slugThe design of a Trusted Authentication scheme for Wimax Network
Journal Title: International Journal of Management, IT and Engineering - Year 2011, Vol 1, Issue 6
Abstract
As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks in. IEEE802.16 provides a security sublayer in the MAC layer to address the privacy issues across the fixed BWA (Broadband Wireless Access). In this paper, we first overview the IEEE802.16 standard, and then investigate possible attacks on the basic PKMprotocol in IEEE802.16. We also give possible solutions to counter those attacks.
Authors and Affiliations
Mr. Rajesh Shrivastava and Deepak Kumar Mehto
“THE STUDY OF RELATIONSHIP BETWEEN CAPITAL STRUCTURE AND COST OF CAPITAL” WITH RESPECT to Industries from Ahmednagar District
A business organization requires funds for various activities of the enterprise. Requirement of funds can be broadly categorized as Long-term requirement and Short-term requirement. The long-term requirements of funds...
slugUse of Language Games in Competitive Activity: A Content Analysis of Two Nonalcoholic Beverage Brands
In 1984, Roger Enrico published, ―The Other Guy Blinked: How Pepsi Won The Cola Wars‖ in which he participated as the CEO of Pepsico USA. In his book, Enrico presented a story of the commercial competition between Peps...
slugAN EFFICIENT ROUTING SCHEME FOR ICMN
In this paper, intermittently connected mobile networks are sparse wireless networks where most of the time there does not exist a complete path from the source to the destination. These networks fall into the general...
A STUDY ON CASH FLOW STATEMENT ANALYSIS WITH SPECIAL REFERENCE TO JET AIRWAYS
In the developing world the are many firms which has been opened but there are only few firms which is able to withstand. Few firms has more assets and less cash and vice versa (i.e, the working capital will be in a go...
slugGraph Factorization and its Application
In this paper, different types of factorization of graphs of the complete graphs K6m-2, K6m+2 and K6m for m≥1 have been studied. An algorithm for the solution of TSP has been developed. Some theoretical investigations...