There are several key protocols and standards that are used as part of the overall WiMAX security strategy:
- PKMv2: This is the Privacy Key Management Protocol version 2. This is used as a key management protocol for the encrypted and authorized exchange of crypto keys for multicast and broadcast traffic.
- EAP: This is the Internet Engineering Task Force, Extensible Authentication Protocol. This protocol is used for device and user authentication.
- EAS: This is the Advanced Encryption Standard. This is used for encrypting the over the air traffic.
During the operation of the system, the various WiMAX security measures are brought in to play at the various required stages.
- WiMAX security authentication: Authentication is the ability of the network to ensure that the subscriber and subscriber devices are legitimate users and devices to be connected to the network. Network entry authorization uses EAP because it provides a flexible and scalable framework for authentication of the user and devices.
- WiMAX security encryption: The EAS encryption is used for encrypting over the air traffic. The WiMAX security approach utilizes uses Counter Mode with Cipher Block Chaining Message, CCM, and authentication code. With AES CCM, the sender generates a unique value per packet and sends this value to the receiver. This prevents man-in-the-middle attacks because they would have difficulty in substituting the traffic. An additional measure introduces the use of Traffic Encryption State machine, which uses a periodic key refresh mechanism to provide for the continued transition of keys.
1. Coverage: The single station of WiMAX can operate and provide coverage for hundred of users at a time and manage sending and receiving of data at very high speed with full of network security.
2. High Speed: The High speed of connectivity over long distance and high-speed voice makes it more demanded in hardly populated areas plus compacted areas.
3. Multi-functionality: WiMAX Technology perform a variety of task at a time such as offering high speed internet, providing telephone service, transformation of data, video streaming, voice application etc.
4. Infrastructure: WiMAX infrastructure is very easy and flexible therefore it provides maximum reliability of network and consent to actual access to end-users.
5. Low cost network: WiMAX provides a low cost network substitute to Internet services offered via ADSL, modem or local area network.
6. Rich Features: WiMAX Technology is offering rich features, which make it useful. WiMAX offers separate voice and data channel for fun, the semantic connection make your network more secure then before, fast connectively, license spectrum, liberty of movement