slugThe design of a Trusted Authentication scheme for Wimax Network

Journal Title: International Journal of Management, IT and Engineering - Year 2011, Vol 1, Issue 6

Abstract

As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks in. IEEE802.16 provides a security sublayer in the MAC layer to address the privacy issues across the fixed BWA (Broadband Wireless Access). In this paper, we first overview the IEEE802.16 standard, and then investigate possible attacks on the basic PKMprotocol in IEEE802.16. We also give possible solutions to counter those attacks.

Authors and Affiliations

Mr. Rajesh Shrivastava and Deepak Kumar Mehto

Keywords

Related Articles

slugAN OPTIMAL DETECTION TECHNIQUE FOR MOBILE RADIO FREQENCIES

Cellular phone technology is rapidly changing. Features like Bluetooth, USB, high resolution cameras, microphones, Internet, 802.11 wireless, and memory cards are added every year. Also, the communication technology a...

Strategic Management in Indian MSMEs- A Literature Review

Large corporations across globe are following strategic management practices to achieve continuous growth. Though size of a business corporation is not a determining factor for strategic approach to business practices,...

“make in india: an allure for multinational Companies (mnCs) in india”

Today India has one of the fast growing economies in the world. It is ranked 2nd amongst the developing nations and is also positioned at higher ranks than Russia, Italy, or UK. India is known for its huge market poten...

Edge Detection and Segmentation of Heart Image

This Paper presents various edge detection methods and segmentation methods. All methods are applied on heart image. All methods and their results are evaluated through standard assessment parameters. Edge Detection Me...

A STUDY ON FOREST RESOURCE MANAGEMENT SYSTEM IN TAMIL NADU

This paper brings out the Forest management has to maintain the stability, natural dynamic, and health of forests. Timber production is a core goal for forest management, but clear cutting, over-harvesting, and selecti...

Download PDF file
  • EP ID EP18090
  • DOI -
  • Views 303
  • Downloads 13

How To Cite

Mr. Rajesh Shrivastava and Deepak Kumar Mehto (2011). slugThe design of a Trusted Authentication scheme for Wimax Network. International Journal of Management, IT and Engineering, 1(6), -. https://europub.co.uk/articles/-A-18090