WiMAX Security and Quality of Service
An End-to-End Perspective
Inbunden, Engelska, 2010
Av Seok-Yee Tang, Peter Muller, Hamid Sharif, Seok-Yee (Think Wireless Tech Pte Lte) Tang, Zurich Research Laboratory) Muller, Peter (IBM Research
1 739 kr
Produktinformation
- Utgivningsdatum2010-07-09
- Mått173 x 252 x 25 mm
- Vikt862 g
- FormatInbunden
- SpråkEngelska
- Antal sidor418
- FörlagJohn Wiley & Sons Inc
- ISBN9780470721971
Tillhör följande kategorier
SEOK YEE TANG has specialized in wireless communications systems throughout her 23 year career, gaining research, practical, management and leadership experience for military, industry and academic applications. In recent years she has worked with a varied range of companies over three continents. Her wireless communications career started with servicing UHF and VHF and HF radio communications sets used for the communications link between the Air Communications Operations Officers and the Air Force Pilots. She also upheld several leadership positions in her military career. Besides her career in Singapore Air Force, she has also worked for Microwave Communication Inc (MCI) in United States. Other universities and companies she has worked for include Mobile Research Group in University of Surrey in United Kingdom, University of Puerto Rico, Institute of Infocomm Singapore, and NEC in United Kingdom. She has also been an active member of the Technical Program Committees for several international Wireless Communications conferences since 2005. Conferences that she has contributed to organizing include Globecom, VTC and Chinacom. In 2008 she left the corporate world and is presently a financial market trader and also an entrepreneur. PETER MÜLLER joined the IBM Zurich Research Laboratory as a Research Staff Member in 1988, and was appointed the secretary of the IEEE Technical Committee on Communications and Information Systems Security in 2007. His research expertise covers a broad range of areas from information systems architecture and simulation techniques to device physics and nano-science. He holds a number of patents, has published more than 50 scientific articles, books, special journal issues and proceedings, as well as serving as a government counsel and chairing many international conferences and workshops.DR. HAMID R. SHARIF is the Henson Distinguished Professor of the Computer and Electronics Engineering Department and the Director of Advanced Telecommunications Engineering Laboratory (TEL) at the University of Nebraska-Lincoln. His current research interests include protocols, security, OoS and performance evaluations in wireless communications and networks. He has authored and co-authored over 160 technical papers in major international journals and refereed conferences. He serves as Steering Committee member, Symposium Chair and General Co-Chair of many international conferences, and also contributes as the Editor, Associate Editor, or Editorial Board member for several journals. He is the Co-Editor-in-Chief of Wiley’s Security and Communication Networks and a senior member of many professional organizations including IEEE. As the current Chapters Coordinator for IEEE Region 4, he is also the past Chair of the IEEE Nebraska Section and past President of the IEEE Nebraska Computer and Communications Societies.
