Anda di halaman 1dari 5

ALB-W-000006en

WHITE PAPER

White Paper
Security in WiMAX 802.16-2009 networks

January 2011 Rev A4

Security in WiMAX 802.16-2009 networks

ALB-W-000006en

WHITE PAPER

INTRODUCTION
Basic security concepts in data Networks Why is Security so important in WiMAX?

ALB-W 06en -aW 6sic0W uBrct 0yW -W 6-yW n uBrct 0yW wW6ed6ywW fkit06-0W -Wo606W-B0di -oW ipW o606W 0W -B0ditnNW0LtBBW6wkBr0wW-BBoW0iWsBWac6t6-0BBoCW wWk6t0 rce6teyWrt 0 r6eW -Wd tBeBwwW-B0ditn fitBW wkBr p r6eeyW -W 0LiwBW wrB-6t iwW pitW dL r ALConfidentialityCW 0W B-wctBwW 0L60W i-BW fBww6aBW 0BrL-ieiayWL6wWsBB-WoBw a-BoNWpitWf6-yWtB6

L6wW -i0W sBB-W tB6oW syW 6-yi-BW BlrBk0W 0L6-W ptifW ALS-W d tBoW -B0ditnwNW 0W wW rifke r60BoW 0 0LBWaB-c -BWtBrB hBtIWgitW -w06-rBNW6WrtBo 0Wr6toW eeBa6eeyW w -rBW 6W kLyw r6eW ri--Br0 i-W d 0 W -cfsBtW fcw0W sBW nBk0W ri-p oB-0 6eeyW dLB-W 0W wW tBDc tBoIW A RmOW wW 6W d tBeBwwW 0BrL-i wB-0W 0LticaLW 0LBW S-0Bt-B0IW m-W Bl6fkeBW ipW ri-p oB-0 6e 0yW fBrL6- wfW wW 0LBW o606W o606W 6tBW 0t6-wf 00BoW syW fB6-wW ipW t6o

0LticaLW0LBW6 tIW ALA RmOW wW 6-W ic0oiit


2 IWMLBwBWtBe60 hBeyWe6taBW6tB6wW

AuthenticationCW 6c0LB-0 r60 i-W wW 0LBW 6rrBwwIW hBt p r60 i-W ipW 6W re6 fBoW oB-0 0yIW gitW -w06-rBNW AL A RmOWd6wW-i0WoBw a-BoW6wW6WEir6eWmtB6W(B0ditnW dLB-Wcw -aW6Ws6-nW6rric-0NW 0W wWf6-o60ityW0L60W )Em(:W0BrL-ieiayIWS0Wd6wWit B-060BoW0iWRm(?Am(W i-eyW 0LBW tB6eW id-BtW ipW 0LBW 6rric-0W f6yW ikBt60BW -B0ditnwIW S0W d 0LW 0IWMLBtBW6tBWwBhBt6eWtBwictrBwWpitWktih o -aW wW 6-W ikBt60itW 0BrL-ieiay 6c0LB-0 r60 i-IW X-BW ipW 0LBW fiw0W riffi-W wW 6W w fkeBWcwBt?k6wwdito IntegrityCW -pitf60 i-W fcw0W tBf6 -W rifkeB0BW 6-oW ptBBW ipW 6rr oB-06eW itW oBe sBt60BW f6- kce60 i-wIW S-0Bat 0yW B-wctBwW 0L60W o606W wW rifkeB0BW6-oWktBr wBW6-oW0L60W 0W wW-i0Wfio p BoW oct -aW0LBW0t6-wf ww i-WptifWwB-oBtW0iWtBrB hBtIW T606W -0Bat 0yW wW -0B-oBoNW pitW -w06-rBNW 0iW ac6t6-0BBW 0L60W 6W BeBr0ti- rW 0t6-wpBtB-rBW wW kBtpitfBoW d 0LW Bl6r0eyW 0LBW oBw tBoW 6fic-0W ipW fi-ByIW m-W Bl6fkeBW ipW fBrL6- wfW pitW B-wct -aW o606W -0Bat 0yW wW0LBWo a 06eWw a-60ctB

