Πέμπτη 11 Ιουλίου 2013

Alternative WiMax applications and security issues

The first obvious and straightforward application of WiMax is the retail wireless Internet access at a mobile basis, replacing today 3G Internet access of GSM and CDMA worldwide.  Apart from that though, WiMax can be a real alternative for 4G wireless networks [11]. The main problem in that is that there is not a market of an adequate size from vendors for personal mobile devices. This can be overcome if the demand rises, but it is a “chicken and egg” problem (the demand is waiting for the industry and the industry is waiting for the demand). WiMax was proposed as an alternative to DVB-T for the digital television, but DVB-T was preferred.
A very promising alternative use for WiMax is as a substitute for the last mile [11]. The copper from the central offices of a provider to the subscriber’s premises is, usually in the Western World, public-owned and each provider pays a monthly fee for every local loop they use. As the management of the last mile across the country is a relatively difficult operation for a non-telecommunications company, in most cases the management (extension, upgrade, maintenance and of course the lease) is conducted by the incumbent telecommunications provider of each country ( eg British Telecom for the UK, Deutsche Telekom for Germany, KPN for the Netherlands, NTT for Japan etc), which is a now a privatized company and a former state monopoly. The contradiction of the incumbent of being simultaneously retail provider and manager of the access network used by its competitors (so the incumbent is responsible for activating the subscribers’ connections of its own competitors) leads to competition problems (margin squeeze, unethical competition with deliberately delayed activations and unfixed failures etc). The monopoly of the incumbent in the last mile cannot be easily overcome in many cases, even though many regulatory efforts have been made. The only 100% effective solution is to change the physical medium of the last mile. One solution is fibers, with Fiber To The Home (FTTH) networks, but when we talk about wireless solutions, this could be WiMax. One Base Station with a WiMax antenna can cover an area of tens of square kilometers ( , with r the cell radius) and (in theory even) hundreds of thousands of potential subscribers. In this case, the activation of the services would not depend on the last mile manager company, but on the provider itself, as only a terminal device (Customer’s Premises Equipment) and the credentials would be needed. Unfortunately for the competition, this has not worked in almost any country. It is characteristic that for example in Greece, the incumbent (OTE, former state monopoly and Deutsche Telekom owned today) has bided for a WiMax license, won it, but never used it commercially, for some analysts just in order to block the WiMax penetration and to keep its competitors dependent on the last mile that OTE manages.
Regulation in WiMax is mainly focused on the spectrum used. The channels at 2.5 and 3.5 GHz need a license, while the ones at 5.8 GHz do not. Licenses in countries are either given in auctions or at a first-come-first-serve basis [15]. Just like GSM and all other wireless communications, spectrum shortage is a critical issue. Especially for the lower frequencies (which are more attractive, as they experience less attenuation over distance), there is a significant spectral congestion with loads of technologies claiming part of the spectrum. 
There are a few security issues in WiMax mainly coming mainly from the fact that the physical medium (air interface) is shared and not dedicated for each user. Confidentiality and resistance to interception and eavesdropping are the main concerns. Message authentication is needed in order to ensure the integrity of both the message and the sender, while Denial of Service (DoS) attacks affect the availability of the service. The main types of attacks are: man-in-the-middle attack, message replay attack on authentication and authenticated key formation protocols, parallel session attack, interleaving attack, attack due to type flaw, reflection attack, attack due to name omission and attack due to misuse of cryptographic services. In the IEEE 802.16 standard, the privacy sublayer (PS) is on top of the physical layer, so the PS guards only the data link layer and not the physical layer, leaving it in general vulnerable to attacks [8].
Jamming is conducted with a source of strong noise in order to decrease the channel capacity, causing DoS problems, but it is easily detected with radio analyzers. Scrambling is jamming for a short period for time, but it is not trivial to implement it, because synchronization at certain time intervals is needed. Identity theft is also an issue in WiMax, which is done by reprogramming a device with the hardware address of another device. This is also difficult to be done, as the attacker must keep transmitting at the exact timeslots that the Base Station is, of course with a stronger signal. Water torture attack is also possible, where a series of frames that drain the receiver’s battery are transmitted. This can be neutralized with a data authenticity technology. There are two types of certificate in WiMax: one of the manufacturer’s and one at the Subscriber Station. There is not a certificate for the Base Station, so the Subscriber Station certificate is verified with a public key, making the scheme vulnerable. If there also is a Base Station certificate, making a mutual authentication, this vulnerability will vanish. Furthermore, the state of the Security Associations (SA) does not differentiate from one timeslot to the other, so a replay attack is possible. Also, the Cipher Block Chaining uses a 56-bit key, which can be decrypted with brute force with present computing power. Finally, an Authorization Key (AK) lasts for up to 70 days, while a Traffic Encryption Key (TEK) for 30 minutes, so a data Security Associations can use 3.360 TEK’s over the AK’s lifetime. The Security Associations Identifier is 2 bits long, but for 3.360 at least 12 bits are needed ( different TEK’s) [8].

Security mechanisms are always expensive processes. They require extensive research, evaluation and implementation outcomes. The mobility of IEEE 802.16e makes WiMax more vulnerable to attacks, so more precautions must be taken. Nevertheless, we must always keep in mind that “what locks, can be unlocked”. 

Δεν υπάρχουν σχόλια: