
Appendix A WiMAX Security
•Authorization request and reply
The MS/SS presents its public certificate to the base station. The base station verifies the certificate and sends an authentication key (AK) to the MS/SS.
•Key request and reply
The MS/SS requests a transport encryption key (TEK) which the base station generates and encrypts using the authentication key.
•Encrypted traffic
The MS/SS decrypts the TEK (using the authentication key). Both stations can now securely encrypt and decrypt the data flow.
CCMP
All traffic in a WiMAX network is encrypted using CCMP (Counter Mode with Cipher Block Chaining Message Authentication Protocol). CCMP is based on the
‘Counter mode’ refers to the encryption of each block of plain text with an arbitrary number, known as the counter. This number changes each time a block of plain text is encrypted. Counter mode avoids the security weakness of repeated identical blocks of encrypted text that makes encrypted data vulnerable to
‘Cipher Block Chaining Message Authentication’ (also known as
Authentication
The WiMAX Device supports
| 209 |
WiMAX Device Configuration User’s Guide | |
|
|