CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Survey of Security Threats and Authentication Schemes in WiMAX

by Parampreet Singh, Jyotsna Sengupta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 23
Year of Publication: 2013
Authors: Parampreet Singh, Jyotsna Sengupta
10.5120/12108-8162

Parampreet Singh, Jyotsna Sengupta . A Survey of Security Threats and Authentication Schemes in WiMAX. International Journal of Computer Applications. 69, 23 ( May 2013), 1-5. DOI=10.5120/12108-8162

@article{ 10.5120/12108-8162,
author = { Parampreet Singh, Jyotsna Sengupta },
title = { A Survey of Security Threats and Authentication Schemes in WiMAX },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 23 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number23/12108-8162/ },
doi = { 10.5120/12108-8162 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:31:04.854423+05:30
%A Parampreet Singh
%A Jyotsna Sengupta
%T A Survey of Security Threats and Authentication Schemes in WiMAX
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 23
%P 1-5
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

WiMAX networks have advantages over the wired network, such as convenience, mobility, and flexibility. The security concerns in this network may prevent its further widespread adoption. Hence, improving the security of WiMAX is of considerable importance. In WiMAX networks by providing security features like authentication, authorization and encryption. The absence of proper authentication mechanism can lead to many threats like denial of service, masquerading and attacks on the authentication protocol. Authentication is the most difficult from the perspective of network security; hence, various forms and threats related to authentication are needed to be studied. The aim of this paper is to study the various authentication schemes such as RSA, EAP and HMAC.

References
  1. Adibi, S. ; Bin Lin; Pin-Han Ho; Agnew, G. B. Erfani,S. 2006. Authentication, Authorization and Accounting (AAA) Schemes in WiMAX. IEEE International Conference on Electro/information Technology, 210-215.
  2. Chiornita, Alexandra; Gheorghe, Laura; Rosner, Daniel. 2010. A Practical Analysis of EAP Authentication Method. 9th Roedunet International Conference, 31-35.
  3. Eren, E. 2007. WiMAX Security Architecture–Analysis and Assessment. 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications,673-677.
  4. Hasan S. S. , Qadeer M. A. 2005. Security Concerns in WiMAX. First Asian Himalayas International Conference onInternet.
  5. Hashmi, R. M. ; Siddiqui, A. M. ; Jabeen, M. ; Alimgeer, K. S. 2011. Towards Secure Wireless MAN: Revisiting and Evaluating Authentication in WiMAX. International Conference on Computer Networks and Information Technology, 165 - 173.
  6. Jacobs, S. 2011. WiMAX subscriber and mobile station authentication challenges. IEEE Communications Magazine, 166-172.
  7. Komu, Beth N. ; Mzyece, Mjumo; Djouani, Karim. 2012. SPIN-based Verification of Authentication Protocols in WiMAX Networks. IEEE Vehicular Technology Conference, 1-5.
  8. Lang Wei-min; Zhong Jing-li; Li Jian-jun; Qi Xiang-yu. 2008. Research on the Authentication Scheme of WiMAX. 4th International Conference on Wireless Communications, Networking and Mobile Computing, 1-4.
  9. Mei Song; Li Wang; Jianwen Huang; Junde Song. 2009. An Optimal Interworking Authentication Scheme Based on Eap-Aka forHeterogeneous Access Networks. Canadian Conference on Electrical and Computer Engineering, 794-797.
  10. Michail, H. E. ; Kakarountas, A. P. ; Milidonis, A. ; Goutis, C. E. 2004. Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function. 11th IEEE International Conference on Electronics, Circuits and Systems, 567-570.
  11. Nasreldin, M. ; Asian, H. ; El-Hennawy, M. ; El-Hennawy, A. 2008. WiMAX Security. 22nd International Conference on Advanced Information Networking and Applications-Workshops, 1335-1340.
  12. Sridevi, B. ; Brindha, M. ; Umamaheswari, R. ; Rajaram, S. 2012. Implementation of secure and cost effective authentication process in IEEE 802. 16e WiMAX. International Journal of Distributed and Parallel Systems, Vol. 3:No. 2.
  13. Trung Nguyen: A survey of WiMAX security threats,Available: http://www. cse. wustl. edu/~jain/cse571-09/ftp/wimax2. pdf, April 2009.
  14. Wongthavarawat K. 2005. IEEE 802. 16 WiMAX Security. Annual FIRST Conference, Singapore.
  15. Yi Xiaolin; Chen Nanzhong; JiaZhigang; Chen Xiaobo 2010. Trusted Communication System based on RSA Authentication. Second International Workshop on Education Technology and Computer Science, Vol. 1, 329-332.
  16. Yi Yang;Rui Li. 2009. Toward WiMAX Security. International Conference on Computational Intelligence and Software Engineering, 1-5.
  17. Ziyi You;XiaoyaoXie; WeihongZheng. 2010. Verification and research of a WiMAX authentication protocol based on SSM. 2nd International Conference on Education Technology and Computer, Vol. 5, 234-238.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless network WiMAX 802. 16.