CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Solution Against DoS Attacks In WiMAX Using Visual Cryptography

Published on None 2011 by Arathi S.G, Pramod G
journal_cover_thumbnail
International Conference on VLSI, Communication & Instrumentation
Foundation of Computer Science USA
ICVCI - Number 9
None 2011
Authors: Arathi S.G, Pramod G
47d31217-cbcd-4fb8-9cf9-d186a5b34838

Arathi S.G, Pramod G . A Solution Against DoS Attacks In WiMAX Using Visual Cryptography. International Conference on VLSI, Communication & Instrumentation. ICVCI, 9 (None 2011), 30-35.

@article{
author = { Arathi S.G, Pramod G },
title = { A Solution Against DoS Attacks In WiMAX Using Visual Cryptography },
journal = { International Conference on VLSI, Communication & Instrumentation },
issue_date = { None 2011 },
volume = { ICVCI },
number = { 9 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 30-35 },
numpages = 6,
url = { /proceedings/icvci/number9/2696-1386/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on VLSI, Communication & Instrumentation
%A Arathi S.G
%A Pramod G
%T A Solution Against DoS Attacks In WiMAX Using Visual Cryptography
%J International Conference on VLSI, Communication & Instrumentation
%@ 0975-8887
%V ICVCI
%N 9
%P 30-35
%D 2011
%I International Journal of Computer Applications
Abstract

Security has always been a great concern for the networks and telecommunication operators and customers. For wireless systems, security support is even more important to protect the users as well as the network. Since wireless medium is available to all, the attackers can easily access the network and the network becomes more vulnerable for the user and the network service provider. An analysis on WiMAX security reveals the existence of mainly two kinds of vulnerabilities namely man-in-the-middle vulnerabilities and the DoS vulnerabilities. Almost all the DoS vulnerabilities in Mobile WiMAX standard are due to unauthenticated or unencrypted management messages. A possible solution to the DoS vulnerability is to authenticate as many management messages as possible. A technique using visual cryptography is being proposed here for this purpose. Visual cryptography basically involves secret sharing with images. The idea of visual cryptography is being extended to visual authentication and identification. The idea is to use a simple (2, 2) visual secret sharing scheme creating two shares of the secret. Both parties share a secret in the form of an image. The proposed method is used for the authentication in management frames. This method is compared with the conventional method for authentication and finally the merits and demerits of the proposed method are analyzed.

References
  1. A Novel Approach against DoS Attacks in WiMAX Authentication using Visual Cryptography-Ayesha Altaf, Rabia Sirhindi, Attiq Ahmed.
  2. Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions-Tao Han, Ning Zhang, Kaiming Liu, Bihua Tang, Yuan'an Liu.
  3. WiMAX Security Analysis and Enhancement-Muhammad Sakibur Rahman, Mir Md. Saki Kowsar.
  4. Security Issues in Mobile WiMAX (IEEE 802.16e)-Frank, A Ibikunle.
  5. Vulnerabilities Exposing IEEE 802.16e Networks To DoS Attacks: A Survey- Sheraz Naseer, Dr. Muhammad Younus and Attiq Ahmed.
  6. Karen Scarfone, Cyrus Tibbs, Matthew S-“Guide to Security for WiMAX Technologies (Draft) - Recommendations of the National Institute of Standards and Technology”.
  7. Dr. Kitti Wongthavarawat “IEEE 802.16 WiMAX Security” Presented at 17th Annual FIRST Conference, Singapore, July 1, 2005.
  8. FIPS pub 186-1 Federal Information Processing Standards Publication 1998 December 15 Digital Signature Standard (DSS).
  9. http://www.slideshare.net/valicac/visual-cryptography.
  10. WiMAX Security and Quality of Service: An End-to-End Perspective By Seok-Yee Tang, Peter Müller, Hamid Sharif.
  11. Visual Authentication and Identification: Moni Naor, Adi Shamir, Advances in Cryptology Eurocrypt ’97, LNCS Springer Berlin, 1997.
  12. Visual Cryptography: Moni Naor, Benny Pinkas, Advances in Cryptology Eurocrypt ’94, LNCS Springer Berlin, 1994.
Index Terms

Computer Science
Information Sciences

Keywords

DoS attacks Visual Cryptography Digital Signature