A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX

  title={A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX},
  author={G{\"u}nther Lackner},
  journal={Int. J. Netw. Secur.},
  • G. Lackner
  • Published 1 November 2013
  • Computer Science
  • Int. J. Netw. Secur.
As wireless networks are finally coming of age, people and organizations start to implement critical applications and infrastructures based on them. As most wireless network standards have been designed with security as an afterthought, severe security shortcomings were the results and several improvements and amendments were necessary to fix the worst. Founded on a series of insecure implementations and design faults, recent standards and amendments show some improvements. To cover personal… 

WLAN Security: Threats And Countermeasures

  • S. Suroto
  • Computer Science
    JOIV : International Journal on Informatics Visualization
  • 2018
The conclusion that WLAN security is not easy, and it is constantly changing, and all businesses need to determine their security requirements based on the application using the WLAN.

An investigation of Bluetooth security vulnerabilities

Some of the tools and techniques currently available to attackers to exploit the vulnerabilities in Bluetooth are discussed and demonstrated and some of the techniques to mitigate those risks to protect data and devices are discussed.

Security Approaches in IEEE 802.11 MANET —Performance Evaluation of USM and RAS

Unified Security Mechanism (USM) and Rate Adaptation Scheme (RAS) are two of the proposed methods by researchers against DoS attacks in MANETs.

A Survey of Security Frameworks Suitable for Distributed Control Systems

A scope of use cases based on distributed control is defined together with requirements for evaluating existing security solutions and frameworks and several frameworks are surveyed and evaluated based on the identified use cases and security requirements.

Securing Synchronous Flooding Communications: An Atomic-SDN Implementation

Evaluating the design paradigm for encrypted SF communications on a real-world, large-scale IoT testbed, it is proven that a communication layer impervious to a range of attacks is established without sacrificing the network performance.

A state of the art review on the Internet of Things (IoT) history, technology and fields of deployment

This paper aims in structuring a state of the art review on IoT, where the technology, history and applications have been discussed briefly along with various statistics.

Application Methodology of Wireless Communication Technology for Nuclear Power Plants

Wireless communication technologies have been continuously studied due to their flexibility and cost efficiency in nuclear industry. In order to apply wireless technologies into nuclear power plants

Securing Clock Synchronization in Industrial Heterogeneous Networks

Today, wireless solutions for industrial networks are becoming more and more appealing since they increase flexibility and enable the use of additional wireless sensors, but also bring such advantaged technologies and services to the market.

Design of smart container in refrigerator for convenience usage

The smart container in refrigerator which does the de-cooling in the refrigerator itself no need to keep it in temperature and this is a remotely operable from anywhere using IOT is discussed further.



Security considerations for IEEE 802.15.4 networks

This paper highlights places where application designers and radio designers should exercise care when implementing and using 802.15.4 devices and provides recommendations on how to change the specification to make it less likely that people will deploy devices with poor security configurations.

Study and Design of a Security Architecture for Wireless Personal Area Networks

This doctoral thesis presents a formal model of location privacy for WPAN, and discusses the cryptographic and physical design principles that have to be taken into account to design a secure distance bounding protocol, and presents some interesting applications ofdistance bounding protocols.

Formal verification of the IEEE 802.11i WLAN security protocol

This paper presents the several linear temporal logic (LTL) formulas established to prove the credibility of the security model developed by us based on 802.11i robust security mechanism (RSN), and proves the implementation model to be complete and consistent.

Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions

  • Sen XuChin-Tser Huang
  • Computer Science, Business
    2006 3rd International Symposium on Wireless Communication Systems
  • 2006
It is found that PKM (privacy and key management) protocols version 2 (PKMv2), proposed by recently released IEEE 802.16e, is also vulnerable to new attacks, and possible solutions to counter those attacks are given.

Security Analysis and Improvements for IEEE 802.11i

Under the threat model, 802.11i appears to provide effective data confidentiality and integrity when CCMP is used, and may provide satisfactory mutual authentication and key management, although there are some potential implementation oversights that may cause severe problems.

Security of IEEE 802.16 in Mesh Mode

  • Yun ZhouYuguang Fang
  • Computer Science
    MILCOM 2006 - 2006 IEEE Military Communications conference
  • 2006
The security of IEEE 802.16 standard in its Mesh mode is analyzed, some security holes are pointed out, and some solutions to deal with attacks to IEEE802.16 mesh networks are proposed.

Security Analysis of IEEE 802.16

Two of the key features of the IEEE 802.16 standard, the dynamic resources allocation and the mesh mode revealed to be vulnerable to attacks that represent serious threats to the robustness and privacy of the communications.

A Simple Encryption Scheme Based on WiMAX

  • Cui-Lan Luo
  • Computer Science
    2009 International Conference on E-Business and Information System Security
  • 2009
The main content of WiMAX security is presented, the categories of encryption keys in both IEEE 802.16-2004 and IEEE802.16e-2005 standards are listed, and the principium, encryption process of RSA, DES-CBC, AES-CTR and AES-CCM are analyzed.

Authentication Authorization and Accounting (AAA) Schemes in WiMAX

The main focus of the authentication and authorization is based on the privacy key management $extensible authentication protocol for pairwise key manegement "EAP-PKM" and the accounting issue.

Intercepting mobile communications: the insecurity of 802.11

Several serious security flaws in the Wired Equivalent Privacy protocol are discovered, stemming from mis-application of cryptographic primitives, which lead to a number of practical attacks that demonstrate that WEP fails to achieve its security goals.