6tBW ki0B-0 6eeyW BlkiwBoW 0iW 6-W c-6c0Lit UBoW

Page 2
Security in WiMAX 802.16-2009 networks

ALB-W-000006en

WHITE PAPER
SECURITY IN WIMAX NETWORKS (IEEE 802.16-2009)

IntroductionW Encryption i-W md6tBW ipW 0LBW rL6eeB-aBwW 6-oW -BBowW ipW wBrct 0yW 0W di 6c0Lit UBwW 0LBW uuNW 6oo ceoW mp0BtW 0LBW quW fBrL6L6hBW 0iW p6rBNW 0LBW lhhhn IgSCmMXSgg? W w06-o6toW 6c0LitwW wfwW 6tBW -BBoBoW pitW 6wwct -aW LBWuuW f6oBW 6W atB60W Bppit0W 0iW 6rL BhBW 6W 0tceyW wBrctBW d tBe BwwW ri-p oB-0 6e 0yW6-oW -0Bat 0yWIWgitW0L wW wB-owW 0iW 0LBW quW pit keys W 0BrL-ieiayIW A RmOW oBp -BwW i-W 0wW kti0irie2w06rnW 6W request 6W encryptionW fWsEE0Bn h BWep60u n YLet rLW 6tBW wB :NW dL wBrct 0yW wcs2e6yBtW wkBr p r6eeyW oBo r60BoW 0iW ktih o BW r6eeBoW M.YwW ) kt h6ryNW ri-p oB-0 6e 0yW 6-oW 6c0LB-0 p -6eW syW 0LBW quW -W 6W tBwki-wBW fBww6aBIW MLBw r60 i-W 0iW 0LBW -eyW cwBtwIW A RmOW wBrct 0yW wyw0BfW wW s6wBoW i-W 0LBW kt -r keBwW 6tBW60W0LBWw6fBW0 fBWB-rtyk0BoWd 0LW6WnBy ipW AuthenticationW 6-oW EncryptionNW dL rLW f6nBW 0W n-id-W syW si0LW k6t0wIW MLBW 6eait 0LfW cw 6W
kt6r0 r6eeyW -hce-Bt6seBW0BrL-ieiayW-id6o6ywIW

B-rtyk0 -aW 0LBW M.YwW f6yW sBW ) 3DESW fW0pkLn Ks6sn h BWep60u n A6s asWa :NW AESW qaNs BLan h BWep60u n ) qBw oBwNW 0L wW 0BrL-ieiayW 0wBepW f6nBwW kiww seBW 6W fi tBW A6s asWa :NWitW RSAIW ri-0tieeBoW6-oWfitBWwBrctBWfBo cfW6rrBwwIWMLBwBW ww cBwW X-rBW M.YwW 6tBW n-id-NW wBhBt6eW 0BrL- DcBwW d eeWsBWBlke6 -BoWsBeidIW cwBoW pitW o606W B-rtyk0 i-CW 3q3)T.u:NW 3q3)m.u )m.u:NW33R)m.u:IW AuthenticationW

mwW6etB6oyWoBwrt sBoNWmc0LB-0 r60 i-W wWcwBoW0iWac6 t6-0BBW uifBW ipW 0LBW 6oh6-06aBwW ipW 0LBW B-r 0LBWwBrctBW6rrBwwNW6hi o -aWc-6c0Lit UBoWcwBtwWcw - fkeBfB-0BoW syW A RmOW )0L60W 6tB aW0LBWfBrL6- wfwW d tBeBwwW ri--Br0 i-IW MLBW lhhhn IgSCmMXSgg?n w06-o6toW fkeBfB-0BoWsyWi0LBtW0BrL-ieia Bw:W6tBCW oBp -BwW0diW6c0LB-0 r60 i-WkL eiwikL BwCW
AL9wBWipWhBtyWtiscw0

ALOSA (06en asiceu -rctencLyocLpn ):W 0LBW cwBtW


f6nBwW6-W6c0LB-0 r60 i-WtBDcBw0W6wwir 60BoW0iW 0wWR m3W 6ootBwwIW mp0Btd6towNW 0LBW q6wBW u060 i-W )qu:W wB-owW 6W tBkeyWfBww6aBW6rrBk0 -aWitWoB-y -aW0LBWDcBtyIWMLBWq uW d eeWi-eyW)6-oWik0 i-6eey:Wp e0BtWsyWRm3W6ootBwwI AL SKA (atodeN wes -rctencLyocLpn -W 0L wW wyw0BfW ): wL6tBoW nByw

