slugThe design of a Trusted Authentication scheme for Wimax Network

Journal Title: International Journal of Management, IT and Engineering - Year 2011, Vol 1, Issue 6

Abstract

As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks in. IEEE802.16 provides a security sublayer in the MAC layer to address the privacy issues across the fixed BWA (Broadband Wireless Access). In this paper, we first overview the IEEE802.16 standard, and then investigate possible attacks on the basic PKMprotocol in IEEE802.16. We also give possible solutions to counter those attacks.

Authors and Affiliations

Mr. Rajesh Shrivastava and Deepak Kumar Mehto

Keywords

Related Articles

Performance Analysis of Dynamic OCDMA using Matlab

A DOCDMA (dynamic optical code division multiple access) communication system is projected for high-bandwidth communication systems. At the receiver, a synchronized TOF with the same function is used as a decoder. In t...

VERTEX COLORING OF A FUZZY GRAPH USING ALPA CUT

Let G= (VF,EF) be a simple connected undirected fuzzy graph where VF is a fuzzy set of vertices where each vertices has membership value µ and EF is a fuzzy set of edges where each edge has a membership value σ. Vertex...

Strategic Management in Indian MSMEs- A Literature Review

Large corporations across globe are following strategic management practices to achieve continuous growth. Though size of a business corporation is not a determining factor for strategic approach to business practices,...

Impact of Technological Inputs on Quality of E-learning products: A Review

As the world shifts from the industrial era to the knowledge era, elearning is gaining prominence as the preferred method for use in pedagogical education and informal training. Embracing this advance boasts numerous a...

MANAGING MERGERS & ACQUISITIONS: AN ISSUE OF STRATEGY MANAGEMENT

In this paper we have tried to discuss the meaning of mergers and acquisitions how for they contribute to the strategic planning policy of any organizations. Firms usually merge for the benefit of both the organization...

Download PDF file
  • EP ID EP18090
  • DOI -
  • Views 328
  • Downloads 13

How To Cite

Mr. Rajesh Shrivastava and Deepak Kumar Mehto (2011). slugThe design of a Trusted Authentication scheme for Wimax Network. International Journal of Management, IT and Engineering, 1(6), -. https://europub.co.uk/articles/-A-18090