- Preface xvAcknowledgement xixList of Contributors xxiList of Acronyms xxvList of Figures xxxvList of Tables xxxixPart A Introduction 11 Overview of End-to-End WiMAX Network Architecture 3Dr Mohuya Chakraborty and Dr Debika Bhattacharyya1.1 Introduction 31.2 Wireless Primer 41.2.1 Wireless Network Topologies 41.2.2 Wireless Technologies 41.2.3 Performance Parameters of Wireless Networks 51.2.4 WiFi and WiMAX 61.3 Introduction to WiMAX Technology 61.3.1 Operational Principles 71.3.2 WiMAX Speed and Range 81.3.3 Spectrum 91.3.4 Limitations 101.3.5 Need for WiMAX 101.4 Mobile WiMAX 101.4.1 Overview of Mobile WiMAX 101.4.2 Handover Process in Mobile WiMAX 111.4.3 LTE vs. Mobile WiMAX 121.5 Overview of End-to-End WiMAX Network Architecture 121.6 Radio Interface Specifications for WiMAX 161.6.1 Overview 161.6.2 802.16e-2005 Technology 171.6.3 Applications 191.6.4 WiMAX Simulation Tools 191.7 Interoperability Issues in WiMAX 191.8 Summary 21References 22Part B Security 232 WiMAX Security Defined in 802.16 Standards 25Slim Rekhis and Noureddine Boudriga2.1 Introduction 252.2 Overview of 802.16 WMAN Networks 262.2.1 IEEE 802.16 Standards and Connectivity Modes 262.2.2 Network Architecture 282.2.3 Protocol Architecture 312.2.4 Network Entry Procedure 322.3 Security Requirements for Broadband Access in WMAN Networks 332.4 Security Mechanisms in Initial 802.16 Networks 352.4.1 Security Associations 352.4.2 Use of Certificates 372.4.3 PKM Protocol 382.4.4 PKM Authorization 382.4.5 Privacy and Key Management 412.4.6 Data Encryption 422.5 Analysis of Security Weaknesses in Initial Versions of 802.16 422.5.1 Physical-Level Based Attacks 432.5.2 Attacks on Authentication 442.5.3 Attacks on Key Management 452.5.4 Attacks on Privacy 472.5.5 Attacks on Availability 472.6 Security Amendments in Recent Versions if IEEE 802.16 482.6.1 Authorization, Mutual Authentication and Access Control 482.6.2 TEK Three-Way Handshake 502.6.3 Encryption and Key Hierarchy 512.6.4 Multicast and Broadcast Service (MBS) 522.6.5 Security of Handover Schemes 532.7 Analysis of Security Weaknesses in 802.16e 542.7.1 Attacks on Authorization 542.7.2 Analysis of SA-TEK Three-Way Handshake 562.7.3 Vulnerability to Denial of Service Attacks 562.7.4 Broadcasting and Multicasting Related Weaknesses 582.7.5 Weaknesses in Handover Schemes 592.8 Further Reading 592.9 Summary 60References 603 Key Management in 802.16e 63Georgios Kambourakis and Stefanos Gritzalis3.1 Introduction 633.2 Privacy Key Management Protocol 643.3 PKM Version 1 653.4 PKM Version 2 673.4.1 Security Negotiation 683.4.2 Authentication/Authorization 683.4.3 Key Derivation and Hierarchy 703.4.4 Three-Way Handshake 723.4.5 Key Delivery 743.5 Vulnerabilities and Countermeasures 753.5.1 Authorization 763.5.2 Key Derivation 763.5.3 Three-Way Handshake 773.5.4 Key Delivery 773.5.5 Attacks on Confidentiality 783.5.6 MBS Attacks 793.5.7 Mesh Mode Considerations 803.5.8 Handovers 813.6 Comparisons with 802.11/UMTS 813.7 Summary 84References 854 WiMAX Network Security 87Luca Adamo, Romano Fantacci and Leonardo Maccari4.1 Introduction 874.2 WiMAX Network Reference Model 884.2.1 Functional Entities 894.2.2 Logical Domains 904.2.3 Reference Points 904.2.4 ASN Profiles 914.3 The RADIUS Server 924.3.1 Authentication in WiMAX Infrastructure 934.4 WiMAX Networking Procedures and Security 954.4.1 Handover Procedure 954.4.2 DHCP 974.4.3 Security Issues 984.4.4 Mobile IP Protocol 994.4.5 PMIP 1004.4.6 PMIP Security Considerations 1014.4.7 CMIP 1024.4.8 CMIP Security Considerations 1034.4.9 QoS 1044.4.10 A Complete Authentication Procedure 1044.5 Further Reading 1054.6 Summary 106References 107Part C Quality of Service 1095 Cross-Layer End-to-End QoS Architecture: The Milestone of WiMAX 111Floriano De Rango, Andrea Malfitano and Salvatore Marano5.1 Introduction 1115.2 QoS Definitions 1125.3 QoS Mechanisms Offered by IEEE 802.16 1125.3.1 Cross-Layer QoS Architecture 1135.3.2 MAC Layer Point of View 1155.3.3 Offering QoS in PMP Mode 1175.3.4 QoS Introduction in Mesh Mode 1215.3.5 QoS Application on Packet by Packet Basis 1235.3.6 PHY Layer Point of View 1245.3.7 ACM: Adaptive Coding and Modulation 1255.3.8 Mobility Support in IEEE 802.16 1265.4 What is Missing in the WiMAX Features? 