X 509 digital certificates

mW o a 06eW rBt0 p r60BW wW 6W o a 06

PKMW cwBoW syW 6W tBe 6seBW 0L to2k6t0yW r )3W0NsBen YLen Ps sRLoL 6 :W kti0irieIW ML wW kti0irieW 6eeidwW 6c0Lit 0yW pitW ac6t6-0BB -aW 0LBW 0LBWucswrt sBtWu060 i-W)uu:W0iWBlrL6-aBWnBywW6-oWis 06 -W rittBwki-oB-rBW sB0dBB-W 0LBW oB-0 0yW -pitf60 i-WptifW0LBWquIW8YRW wW6ewiW -WrL6taBWipW6 -i0LBtW kBtwi-WitWLiw0NW6-oW 0wWkcse rWnByI wwcBwWe nBWWnBywWtBptBwLNWWkBt 0 i-NWB0rIW io r6eWtB26c0Lit U6 MLBW mc0LB-0 r60 i-W ktirBwwW sB0dBB-W quW 6-oW uuW f6yW sB 6tBW wBhBt6eW pitf60wW pit W MLBtBW w fkeyWoBwrt sBoW6wWpieeidwCW rBt0 p r60BwNW sc0W i-BW ipW 0LBW fiw

w06-o6towW wW 0LBW )cwBoW 6ewiW -W UIT-T X.509

Blk t60 i-W 0 fBNW 6W rikyW ipW 0LBW kcse rW n 0LBW rBt0 p r60BoW id-BtW )cwBoW pitW hBt p r60 i-W ipW 0wW o a 06eW w a-60ctB:W 6 o a 06eWw a-60ctBWipW0LBW6c0Lit UBoWrBt0 digital signaoBe hBtBtNWwiW0LBWtBrB hBtWf6yWhBt pyW0 tureW ipW 0LBW f6-cp6r0ctBtNW dL rLW wW -recoBoW -W 0LBW oBe hBtBtW L6wW tB6eeyW Bw06se wLBoW rBt0 p r60BIW 6wwir 60 i-IW

PKMW) 3W0NsBenYLenPs sRLoL 6 :WfBw2 MLBW rBt0 p r60BW cwc6eeyW ri-06 -wW 0LBW w6aBW tBDcBw0 -aW pitW 6c0LB-0 r60 i-W 0iW 0LBW quW 6-oW 0LBW rBt0 p r60BoW B-0 0yNW wBt 6eW -c -reco -aW 0wW digital certificate X.509

0LBW uk6- wLW o a 06eW STW r6toNW pitW -w

/:W SpW 0LBW OIvxHW rBt0 p r60BW wW 6rrBk0BoNW 0LBW quW aBBt2 STATIC Keys: 0LByW 6tBW -i0W tB-BdBoNW L aLe 60BwW 0LBW Authentication Key )mY:W 6-oW encryptsW itW syW fB6-wW ipW 0LBW 1024 bits public-keyN ri-2 hce-Bt6seBW6-oWB6wyW0iWacBwwI 06 -BoW -W0LBWOIvxHWrBt0 p r60BW 0wBepIW

DYNAMIC Keys (WiMAX): 0LByWL6hBW 6W e f 0BoW M fBW 0iW E hBIW MLByW 6tBW 6c0if60 r6eeyW rL6-aBoW 6-oW tB-BdBoNW 6-oW0LByWktih oBWf6l fcfWwBrct 0yIW

Security in WiMAX 802.16-2009 networks

Page 3

ALB-W-000006en

WHITE PAPER

Extra security provided by WiMAX architecture 1Ba6toeBwwW6c0LB-0 r60 i-WitWB-rtyk0 i-WfBrL6- wfNW 0LBWoBw a-WipW0LBWASRmOWw06-o6toW 0wBepW fk Bl0t6Wh6ecBW dLB-W06en -aW6sic0WwBrct 0yCW

