Featured Research

from universities, journals, and other organizations

New Publication Offers Security Tips For WiMAX Networks

Date:
October 9, 2009
Source:
National Institute of Standards and Technology (NIST)
Summary:
Government agencies and other organizations planning to use WiMAX -- Worldwide Interoperability for Microwave Access -- networks can get technical advice on improving the security of their systems from a draft computer security guide prepared by NIST.

Government agencies and other organizations planning to use WiMAX— Worldwide Interoperability for Microwave Access—networks can get technical advice on improving the security of their systems from a draft computer security guide prepared by the National Institute of Standards and Technology (NIST).

Related Articles


WiMAX is a wireless protocol that can cover an area that incorporates a few miles such as a campus or small town. It has a larger reach than the more familiar “WiFi” networks used in offices or homes, but smaller than wireless areas covered by cell phones. The technology, guided by standards issued by IEEE, originally was designed to provide last-mile broadband wireless access as an alternative to cable, digital subscriber line (DSL) or T1 service. In recent years its focus has shifted to provide a more cellular-like, mobile architecture to serve a broader audience.

WiMAX was used after the December 2004 tsunami in Aceh, Indonesia after the communication infrastructure was destroyed and also after Hurricane Katrina along the coast of the Gulf of Mexico.

Special Publication 800-127 “Guide to Security for WiMAX Technologies” discusses WiMAX technology’s topologies, components, certifications, security features and related security concerns. It covers the IEEE 802.16 standard for WiMAX and its evolution up to the 2009 version.

The main threat to WiMAX networks occurs when the radio links between WiMAX nodes are compromised. The systems are then susceptible to denial of service attacks, eavesdropping, message modification and resource misappropriation.

SP 800-127 recommends taking advantage of built-in security features to protect the data confidentiality on the network. It also suggests that organizations using WiMAX technology should:

  • Develop a robust WiMAX security policy and enforce it.
  • Pay particular attention to WiMAX technical countermeasure capabilities before implementing WiMAX technology.
  • Use WiMAX technology that supports Extensible Authentication Protocol methods as recommended in NIST SP 800-120 (available at http://www.csrc.nist.gov/publications/PubsSPs.html#800-120.)
  • Implement Federal Information Processing Standards-validated encryption to protect their data communications.

The draft version of NIST SP 800-127 is open for public comment through October 30, 2009. The document is available online at http://csrc.nist.gov/publications/PubsDrafts.html#800-127.


Story Source:

The above story is based on materials provided by National Institute of Standards and Technology (NIST). Note: Materials may be edited for content and length.


Cite This Page:

National Institute of Standards and Technology (NIST). "New Publication Offers Security Tips For WiMAX Networks." ScienceDaily. ScienceDaily, 9 October 2009. <www.sciencedaily.com/releases/2009/10/091007091748.htm>.
National Institute of Standards and Technology (NIST). (2009, October 9). New Publication Offers Security Tips For WiMAX Networks. ScienceDaily. Retrieved April 18, 2015 from www.sciencedaily.com/releases/2009/10/091007091748.htm
National Institute of Standards and Technology (NIST). "New Publication Offers Security Tips For WiMAX Networks." ScienceDaily. www.sciencedaily.com/releases/2009/10/091007091748.htm (accessed April 18, 2015).

Share This


More From ScienceDaily



More Computers & Math News

Saturday, April 18, 2015

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

WikiLeaks Refuses To Let Sony Hack Die, Posts Database

WikiLeaks Refuses To Let Sony Hack Die, Posts Database

Newsy (Apr. 17, 2015) WikiLeaks&apos; Julian Assange says the hacked emails and documents "belong in the public domain." Video provided by Newsy
Powered by NewsLook.com
Scientists Create Self-Powering Camera

Scientists Create Self-Powering Camera

Reuters - Innovations Video Online (Apr. 17, 2015) American scientists build a self-powering camera that captures images without using an external power source, allowing it to operate indefinitely in a well-lit environment. Elly Park reports. Video provided by Reuters
Powered by NewsLook.com
The State Of Virtual Reality

The State Of Virtual Reality

Newsy (Apr. 17, 2015) Virtual Reality is still a young industry. What’s on offer and what should we expect from our immersive new future? Video provided by Newsy
Powered by NewsLook.com
Cybercrime Could Cost $400 Bln

Cybercrime Could Cost $400 Bln

Reuters - Business Video Online (Apr. 16, 2015) Representatives from around 160 countries gather at the Hague to discuss cyber space and cyber security, including the dilemmas and challenges regarding the evolution of the internet. Ciara Lee reports. Video provided by Reuters
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins