IMPROVING SECURITY IN INITIAL NETWORK ENTRY PROCESS OF IEEE 802.16
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 9
Abstract
IEEE 802.16 basically designed to provide more security as compared to other wireless networks. It provides many security features to protect the information in the network as well as to protect the network from unauthorized access, still it vulnerable to many attacks. The process, where attack or threat is possible, is the initial network entry process of IEEE 802.16. This is because many of the MAC management messages, which are used in this process, are not encrypted. The initial network entry process is very important as this is the first gate to establish connection between MS and BS. The solution to this problem provided by some paper is to use Diffie-Hellman key exchange algorithm, but the algorithm we are going to use here is elliptic curve Diffie-Hellman key exchange algorithm. This paper provides the solution to the initial network entry process by using elliptic curve Diffie-Hellman key exchange algorithm as it is faster than the Diffie-Hellman key exchange algorithm. Hence it also improves the performance of IEEE 802.16.
Authors and Affiliations
Prof. Pranita K. Gandhewar , Prof. Prasad P. Lokulwar
Integrated Model for Software Usability
In recent years, the usability of software systems has been recognized as an important quality factor. Many definitions and models of usability have been given so far but they are brief and informal. Most of these models...
Clustering Mixed Data Points Using Fuzzy CMeans Clustering Algorithm for Performance Analysis
Clustering plays an outstanding role in data mining research. Among the various algorithms for clustering, most of the researchers used the Fuzzy C-Means algorithm (FCM) in the areas like computational geometry, data com...
An Analysis of Irregularities in Devanagari Script Writing – A Machine Recognition Perspective
Abstract— This paper deals with the theoretical analysis of Devanagari script according to machine recognition perspective. An individual having good knowledge of the script of a language can easily read some words writt...
An Extensive Evaluation of Anaphora Resolution Based Abstract Generation System
This paper presents an extensive evaluation of anaphora resolution (AR) algorithm proposed for Abstract Generation System (AGS) and discusses the metrics used to measure its performance. The evaluation exercise is conduc...
Improved Self Fused Check pointing Replication for Handling Multiple Faults in Cloud Computing
The performance of checkpointing replication fault tolerance technique is severely bottlenecks due to handling of number of replicas generated for a large number of nodes to tolerate multiple faults such as multiple fail...