AL Eir6eWmtB6W(B0ditnwW)Em(:WdBtBWoBw a-BoW0iW -0Btri-Br0WA BWc- 0wW -Wwf6eeWB-h ti-fB-0wNWwiW EW0L ake eBwwWtiscw0WwBrct 0yWfBrL6- wfwW)60W0LBWki0B-0 6eWA 0W wW-i0Wcwc6eW0L L LoeBWrifBwWptifW -w oBW0LBWkt h60 X-W 0LBW ri-0t6tyNW A RmOW d6wW -i0W oBw a-BoW 6wW 6W eir6eW B0ditnW pitW ktih o -aW 6rrBwwW 0iW 0LBW p -6eW 6wW 6W
MAN/WAN operator technologyNW -0B-oBoW 0iW ri--Br0W 6W ei0W ipW cwBtw deterministic

Solved questions about security in WiMAX Psens nL(6LW skndut6nWLsan6dLn0 EuWos60u n6WsNLkk0 Rn0 noen)0PqDn L6cuWr5 W
NoIWmeeW0LBW -pitf60 i-W0t6hBee -aW0LticaLW0LBW6 tW w WB-rtyk0Bo

NoIW mc0LB-0 r60 i-W wW oi-BW syW fB6-wW ipW OIvxHW o a 06eW rBt0 p r60Bw

NoIWA RmOW wW6-WikBt60itW0BrL-ieiayWd 0LWoB0Btf - w0 rW6rrBwwWdLBtBW0LBWquWri-0tiewWBhBtyW0t6-wf w wiW6W dsBrLW Wf6yW-BhBtWihBtdLBefW6-yWc- 0W -W0LBW-B0ditnIW

COMPARISON WITH WI-FI (IEEE 802.11 a/b/g)

Authentication and Encryption AL WPA2CW 0W wW6WtBe60 hBW fktihBfB-0WipWA8 ALB-W 6W c- 0W d6-0wW 0iW 6rrBwwW 6W A 2g W -B0ditnNW p p r60BoW hBtw i-W ipW S...W FxbI44 W u 0L -aW 0LBW rBt0 tw0W S0W cwBwW (AES)W.u- 6LWn PuaLn c06dn .0pdLW CCMP ) -BBoBoW wW0iW6wwir 60BWd 0LW6-WmrrBwwW8i -0

1kuBrn .ds0 0 Rn PLttsRLn q-6dL 60Bs60u n .ua authenticatesW 0LBW c- 0IW MLBW S...W 3Wu6uBukn 9n qaNs BLan h BWep60u n:W 6wW A6s asW FxbI44W w06-o6toW ri-w oBtwW 0LBW 0diW mc0LB-0 r60 i-W B-rtyk0 i-W6eait 0LfIWMio6yNW 0W wW0LBWfiw0 BW kL eiwikL BwCW OSA 6-oWSKAIW qBw oBwW mc0LB-0 r60 i-NW yW B-rtyk0 i-WfBrL6- wfwWpitWac6t6-0BB -aWri-p 0yW6-oW wBrct 0yWkti0irieW -WA 2g NW6-oW 0W wW fkeBf oB-0 6e 6W s aW k6t0W ipW 0LBW -BdW A 2g W BDc kfB o606W -0Bat 0yW6tBW6ewiW6ooBoIW o w6oh6-06aBW wW 0L60W 0W f6yW -i0W sBW wc Riw0Wkikce6tWmc0LB-0 r60 i-W6-oW.-rtyk0 i-Wwyw0BfwW oBp -BoW fitBW6-r B-0WBDc kfB-0IW -WA 2g W6tBCW

AL WEPW)0WLan h8-0NskL 6n 3W0NsBe wW 6-W 6c0LB-0 r60 i-W ) :CW 0W CSMA/ 6-oW B-rtyk0 i-W wyw0BfW 0L60W rio p BwW o606W d 0LW 6W wL6 tBoW RBo cfW6rrBwwW -WS...WFxbI44Ws?aW wWs6w CA ).sWW0LWn AL tLwn P-k60pkLn qBBLttwn .u w060 r qNu0as BLTn kti0irieNW -W dL rLW c- 0wW 0t6-wf 0W d 0LByW 0L -nW 0LBtBW wW 6swB-rBW ipW i0LBtW 0t W wL6tBoW fBo cfIW S0W wW 0LBtBpitBW 6W t6-oi

