@article{822, author = {Noudjoud Kahya-Abbaci, Nacira Ghoualmi}, title = {Analysis of Security Weaknesses in IEEE 802.16}, journal = {Signals and Telecommunication Journal}, year = {2012}, volume = {1}, number = {1}, doi = {}, url = {http://www.dline.info/stj/fulltext/v1n1/4.pdf}, abstract = {The IEEE 802.16 standard, usually known as WIMAX, is the latest technology that has promised to offer broadband wireless access over long distance. In this article we offer an overview of the state-of-the-art of security issue on WIMAX, which is a new and hot research point for telecommunication and computer scientist, we analyze vulnerabilities contained in layers and we categorize these weakness into three kinds: man-in-the-middle, replay and denial of service attacks. We give a classification of the man-in-the-middle attacks based on unauthentication, unencryption message and unmutual authentication. Some of these attacks have been fixed with the adoption of recent amendments and security solutions in IEEE 802.16 but some still persist exist and need to be resolved. In our paper we propose a new authentication protocol more reliable and secure to prevent replay, DOS and man-in-the-middle attacks.}, }