4th International ICST Conference on Wireless Internet

Research Article

Denial of Service Vulnerabilities In the 802.16 Protocol

Download501 downloads
  • @INPROCEEDINGS{10.4108/ICST.WICON2008.4849,
        author={Siddharth Maru and Timothy  X Brown},
        title={Denial of Service Vulnerabilities In the 802.16 Protocol},
        proceedings={4th International ICST Conference on Wireless Internet},
        publisher={ICST},
        proceedings_a={WICON},
        year={2010},
        month={5},
        keywords={IEEE 802.16 denial of service broadband wireless access jamming encryption sensing traffic analysis.},
        doi={10.4108/ICST.WICON2008.4849}
    }
    
  • Siddharth Maru
    Timothy X Brown
    Year: 2010
    Denial of Service Vulnerabilities In the 802.16 Protocol
    WICON
    ICST
    DOI: 10.4108/ICST.WICON2008.4849
Siddharth Maru1,*, Timothy X Brown1,*
  • 1: Dept. of Electrical and Computer Engineering University of Colorado, Boulder, CO 80309 – 0530
*Contact email: siddharth.maru@colorado.edu, timxb@colorado.edu

Abstract

This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threat model, we assume that the attacker is external to the network i.e. the attacker cannot associate with the network and send packets as a participant; nor can the attacker decrypt encrypted data. However, the attacker is able to analyze the unencrypted parts of the management traffic and observe the timing, size and source of traffic. Further, the attacker can send jamming signals that disrupt a specific packet and cause its contents to be discarded. In this scenario we analyze the vulnerabilities. We find that the attacker can prevent or hinder communication with little effort by disrupting certain important control packets. We detail these attacks and their effects. This analysis also suggests the mitigation techniques to be employed to reduce or eliminate such attacks.