Rivier academic journal, volume 3, number 1, spring 2007 Copyright 2007 by Robert Zupko. Published by Rivier College, with permission


INTRODUCTION TO IEEE STANDARD 8.16: WIRELESS BROADBAND ACCESS


Download 111.51 Kb.
Pdf ko'rish
bet7/15
Sana03.02.2023
Hajmi111.51 Kb.
#1148343
1   2   3   4   5   6   7   8   9   10   ...   15
Bog'liq
j70-zupko

5
INTRODUCTION TO IEEE STANDARD 8.16: WIRELESS BROADBAND ACCESS 
a different channel and the formula is flexible enough to define future channelization sets for future 
regulatory domains.
5 Security Sublayer 
The standard builds on the PHY specification by implementing a security sublayer as part of the overall 
MAC functionally provided. This security sublayer is the lowest layer of the MAC and can provide 
strong encryption to outgoing data transmissions. This allows for communications security between the 
substation and base station, and additionally protects against theft of service by preventing unauthorized 
substations from connecting to the network. 
The core architecture of the security sublayer is the use of two component protocols. These 
protocols include an encapsulation protocol that provides a means for encrypting data packets and a key 
management protocol that provides a means for the base station and substation to synchronize keys. 
Packets that are transmitted after being passed through the encapsulation protocol contain a generic 
unencrypted MAC header, with the internal data encrypted using the cipher text chaining mode of the 
US Data Encryption Standard (DES).
5.1 PKM Protocol 
The privacy key management (PKM) protocol is the means by which the substation that is connected to 
the network initially authenticates and re-authenticates its identity, as well as acquiring cryptographic 
keying information. The core of the PKM is the concept of security associations; which are a set of 
cryptographic methods and associated keying information. These security associations are established by 
the substation during the initial connection to the base station and are given a limited time frame of 
operation before it is necessary for the substation to refresh them. To ensure the secure exchange of 
these security associations between the base station and the substation X.509 digital certificates and 
RSA public-key encryption is used. This is further augmented by the use of Hashed Message 
Authentication Code and SHA-1 to authenticate the PKM protocol messages. 

Download 111.51 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   10   ...   15




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling