The design of a Trusted Authentication scheme for Wimax Network

Abstract

As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks in. IEEE802.16 provides a security sublayer in the MAC layer to address the privacy issues across the fixed BWA (Broadband Wireless Access). In this paper, we first overview the IEEE802.16 standard, and then investigate possible attacks on the basic PKMprotocol in IEEE802.16. We also give possible solutions to counter those attacks.

Authors and Affiliations

Mr. Rajesh Shrivastava and Deepak Kumar Mehto

Keywords

Related Articles

Role of ICT for Record Management in the Wake of RTI Act

Right to Information (RTI) for accessing official information is one of the powerful tools bestowed to every citizen of India. It is a unique example in the developing world especially in the country with a population...

Challenges and Opportunities of Technology Transfer Management

Today, technology has become so rich that many of the developing countries can , t even afford to have all the facilities, It is admitted that these changes and takeovers affected economical, industrial, security, tech...

IMPLEMENTATION OF IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT INSERTION TECHNIQUE

Transferring information on internet or on any public network is very common now-a-days. However I is not a secure mean of transformation for transmitting any important information. Anyone can hack, peek or copy the in...

A Comparative study of the Relationships between Multiple Intelligences and General Self Efficacy among Public and Private Organizations in Maragheh

Multiple Intelligences is closely related to the organizational affairs. By developing Multiple Intelligences and studying its effects on General Self-Efficacy we will have employees more compatible in every sophistica...

Effect of media on Cognitive Dissonance among Rural and Urban Adolescents.

The study was conducted to find the relationship, between media and cognitive dissonance, at high school level. Furthermore to test, whether, the urban teenagers had exhibited cognitive dissonance as compared to the ru...

Download PDF file
  • EP ID EP26513
  • DOI -
  • Views 357
  • Downloads 10

How To Cite

Mr. Rajesh Shrivastava and Deepak Kumar Mehto (2011). The design of a Trusted Authentication scheme for Wimax Network. International Journal of Engineering, Science and Mathematics, 1(6), -. https://europub.co.uk/articles/-A-26513