Problems generated by Medium Access

WPA ))0O0n3Wu6LB6LanqBBLtt :CW 0Wktih oBwW fktihBfB-0wW tBwkBr0W A.8W 6eait 0LfW e nBW oy-6f rW aB-Bt60 iWPA-PSK )3WLXAdsWLanYLe :NW0L60W fkeBfB-0wW 0LBW w6fBW wL6tBoW nByW -W BhBtyW c- 0IW A8mW cwBwW RC4W6wW.-rtyk0 i-W6eait 0LfW6-oW TKIPW) fLopuWsWen YLen l 6LRW06en 3Wu6uBuk nByW f6-6aBfB-0W 6eait 0LfIWW :W 6wW MiW fB-0 i-W wifBW oBpBr0wNW 0W f6yW sBW w66wW oW 0L60W MYS8W L wifBWhce-Bt6s e 0 BwWsBr6cwBW 0W6eeidwW6rrBwwW0iWwi fBWipW 0LBWfBww6aBwWptifW0LBWm8W0iW0LBW-B0ditnWcwBtwIW

Security in WiMAX 802.16-2009 networks

Page 4

ALB-W-000006en

WHITE PAPER
CONCLUSSIONS MLBWfiw0W -0BtBw0 -aW wwcBwWBlke6 -BoW -W0LBWoircfB -0Wd eeWsBWwcff6t UBoWsBeidCW

1) Authentication mc0LB-0 r60 i-W -W A RmOW wW hBtyW tBe 6seBW 0L6-nwW 0iW 0LBW X.509 certificates 6-oW 0LBW digital signaturesNW 0L60W c- hir6eeyWoBp -BWBhBtyWcwBtW0L60W wW0ty -aW0iWB-0B dynamic keys 0L60WrL6-aBWkBt io r6eey tW0LBWrBeeNW6wWdBeeW6wW0LBW 6-oW 0LBW automatic re-authentication requests -W 0LBW quIW MLBwBW rBt0 p r60BwW r6--i0W -i0W sBW BoNW 6-oW ktBhB-0W6-yWc-6c0Lit UBoWc- 0WB-0Bt -aW0LBWA RmOWrB eeIW WEP 6c0LB-0 r60 i-W6-oWB-rtyk0 i-W0BrL-ieiayWcw -aW static keysWL6wWtBwce0BoW6wW6Ws aWwBrct 0yWp6 w -rBW 0W L6wW sBrifBW -rtBo seyW hce-Bt6seBIW m-yW -B0d wW wyw0BfW 0io6yW wW BlkiwBoW 0iW f6itnW cw -aW 0L wW ipW BWsBr0 6006rnwIWTBwk 0BWA8mW6-oWA8mbWL6hBWwiehBoW6Ws aWk6t Rn 0WipW0LBWktiseBfwWr6cwBoWsyWA.8WfBrL6- w g W BDc kfB-0W fcw0W sBWDc 0BW fioBt-W 0iW cwBW 0LBfNW wiW i eoBtW -B0ditnW BDc kfB-0W f6yW i-eyW wckkit0W A.8IW qB wNW 0LBW0tc0LW wW0L60NWsBr6cwBWipW0LBWe6rnWipWn-ideBoaB NWf6-yWkBikeBWnBBkWcw -aWA.8Wd 0Lic0Wn-id -aW 0wWL aLWt wnwIW

2) Encryption A RmOW cwBwW s6w rW seirnW r kLBtwCW AESW 6-oW DESIW MLBW rifkeBl 0yW ipW 0LBW 6eait 0LfwW wW tBe60BoW 0i BW d6yW ipW wBeBr0 -aNW0t6-wkiw -aW6-oWtBe60 -aW0LBWseirnwW -W6 WfBww6aBIWS-Wp6r0NW6-oWsB -aWw0t r0NWA RmOWcwBw )T.u:NW3q3 )m.u:NW3M1)m.u:NW33R)m.u:IWS0W wW-i0W0L60W0LBwBW0Br L- DcBwW6tBW0BrL-ieia r6eeyWwckBt itW0iWi0LBtwW)e n BWA 2g Kw:NW sc0W 0L60W 0LByW 6tBW rittBr0eyW cwBo dynamic keysW 0L60W expire after a time to liveW 6-oW 6tBW automatically renewedNW d 0Lic0W tBkB60 -aW - 0 6e U60 i-W hBr0itwNW B-rtyk0uuKwW wBth rBW -aW BhBtyW -oBkB-oB-0eyNWB0rIII:IW A.8W6-oWA8mW -WA 2g WL6hBWktihBoW fkit06-0Whce-Bt6s e 0 BwWtBa6to -aWB-rtyk0 i-NW6-oW0LByWf6yWi-eyW pitfW6W B-rtyk0 i-Wrifk6t6seBW0iW -WA RmOWsyWcw -aW WPA2IW