1285.4.1 Absences in the MAC Layer 1285.4.2 Scheduling Algorithm 1295.4.3 Call Admission Control Algorithm 1325.4.4 PHY Layer Improvements 1335.4.5 QoS Based ACM Algorithm 1335.5 Future Challenges 1345.5.1 End-to-End QoS in the IP World 1345.5.2 New Ways to Resolve the WiMAX QoS Problem: Two Interesting Examples 1365.5.3 Game Theory in the WiMAX Scenario 1365.5.4 Fuzzy Logic: What Idea to Guarantee QoS? 1385.5.5 Designing Mobility – Mesh WiMAX 1405.5.6 How to Extend QoS Mechanisms 1405.6 Summary 141References 1416 QoS in Mobile WiMAX 145Neila Krichene and Noureddine Boudriga6.1 Introduction 1456.2 Architectural QoS Requirements 1466.2.1 QoS-Related Challenges 1466.2.2 Architectural Requirements 1486.3 Mobile WiMAX Service Flows 1496.3.1 Service Flows 1506.3.2 Scheduling Services Supporting Service Flows 1516.3.3 QoS Parameters 1536.4 Admission Control 1546.4.1 MAC Layer Connections 1546.4.2 Bandwidth Request Procedures 1566.4.3 Bandwidth Allocation Procedures 1586.5 Scheduling Service 1606.5.1 Scheduling Architecture in Mobile WiMAX 1606.5.2 Packet Schedulers Overview 1626.6 Maintaining QoS During Handover 1656.6.1 WiMAX Handover Schemes 1656.6.2 Optimizing Handover to Maintain the Required QoS 1686.7 Enhancing WiMAX QoS Issues: Research Work 1706.7.1 New QoS Mechanisms 1716.7.2 The WEIRD Project 1716.7.3 WiFi and WiMAX QoS Integration 1736.8 Further Reading 1756.9 Summary 176References 1767 Mobility Management in WiMAX Networks 179Ikbal Chammakhi Msadaa, Daniel Cˆamara and Fethi Filali7.1 Mobile WiMAX Architecture 1807.2 Horizontal Handover in 802.16e 1837.2.1 Network Topology Acquisition 1837.2.2 Handover Process 1867.2.3 Fast BS Switching (FBSS) and Macro Diversity Handover (MDHO) 187 Discussion 1887.3 Optimized 802.16e Handover Schemes 1887.3.1 L2 Handover Schemes 1907.3.2 L2-L3 Cross-Layer Handover Schemes 1907.3.3 Mobile IPv6 Fast Handovers Over IEEE 802.16e Networks 191Discussion 1957.4 Vertical Handover 1957.4.1 Vertical Handover Mechanisms Involving 802.16e Networks 1967.4.2 IEEE 802.21, Media-Independent Handover Services 197Discussion 2007.5 Roaming 2007.5.1 WiMAX Roaming Interface 2037.5.2 The Roaming Process 2037.6 Mobility Management in WiMESH Networks 2047.7 Conclusion 2077.8 Summary 207References 208Part D Advanced Topics 2118 QoS Challenges in the Handover Process 213Marina Aguado, Eduardo Jacob, Marion Berbineau and Ivan Lledo Samper8.1 Introduction 2138.2 Handover in WiMAX 2148.3 The IEEE802.16 Handover Process 2158.3.1 The Network Entry Procedure 2158.3.2 Network Topology Advertising and Acquisition 2188.3.3 The Association Procedure 2208.3.4 Handover Stages in the IEEE 802.16 Standard 2218.3.5 Handover Execution Methods 2258.4 The Media Independent Handover Initiative – IEEE 802.21 2278.4.1 MIH Interactions with Layer 2 and Layer 3 Protocols 2298.4.2 MIH Scope and Limitations 2298.5 Enhancing the Handover Process 2308.5.1 Fast Ranging Mechanism 2308.5.2 Seamless Handover Mechanism 2318.5.3 Initiatives in the Cell Reselection Stage 2328.5.4 Initiatives in the Execution Stage 2328.6 Handover Scheduling 2338.7 Handover Performance Analysis 2348.8 Summary 238References 2389 Resource Allocation in Mobile WiMAX Networks 241Tara Ali Yahiya9.1 Introduction 2419.2 Background on IEEE 802.16e 2429.2.1 The Medium Access Control Layer – MAC 2429.2.2 The Physical Layer – PHY 2439.3 System Model 2489.4 OFDMA Key Principles–Analysis and Performance Characterizations 2499.4.1 Multiuser Diversity 2499.4.2 Adaptive Modulation and Coding – Burst Profiles 2509.4.3 Capacity Analysis – Time and Frequency Domain 2509.4.4 Mapping Messages 2529.5 Cross-Layer Resource Allocation in Mobile WiMAX 2529.6 Channel Aware Class Based Queue (CACBQ) – The Proposed Solution 2539.6.1 System Model 2539.6.2 Channel Aware Class Based Queue (CACBQ) Framework 2559.7 Summary