CFP last date
22 April 2024
Reseach Article

Securing Bandwidth Request Messages in Wimax

by Kaushik Adhikary, Rajinder Kumar, Amit Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 33 - Number 3
Year of Publication: 2011
Authors: Kaushik Adhikary, Rajinder Kumar, Amit Kumar
10.5120/3997-5661

Kaushik Adhikary, Rajinder Kumar, Amit Kumar . Securing Bandwidth Request Messages in Wimax. International Journal of Computer Applications. 33, 3 ( November 2011), 1-5. DOI=10.5120/3997-5661

@article{ 10.5120/3997-5661,
author = { Kaushik Adhikary, Rajinder Kumar, Amit Kumar },
title = { Securing Bandwidth Request Messages in Wimax },
journal = { International Journal of Computer Applications },
issue_date = { November 2011 },
volume = { 33 },
number = { 3 },
month = { November },
year = { 2011 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume33/number3/3997-5661/ },
doi = { 10.5120/3997-5661 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:19:08.259581+05:30
%A Kaushik Adhikary
%A Rajinder Kumar
%A Amit Kumar
%T Securing Bandwidth Request Messages in Wimax
%J International Journal of Computer Applications
%@ 0975-8887
%V 33
%N 3
%P 1-5
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Privacy, confidentiality and authentication are the issues which are been focused by the security sublayer which is defined in the IEEE 802.16 standard. WiMAX which is the Wireless Interoperability for Microwave Access is the latest technology for Wireless Communication. It has been developed to replace DSL/fibre cable. It has been developed to provide ‘last mile’ broadband connectivity to home or business location. The IEEE 802.16 has many flaws in its security which has led to various vulnerabilities. One of the vulnerability which has been detected by us is the bandwidth request messages. This paper analyses the attacks which can be carried on the bandwidth request messages, its effect on the performance and the suitable solution to counter this attack.

References
  1. Hunglin Zhou, Wi-Fi Task Group Current Status, http://lee-1.com/hlchou/ 1 WiFi_ TaskGroup_ Meeting_ok.ppt
  2. WiMAX FAQs,http://www.unwiremycity.com/arc hives /2005/09/wimax _faqs 1I.html
  3. IEEE 802.11, Wireless Local Area Networks (WAN's), The student reports, The Hebrew University of Jerusalem
  4. The Extensible Authentication Protocol, From Wikipedia, the free encyclopedia
  5. WiMAX Technology,www.hifn.com/docs/WiMA X _AB_1.4.pdf
  6. JunHyuk Song, Yong Chang, Privacy Sublayer Clean Up, http://www.ieee802.org/ 16/tge/contrib/C80216e- 04 521rl.pdf
  7. Fabian Andre Perez, Security in Current Commercial Wireless Networks: A Survey, http://www.csociety.org/perez/WirelessSurvey.pdf
  8. G. Schafer, A. Festag, H. Karl, Current Approa- ches to Authentication in Wireless and Mobile Communications Networks, http://www.tkn.tu- berlin.de/ publications/papers/ tkno 1_002.pdf
Index Terms

Computer Science
Information Sciences

Keywords

WiMAX PKM Bandwidth Request Message Denial-of service attack