Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

A Security Architecture for WiMAX Networks

International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 50 - Number 9
Year of Publication: 2012
Shahid Hussain
Muhammad Naeem Khan
Muhammad Ibrahim

Shahid Hussain, Muhammad Naeem Khan and Muhammad Ibrahim. Article: A Security Architecture for WiMAX Networks. International Journal of Computer Applications 50(9):35-39, July 2012. Full text available. BibTeX

	author = {Shahid Hussain and Muhammad Naeem Khan and Muhammad Ibrahim},
	title = {Article: A Security Architecture for WiMAX Networks},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {50},
	number = {9},
	pages = {35-39},
	month = {July},
	note = {Full text available}


Wimax is one of the fast growing technologies in the world as compare to other wireless networks. IEEE has defined standard IEEE 802. 16 for Wimax. Wimax growing rapidly due to the services it's provides and long range accessibility, but still Wimax facing a lot of security issues and threats like jamming , DDOS , Rogue Base station attack ,Reply Attack and so on. Wimax furnish different security mechanism for unauthorized access ,Encryption, Authentication etc. and several security architecture , mechanism areproposed. But still Wimax is under attack like Rogue Base station Attack And Reply Attack. so in this paper we proposed a new and unique security model and Encryption technique on the basis of existing model to secure Wimax from Rogue Base station Attack and reply attack. We perform the simulation through NS-2


  • Sanjay P. Ahuja, Nicole Collier, "An Assessment of Wimax Security", Communications and Network , May 2010.
  • Deepti,Deepika Khokhar, Satinder Pal Ahuja," A Survey of Rogue Base station Attack In Wimax /IEEE802. 16", International Journal of Advanced Research in Computer Science and Software Engineering,2012.
  • Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen, Secure Network Authentication Protocol (ISNAP) for IEEE802. 16" International Conference on Information and Communication Technologies, 2009. ICICT '09. IEEE 2009
  • Mahmoud Nasrel din,HebaAslanMagdy E Hennawy Adel El-Hennawy,"WiMax Security", 22nd International Conference on Advanced Information Networking and Applications Workshops IEEE 2008.
  • Ergang Liu, Kaizhi Huang and Liang Jin,"The Design of Trusted Access Scheme Based On Identity For WiMAX Network", First International Workshop on Education Technology and Computer Science IEEE 2009.
  • Masood Habib, Tahir Mehmood, Fasee Ullah, Muhammad Ibrahim,"Performance of Wimax Security Algorithm", International Conference on Computer Technology and Development IEEE 2009.
  • Lang Wei-min, Wu Run-sheng, Wang jian-qiu,"A Simple Key Management Scheme based on Wimax", International Symposium on Computer Science and Computational Technology IEEE 2008.
  • Perumalraja Rengaraju ,Chung-Horng Lung, Anand Srinivasan"Design of Distributed Security Architecture for Multi hop Wimax Networks", Eighth Annual International Conference on Privacy, Security and Trust IEEE 2010.
  • Pranita K. Gandhewar, Kapil N. Hande," Performance Improvement of IEEE 802. 16 Wimax", (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3) , 2011.