and Conclusion 257References 25810 QoS Issues and Challenges in WiMAX and WiMAX MMR Networks 261Kiran Kumari, Srinath Narasimha and Krishna M. Sivalingam10.1 Introduction 26110.1.1 Motivation 26210.2 Multimedia Traffic 26310.2.1 Voice Codecs 26410.2.2 Video Codecs 26510.2.3 QoS Specifications 26710.2.4 QoS Effectiveness Measures 26810.3 Multimedia: WiFi versus WiMAX 26910.3.1 Limitations of Wireless LAN Technologies 26910.3.2 WiMAX MAC Layer 27010.3.3 QoS Architecture for WiMAX 27210.4 QoS Scheduling in WiMAX Networks 27310.4.1 Max-Min Weighted Fair Allocation 27410.4.2 Deficit Fair Priority Queue 27410.4.3 Weighted Fair Queuing 27510.4.4 Weighted Fair Priority Queuing 27510.5 Voice Traffic Scheduling in WiMAX 27610.5.1 Lee’s Algorithm 27610.5.2 UGS with Activity Detection Scheduling (UGS-AD) 27710.5.3 Extended-rtPS Scheduling 27710.5.4 Multi-Tap Scheduling 27810.6 Video Traffic Scheduling in WiMAX 27910.6.1 Opportunistic Scheduling 27910.6.2 Opportunistic DRR 28110.6.3 Summary 28210.7 Introduction to WiMAX MMR Networks 28210.7.1 How WiMAX MMR Networks Work 28410.7.2 Performance Impact 28610.7.3 Radio Resource Management Strategies 28710.8 Scheduling in WiMAX MMR Networks 28810.8.1 Objectives of Scheduling 28810.8.2 Constraints on Scheduling 28910.8.3 Diversity Gains 29010.9 Basic Wireless Scheduling Algorithms 29010.9.1 Round Robin Scheduling 29010.9.2 Max-SINR Scheduling 29110.9.3 Extension for Multi-Hop Case 29110.9.4 Proportional Fair Scheduling 29210.9.5 Extension for Multi-Hop Case 29210.9.6 Performance Comparison 29310.9.7 The PFMR Scheduling Algorithm 29310.10 Scheduling Algorithms for WiMAX MMR Networks 29410.10.1 The Scheduling Problem 29410.10.2 The GenArgMax Scheduling Algorithm 29510.10.3 The TreeTraversingScheduler Algorithm 29710.10.4 The FastHeuristic16j Scheduling Algorithm 29910.10.5 Improved Hop-Specific Scheduling Algorithms 30010.10.6 Performance Evaluation 30210.11 Further Reading 30410.12 Summary 305References 30511 On the Integration of WiFi and WiMAX Networks 309Tara Ali Yahiya and Hakima Chaouchi11.1 Introduction 30911.2 General Design Principles of the Interworking Architecture 31011.2.1 Functional Decomposition 31011.2.2 Deployment Modularity and Flexibility 31011.2.3 Support for Variety of Usage Models 31111.2.4 Extensive use of IETF Protocols 31111.3 WiFi/Mobile WiMAX Interworking Architecture 31111.4 Network Discovery and Selection 31311.5 Authentication and Security Architecture 31411.5.1 General Network Access Control Architecture 31411.5.2 EAP and PANA 31611.5.3 RADIUS and Diameter 31711.6 Security in WiFi and WiMAX Networks 31811.6.1 Security in WiFi 31811.6.2 Security in WiMAX 31911.6.3 Security Consideration in WiFi-WiMAX 32011.6.4 WiFi-WiMAX Interworking Scenarios 32111.7 Mobility Management 32411.7.1 Handover Support 32511.7.2 Cell Selection 32511.7.3 IP for Mobility Management 32611.7.4 Session Initiation Protocol for Mobility Management 32611.7.5 Identity Based Mobility 32811.8 Quality of Service Architecture 33011.8.1 End-to-End QoS Interworking Framework 33011.8.2 QoS Considerations 33211.9 Summary 335References 33512 QoS Simulation and An Enhanced Solution of Cell Selection for WiMAX Network 337Xinbing Wang, Shen Gu, Yuan Wu and Jiajing Wang12.1 Introduction 33712.2 WiMAX Simulation Tools – Overview 33812.2.1 NS2 33812.2.2 OPNet Modeler 33812.2.3 QualNet 33912.3 QoS Simulation of WiMAX Network 33912.3.1 Performance Comparison Between Different Services 33912.3.2 Mobility Support 34412.4 Analysis of QoS Simulation Results 35312.4.1 Fixed SSs 35312.4.2 Mobile SSs with Same Speed 35612.4.3 Mobile SSs with Varying Speed 35612.5 Enhancement – A New Solution of Cell Selection 35612.5.1 System Model 35612.5.2 Simulation Result 36012.6 Summary 363References 363Appendix List of Standards 365Index 371