3) Medium Access W MBrL-ieiayW 0wBepW L6wW 6W atB60W fk6r0WRmOW fkeBfB-0wW 6W 0i06eeyW -W uBrct 0yIW A deterministicW RBo cfW mrrBwwNW kBtf6-B-0eyW controlledWsyW0LBWquIW(iWw060 i-Wf6yW0t6-wf 0W6Ww -aeBWs 0W p W 0WL6wW-i0WsBB-WktBh icweyW6ee 0LBWquNWwiW0LBWt6o iWwkBr0tcfW wW6c0if60 r6eeyWri-0 tieeBoW6-oWf6-yWn -oWipW6006rnwW6tBW6hi oBoIW X0LBtW 0BrL-ieia BwNW e nBW A 2g W 6-oW 0wW Rm3W e6yBtW s6w cwBW 6-oW BoW i-W 3uRm?3mNW randomW uncontrolledW RBo cfW mrrBwwNWdL rLWeB6owW -W0LBWkiww s e 0yWipW6-yWcwBtW0LW0t6pp rNWBhB-W0LicaLW 0W wW-i peiio -aW0LBW6 tWd 0WtBa w0BtBoW 0LBWm8IWML wWf6nBwW0LBwBW-B0ditnwWfitBWhce-Bt6seBW0 iWf6-yWTXuW) 0skn/EnALWN0BL KL :W6006rnwIW

4) Operator technology: MAN/WAN vs LAN A RmOWd6wW-i0WoBw a-BoW6wW6WEm(W0BrL-ieiayNW 0Wd6wW oBw a-BoW0iWsBW6-W operatorW0BrL-ieiayWpitW it WAN MAN )PL6Wupuk06s NW )0aLXqWLs :W-B0ditnwIWML wW fke BwWic0oiitWB-h ti-fB-0wWkBtpi tf6-rBNWs aWrihBt6aBW6tB6wNWwB 0iW fce0 keBW -oBkB-oB-0W cwBtwNCW 6-oW 0LBtBpitBW oBhBeikBtwW dBtBW hBtyW 6d6tBW ipW LidW 06-o6toW 0LBW w W wBrct 0yW d6wIW A RmOW d6wW 0LiticaLey

5) Extra security not requiredW E6rnwW -W uBrct 0yW -W i0LBtW 0BrL-ieia BwWa60BoW syW0 f6yW sBW f cw -aW wkBr p rW L aLW eBhBeW wBrctitW ewW 0yW 6oo 0 i-6eW BDc kfB-0W 6-oW wBthBtwCW 16o cwNW YBtsBtiwN .m8NW CW MLBwBW ABl0Bt-6eBW BeBf W 8m8)ETm8:NW wBW uBrct 0yW sc0W tBDc tBW Bl0t6W BDc kfB-0W 6-oW riw0wIW SpW 0LBW w06-o6toW 0wBepW 6etB6oyW W 6oo 0 i-6e LBW -BrBww6tyWuBrct 0yWfBrL6- wfwNWe nBWA RmOWoiBwNW 0W diceoWsBWB6w BtW6-oWfitBWriw02Bpp r B-0W0iWoBkei WwBrctBW -B0ditnWd 0Lic0WtBDc t -aW6-yWi0LBtWfB0LiowIW

albentia systems s.a.


C/ Margarita Salas, 22 - 28918 Legans - Madrid (SPAIN) Tel: +34 91 440 0213 Fax: +34 91 440 0569 E-mail: sales@albentia.com

www.albentia.com
Page 5
January 2011 Albentia Systems SA

Anda mungkin juga menyukai