slugThe design of a Trusted Authentication scheme for Wimax Network

Journal Title: International Journal of Management, IT and Engineering - Year 2011, Vol 1, Issue 6

Abstract

As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks in. IEEE802.16 provides a security sublayer in the MAC layer to address the privacy issues across the fixed BWA (Broadband Wireless Access). In this paper, we first overview the IEEE802.16 standard, and then investigate possible attacks on the basic PKMprotocol in IEEE802.16. We also give possible solutions to counter those attacks.

Authors and Affiliations

Mr. Rajesh Shrivastava and Deepak Kumar Mehto

Keywords

Related Articles

Global Positioning System Data Logger

A GPS tracking unit is a device that uses the Global Positioning System to determine the precise location of a vehicle, person, or other asset to which it is attached and to record the position of the asset at regular...

Software Reliability Measurment Based On API and Information Theoretic Metrics

Measuring the quality of software now days is one of the most important tasks. In this research paper we are enhancing the software quality measurement using API and theoretic information metrics. Along with the new se...

Object Oriented Metrics Measurement Paradigm

The increasing importance of software measurement has led to development of new software measures. Many metrics have been proposed related to various constructs like class, coupling, cohesion, inheritance, information...

slugATTENDANCE SYSTEM BASED ON AUTOMATIC DOOR UNIT RADIO FREQUENCY IDENTIFICATION (RFID)

Radio-frequency identification (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and...

Mapping the Agricultural Geography: A District Wise Pattern in the South-Eastern Part of the Punjab Province in Colonial India

The South-Eastern part of the Punjab was somewhat backward during 1858-1947. This subregion was also located away from the perennial rivers Punjab and the river Jamuna‘s course was along the eastern boundary of the stat...

Download PDF file
  • EP ID EP18090
  • DOI -
  • Views 323
  • Downloads 13

How To Cite

Mr. Rajesh Shrivastava and Deepak Kumar Mehto (2011). slugThe design of a Trusted Authentication scheme for Wimax Network. International Journal of Management, IT and Engineering, 1(6), -. https://europub.co.uk/articles/-A-18090