A Mitigation Approach to Counter Initial Ranging Based DoS Attacks on IEEE 802.16-2009

Yasir Saleem, Khadim H. Asif, Touqir Ahmad, Sheraz Naseer, Khawar Bashir, Muhammad Younus Javed, Ayesha Altaf


In recent years increase in wireless accessed devices does not prerequisite any evidence. Security is the main concern for the researchers in 802.16e now-a-days. The layer structures defines that the security sub-layer resides over the physical layer and provides security on the link layer.This paper discusses the security threats present and still unsolved at the initial network entry stage. A mitigation approach to counter Initial Ranging Based DoS attacks on IEEE 802.16-2009 are particularized in this paper. Furthermore the existing solutions of initial ranging vulnerability are analyzed and their limitations are discussed. Proposed solution was checked against these limitations to ensure their absence. Moreover the solution was implemented in OMNET++ and results were analyzed to ensure the practicality and efficiency.

Full Text:



IEEE Std. 802.16-2009, “IEEE Standard for Local and Metropolitan Area Networks, part 16: Air Interface for Broadband Wireless Access Systems”, IEEE Press, May 2009.

National Institute of Standards and Technology Special Publication 800-127 (Draft) Natl. Inst. Stand. Technol. Spec. Publ. 800-127, 46 pages (Sep. 2009)

Taeshik Shon, Wook Choi: An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions, First International Conference, NBiS 2007, LNCS, Vol. 4650, pp. 88-97, 2007.

Maru,S. Brown, T.X. “Denial of Service Vulnerabilities In the 802.16 Protocol” DOI: 10.4108/ICST.WICON2008.4849 http://dx.doi.org/10.4108/ICST.WICON2008.48 49

A.Altaf, R.Sirhindi and A.Ahmed, “A Novel Approach against DoS Attacks in WiMAX Authentication using Visual Cryptography”, Proc. of 2nd Int‟l Conf. on Security Info. Syst. and Tech., 2008, pp. 238–242

SherazNaseer, Dr. Muhammad Younus, Attiq Ahmed, "Vulnerabilities Exposing IEEE 802.16e Networks To DoS Attacks: A Survey", in International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008.

Boom D., Buddenberg R., Denial of Service Vulnerabilities in IEEE 802.16 Wireless Networks IEEE C802.16e-04/406.

M. Shojaei, N. Movahhedinia, and B. Tork Ladani, "An Entropy Based Approach for DDoS Attack Detection in IEEE 802.16 Based Networks," in Advances in Information and Computer Security. vol. 7038, T. Iwata and M. Nishigaki, Eds., ed: Springer Berlin Heidelberg, 2011, pp. 129-143.

Copyright (c) 2016 Yasir Saleem

Powered By KICS