frequencies ................................................................................ 207 11.1.3 Modes of Operation .................................................................. 207

11.2 Frame Structure ....................................................................................... 209 11.2.1 Physical Layer ........................................................................... 209 11.2.2 MAC Layer ................................................................................ 210

11.2.2.1 MAC Protocol Data Unit ......................................... 210 11.2.2.2 PMP ............................................................................ 212 11.2.2.3 Mesh ........................................................................... 214 11.2.2.4 QoS ............................................................................. 214

11.3 Security Features ..................................................................................... 215 11.3.1 Security Associations ................................................................ 215 11.3.2 Authentication ........................................................................... 217

11.3.2.1 Hashed Message Authentication Code ................. 217 11.3.2.2 X.509 Certificates ...................................................... 218 11.3.2.3 Extensible Authentication Protocol ....................... 219

11.3.3 Privacy and Key Management ................................................ 219 11.3.3.1 Authorization and AK Exchange ........................... 220 11.3.3.2 TEK Exchange ........................................................... 221

11.3.4 Data Encryption ........................................................................ 222 11.3.4.1 DES ............................................................................. 222 11.3.4.2 AES ............................................................................. 223

11.4 Open Issues .............................................................................................. 226 11.4.1 Authorization Vulnerabilities .................................................. 227 11.4.2 Key Management ...................................................................... 227

References ........................................................................................................... 228

and

IEEE has created a new standard called IEEE 802.16 that deals with providing broadband wireless access to residential and business customers and is popularly known as the worldwide interoperability for microwave access (WiMAX). WiMAX is a nonprofit industry trade organization that oversees the implementation of this standard. WiMAX is expected to replace expensive services like cable, DSL, and T1 for last mile broadband access because it has a target transmission rate that can exceed 100 Mbps. The transmission range for WiMAX devices is up to 31 mi., which also far exceeds WiFi’s transmission range of approximately 100 m [1,2]. With such a large transmission range, a single base station may be able to provide broadband connections to an entire city.