CFP last date
22 July 2024
Reseach Article

IPSec Provisioning in WiMAX Networks to Enhance the Security

Published on April 2012 by S. Rimlon Shibi, M. Kaliappan, L. Jerart Julus
International Conference in Recent trends in Computational Methods, Communication and Controls
Foundation of Computer Science USA
ICON3C - Number 7
April 2012
Authors: S. Rimlon Shibi, M. Kaliappan, L. Jerart Julus

S. Rimlon Shibi, M. Kaliappan, L. Jerart Julus . IPSec Provisioning in WiMAX Networks to Enhance the Security. International Conference in Recent trends in Computational Methods, Communication and Controls. ICON3C, 7 (April 2012), 6-12.

author = { S. Rimlon Shibi, M. Kaliappan, L. Jerart Julus },
title = { IPSec Provisioning in WiMAX Networks to Enhance the Security },
journal = { International Conference in Recent trends in Computational Methods, Communication and Controls },
issue_date = { April 2012 },
volume = { ICON3C },
number = { 7 },
month = { April },
year = { 2012 },
issn = 0975-8887,
pages = { 6-12 },
numpages = 7,
url = { /proceedings/icon3c/number7/6049-1050/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Proceeding Article
%1 International Conference in Recent trends in Computational Methods, Communication and Controls
%A S. Rimlon Shibi
%A M. Kaliappan
%A L. Jerart Julus
%T IPSec Provisioning in WiMAX Networks to Enhance the Security
%J International Conference in Recent trends in Computational Methods, Communication and Controls
%@ 0975-8887
%N 7
%P 6-12
%D 2012
%I International Journal of Computer Applications

The IEEE 802. 16 (or) Worldwide Interoperability for Microwave Access (WiMAX) [7] is a standards-based technology enabling the delivery of last mile wireless broadband access with quality of service (QoS) guarantees, security, and mobility. For security in WiMAX the privacy sub layer of the MAC layer has the main objective to protect service providers against theft of service but not securing network users [12]. It is obvious that the privacy sub layer only secures data at the data link layer, but it does not ensure complete encryption of user data. To secure the networks, the IPSec protocol may be the most effective and suitable protocol to secure end-to-end network layer communication [2]. In the current scenario, existing method do not provide security level for end to end communications. The security algorithms namely TWOFISH [5] and BLOWFISH [26] are to encrypt the packets with best security levels for end to end communications. Analyses are done between these two algorithms with the existing encryption algorithms, from that TWOFISH is the best security algorithm and BLOWFISH is the fastest algorithm.

