Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Securing Bandwidth Request Messages in Wimax

Print
PDF
International Journal of Computer Applications
© 2011 by IJCA Journal
Volume 33 - Number 3
Year of Publication: 2011
Authors:
Kaushik Adhikary
Rajinder Kumar
Amit Kumar
10.5120/3997-5661

Kaushik Adhikary, Rajinder Kumar and Amit Kumar. Article: Securing Bandwidth Request Messages in Wimax. International Journal of Computer Applications 33(3):1-5, November 2011. Full text available. BibTeX

@article{key:article,
	author = {Kaushik Adhikary and Rajinder Kumar and Amit Kumar},
	title = {Article: Securing Bandwidth Request Messages in Wimax},
	journal = {International Journal of Computer Applications},
	year = {2011},
	volume = {33},
	number = {3},
	pages = {1-5},
	month = {November},
	note = {Full text available}
}

Abstract

Privacy, confidentiality and authentication are the issues which are been focused by the security sublayer which is defined in the IEEE 802.16 standard. WiMAX which is the Wireless Interoperability for Microwave Access is the latest technology for Wireless Communication. It has been developed to replace DSL/fibre cable. It has been developed to provide ‘last mile’ broadband connectivity to home or business location. The IEEE 802.16 has many flaws in its security which has led to various vulnerabilities. One of the vulnerability which has been detected by us is the bandwidth request messages. This paper analyses the attacks which can be carried on the bandwidth request messages, its effect on the performance and the suitable solution to counter this attack.

Reference

  • Hunglin Zhou, Wi-Fi Task Group Current Status, http://lee-1.com/hlchou/ 1 WiFi_ TaskGroup_ Meeting_ok.ppt
  • WiMAX FAQs,http://www.unwiremycity.com/arc hives /2005/09/wimax _faqs 1I.html
  • IEEE 802.11, Wireless Local Area Networks (WAN's), The student reports, The Hebrew University of Jerusalem
  • The Extensible Authentication Protocol, From Wikipedia, the free encyclopedia
  • WiMAX Technology,www.hifn.com/docs/WiMA X _AB_1.4.pdf
  • JunHyuk Song, Yong Chang, Privacy Sublayer Clean Up, http://www.ieee802.org/ 16/tge/contrib/C80216e- 04 521rl.pdf
  • Fabian Andre Perez, Security in Current Commercial Wireless Networks: A Survey, http://www.csociety.org/perez/WirelessSurvey.pdf
  • G. Schafer, A. Festag, H. Karl, Current Approa- ches to Authentication in Wireless and Mobile Communications Networks, http://www.tkn.tu- berlin.de/ publications/papers/ tkno 1_002.pdf