The design of a Trusted Authentication scheme for Wimax Network

Abstract

As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks in. IEEE802.16 provides a security sublayer in the MAC layer to address the privacy issues across the fixed BWA (Broadband Wireless Access). In this paper, we first overview the IEEE802.16 standard, and then investigate possible attacks on the basic PKMprotocol in IEEE802.16. We also give possible solutions to counter those attacks.

Authors and Affiliations

Mr. Rajesh Shrivastava and Deepak Kumar Mehto

Keywords

Related Articles

TCP ANALYSIS UNDER VARIOUS MOBILE ADHOC NETWORKS

A Mobile Ad-hoc Network (MANET) is a temporary wireless network composed of mobile nodes without any permanent infrastructure. Each node not only operates as an end system, it also acts as a router to forward packets o...

HANDLING OF SYNCHRONIZED DATA USING JAVA/J2EE

This paper proposes use of a Vector Data Structure mechanism for Human Resource Management System over the Web Application. Array is the static memory allocation. It allocates the memory for the same data type in seque...

AGRICULTURAL PRODUCTIVITY IN KALAHANDI DISTRICT OF ORISSA OVER THE DECADES: A TEMPORAL ASSESSMENT

Agriculture supports a large segment of population by providing opportunities for employment and earning a livelihood. The undivided Kalahandi district of Orissa is one of the poorest regions of the state with about 70...

Digital Right Management to Foster Mobile Multimedia Services

Digital Rights Management is the current hot topic in the Mobile Telecommunications area, which has taken a new step with the recently fostering Mobile Multimedia Services. Digital Rights Management is as hot as it is...

ENERGY CONSERVATION: An effective way of energy Utilization

Energy plays a key role in achieving the desired economic growth. The entire fabric of developmental goals is webbed around a successful energy strategy. Energy is a pivotal prerequisite of developed economy and social...

Download PDF file
  • EP ID EP26513
  • DOI -
  • Views 375
  • Downloads 10

How To Cite

Mr. Rajesh Shrivastava and Deepak Kumar Mehto (2011). The design of a Trusted Authentication scheme for Wimax Network. International Journal of Engineering, Science and Mathematics, 1(6), -. https://www.europub.co.uk/articles/-A-26513