  1. Dr. S. A. M Rizvi, Dr. Syed Zeeshan Hussain, "Performance Analysis of AES and TwoFish Encryption Schemes", Commn Sys & Network Tech's, IEEE, 2011.
  2. Xenakis, N. Laoutaris, L. Merakos and I. Stavrakakis, "A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms", Elsevier Computer Networks, 2006 .
  3. Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic. "Distinguisher and Related-Key Attack on the Full AES-256", University of Luxembourg, 2009.
  4. Trung Nguyen,Prof. Raj Jain, "A survey of WiMAX security threats", www1. cse. wustl. edu/ jain/cse571-09/ftp/wimax2/index. html, 2010.
  5. Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson, "Twofish: A 128-Bit Block Cipher", Counterpane Systems, 2000.
  6. Aamer Nadeem, Dr M. Younus Javed, "A Performance Comparison of Data Encryption Algorithms", IEEE 2005.
  7. Rakesh Kumar Jha, D Dalal et al, "A Journey on WiMAX and its Security Issues", IJCSIT, Vol. 1 (4), 2010.
  8. Mathieu Lacage, "Experimentation with ns-3", Trilogy Summer School, 27th august 2009.
  9. NS-3 Overview, "www. nsnam. org ns-3 Tutorial" Release ns-3. 13, Dec' 2011.
  10. Elias Weingrtner, Hendrik vom Lehn and Klaus Wehrle, "A performance comparison of recent network simulators", RWTH Aachen University,2009.
  11. Naganand Doraswamy, Dan Harkins, "IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks", Prentice Hall PTR, , 2003.
  12. Ibikunle F. A. , Jamshed hasan, "Security Issues in Mobile WiMAX (802. 16e)", Mobile WiMAX Symposium, pp. 117 – 122, 2009.
  13. Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger, "Biclique Cryptanalysis of the Full AES", in 2011 Cryptology conference in Santa Barbara, California.
  14. D. S. Abdul. Elminaam et al. ,"Performance Evaluation of Symmetric Encryption Algorithms", Communications of the IBIMA, Vol 8, 2009.
  15. Víctor A. Villagra, "Security Architecture for the Internet Protocol: IPSEC", DIT-UPM, 2002.
  16. E. B. Fernandez and M. VanHilst, ''An overview of WiMAX security,'' in WiMAX Standards and Security, M. Ilyas, Ed. Boca Raton, CRC Press, 2008, pp. 197–204.
  17. C. Eklund and S. Wang, et al. , ''IEEE standard 802. 16: A technical overview of the WirelessMANTM air interface for broadband wireless access,'' IEEE Commun. Mag. , vol. 40, no. 6, pp. 98–107, June 2002.
  18. J. Daemen and V. Rijmen, "The Design of Rijndael". Secaucus, NJ: Springer-Verlag, 2002.
  19. Y. Zhang and H. -H. Chen, Mobile WiMAX toward Broadband Wireless Metropolitan Area Networks. New York: Auerbach, 2008.
  20. S. L. Tsao and Y. L. Chen, ''Mobility management in mobile WiMAX,'' in Wireless Metropolitan Area Networks, Y. Zhang and H. -H. Chen, Eds. New York: Auerbach, 2007, pp. 220–232.
  21. O. Elkeelany et al. , Performance analysis of IPsec protocol: encryption and authentication, In: IEEE Communications Conference (ICC 2002), 2002, pp. 1164–1168.
  22. S. Kent, R. Atkinson, Security Architecture for the Internet Protocol, RFC 2401, November 1998.
  23. S. Kent, R. Atkinson, IP Authentication Header, RFC 2402, November 1998.
  24. S. Kent, R. Atkinson, IP Encapsulating Security Payload (ESP), RFC 2406, November 1998.
  25. W. Stallings, ''Cryptography and Network Security 4th Ed,'' Prentice Hall , 2005,PP. 58-309 .
  26. Bruce Schneier. "The Blowfish Encryption Algorithm" Retrieved October 25, 2008, http://www. schneier. com/blowfish. html.
  27. M. Barbeau, "WiMAX/802. 16 threat analysis," in Proceedings of 1st ACM international workshop on Quality of service in wireless and mobile networks, Quebec, June 2005 .
  28. Mahmoud Narsreldin, Heba Aslan, "Wimax security," in 22nd International Conference on Advanced Information Networking and Applications, 2008, pp. 1335–1340.
  29. W. C. Taeshik Shon, "An analysis of mobile wimax security: Vulnerabilities and solutions," in Lecture notes in computer science, Springer, 2007.
  30. S. Z. S. Idrus, et al. ,, ''Performance Analysis of Encryption Algorithms Text Length Size on Web Browsers, '' IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 1, January 2008, PP 20-25.
  31. Dieter Schmidt, "Kameichel, anextension of Blowfish for 64-bit architectures", September 30,2006.
  32. Diaa Salama Abd Elminaam, et al. , "Evaluating the Performance of Symmetric Encryption Algorithms" International Journal of Network Security, Vol. 10, No. 3, PP. 213 {219, May 2010.
  33. Amit Soni, Harish Karnick and Manindra Agarwal, "Learning encryption algorithms from ciphertext", IIT Kanpur, Department of Computer Science and Engineering, 2009.
  34. A. Murat Fiskiran and Ruby B. Lee, "Performance Impact of Addressing Modes on Encryption Algorithms", 2001 IEEE.
  35. Othmar Kyas, "Mobile Wimax For Networks With Enhanced Security And Reliability Requirements", Tektronix 4/2007 IEEE.
  36. B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz. Extensible authentication protocol (EAP). The Internet Engineering Task Force - Request for Comments: 3748, June 2004.
  37. Mohammad Ahmed Alomari, Khairulmizam Samsudin and Abdul Rahman Ramli, "A Study On Encryption Algorithms And Modes For Disk Encryption", 2009 International Conference on Signal Processing Systems, IEEE.
  38. WiMAX Forum: WiMAX End-to-End Network Systems Architecture (Stage 3: Detailed Protocols and Procedures) Release 1, V. 1. 3. 0, 2008.
Index Terms

Computer Science
Information Sciences


Cryptographic Algorithms Encryption Ipsec Network Layer.