CFP last date
22 April 2024
Reseach Article

A Security Architecture for WiMAX Networks

by Shahid Hussain, Muhammad Naeem Khan, Muhammad Ibrahim
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 50 - Number 9
Year of Publication: 2012
Authors: Shahid Hussain, Muhammad Naeem Khan, Muhammad Ibrahim
10.5120/7802-0931

Shahid Hussain, Muhammad Naeem Khan, Muhammad Ibrahim . A Security Architecture for WiMAX Networks. International Journal of Computer Applications. 50, 9 ( July 2012), 35-39. DOI=10.5120/7802-0931

@article{ 10.5120/7802-0931,
author = { Shahid Hussain, Muhammad Naeem Khan, Muhammad Ibrahim },
title = { A Security Architecture for WiMAX Networks },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 50 },
number = { 9 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 35-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume50/number9/7802-0931/ },
doi = { 10.5120/7802-0931 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:47:52.571480+05:30
%A Shahid Hussain
%A Muhammad Naeem Khan
%A Muhammad Ibrahim
%T A Security Architecture for WiMAX Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 50
%N 9
%P 35-39
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wimax is one of the fast growing technologies in the world as compare to other wireless networks. IEEE has defined standard IEEE 802. 16 for Wimax. Wimax growing rapidly due to the services it's provides and long range accessibility, but still Wimax facing a lot of security issues and threats like jamming , DDOS , Rogue Base station attack ,Reply Attack and so on. Wimax furnish different security mechanism for unauthorized access ,Encryption, Authentication etc. and several security architecture , mechanism areproposed. But still Wimax is under attack like Rogue Base station Attack And Reply Attack. so in this paper we proposed a new and unique security model and Encryption technique on the basis of existing model to secure Wimax from Rogue Base station Attack and reply attack. We perform the simulation through NS-2

References
  1. Sanjay P. Ahuja, Nicole Collier, "An Assessment of Wimax Security", Communications and Network , May 2010.
  2. Deepti,Deepika Khokhar, Satinder Pal Ahuja," A Survey of Rogue Base station Attack In Wimax /IEEE802. 16", International Journal of Advanced Research in Computer Science and Software Engineering,2012.
  3. Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen, Secure Network Authentication Protocol (ISNAP) for IEEE802. 16" International Conference on Information and Communication Technologies, 2009. ICICT '09. IEEE 2009
  4. Mahmoud Nasrel din,HebaAslanMagdy E Hennawy Adel El-Hennawy,"WiMax Security", 22nd International Conference on Advanced Information Networking and Applications Workshops IEEE 2008.
  5. Ergang Liu, Kaizhi Huang and Liang Jin,"The Design of Trusted Access Scheme Based On Identity For WiMAX Network", First International Workshop on Education Technology and Computer Science IEEE 2009.
  6. Masood Habib, Tahir Mehmood, Fasee Ullah, Muhammad Ibrahim,"Performance of Wimax Security Algorithm", International Conference on Computer Technology and Development IEEE 2009.
  7. Lang Wei-min, Wu Run-sheng, Wang jian-qiu,"A Simple Key Management Scheme based on Wimax", International Symposium on Computer Science and Computational Technology IEEE 2008.
  8. Perumalraja Rengaraju ,Chung-Horng Lung, Anand Srinivasan"Design of Distributed Security Architecture for Multi hop Wimax Networks", Eighth Annual International Conference on Privacy, Security and Trust IEEE 2010.
  9. Pranita K. Gandhewar, Kapil N. Hande," Performance Improvement of IEEE 802. 16 Wimax", (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3) , 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication Authorization EAP RSA ECC(Elliptic curve cryptograph) Rogue Base station