You are on page 1of 10

Key Management and

WiMAX security system


Presented by: Ayush
MTech ECE 192220002
Key Distribution
• For symmetric encryption to work, two parties A and B, key
distribution can be achieved in a number of ways, as follows:
1. A can select a key and physically deliver it to B.
2. A third party can select the key and physically deliver it to A and B.
3. If A and B have previously and recently used a key, one party can
transmit the new key to the other, encrypted using the old key.
4. If A and B each has an encrypted connection to a third party C, C can
deliver a key on the encrypted links to A and B
Key Management
• One of the major roles of public-key encryption has been to
address the problem of key distribution. There are actually two
distinct aspects to the use of public-key cryptography in this
regard:
• The distribution of public keys
• The use of public-key encryption to distribute secret keys
Distribution of Public Keys
• Public announcement
• Publicly available directory
• Public-key authority
• Public-key certificates
Public Announcement of Public Keys

Figure 10.1. Uncontrolled Public-Key Distribution


Publicly Available Directory

Figure 10.2. Public-Key Publication


Public-Key Authority
Public-Key Certificates

Figure 10.4. Exchange of Public-Key Certificates


WiMAX
• Acronym for Worldwide Interoperability for Microwave Access.
• Based on Wireless MAN technology.
• A wireless technology optimized for the delivery of IP centric services over
a wide area.
• A scalable wireless platform for constructing alternative and
complementary broadband networks.
• A certification that denotes interoperability of equipment built to the IEEE
802.16 or compatible standard. The IEEE 802.16 Working Group develops
standards that address two types of usage models −
• A fixed usage model (IEEE 802.16-2004).
• A portable usage model (IEEE 802.16e).
WiMAX - Security Functions
• WiMAX systems were designed at the outset with robust security in mind. The
standard includes state-of-the-art methods for ensuring user data privacy and
preventing unauthorized access with additional protocol optimization for
mobility.
• Security is handled by a privacy sublayer within the WiMAX MAC. The key aspects
of WiMAX security are as follow −
• Support for Privacy
• Device/user Authentication
• Flexible Key-management Protocol
• Protection of Control Messages
• Support for Fast Handover

You might also like