Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Comparative Analysis of MAC and HMAC-Sha3 using NS-2

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Tanika Gupta, Mehak Aggarwal, Mandeep Kumar
10.5120/ijca2017913059

Tanika Gupta, Mehak Aggarwal and Mandeep Kumar. Comparative Analysis of MAC and HMAC-Sha3 using NS-2. International Journal of Computer Applications 160(6):9-14, February 2017. BibTeX

@article{10.5120/ijca2017913059,
	author = {Tanika Gupta and Mehak Aggarwal and Mandeep Kumar},
	title = {Comparative Analysis of MAC and HMAC-Sha3 using NS-2},
	journal = {International Journal of Computer Applications},
	issue_date = {February 2017},
	volume = {160},
	number = {6},
	month = {Feb},
	year = {2017},
	issn = {0975-8887},
	pages = {9-14},
	numpages = {6},
	url = {http://www.ijcaonline.org/archives/volume160/number6/27076-2017913059},
	doi = {10.5120/ijca2017913059},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Wireless Broadband offers tremendously fast and always on provide internet similar to ADSL and the user free from the fixed access areas and remove the hindrance of fixed access area for users. In order to achieve these features in formalized way was achieved for Wireless LAN and Wireless Metropolitan Area Networks with the advent of IEEE802.16 standards respectively from the beginning. The information is accessible for users in various areas because of that wireless network has become the major focus area as for as security matter is concerned .In this paper, we enhance the security levels by using HMAC in WiMax.

References

  1. Syed Shabih Hasan, Mohammed Abdul Qadeer, “Security concerns in WiMAX”, International Conference on Digital Object Identifier, 2009.
  2. Michel Barbeau, “WiMax/802.16 Threat analysis”, Carleton University, 2005.
  3. Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  4. Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  5. Sannella, M. J. 1994 Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398., University of Washington.
  6. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  7. Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  8. Y.T. Yu, M.F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
  9. Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender

Keywords

Wimax, MAC, HMAC,PHY,CS,