CFP last date
22 April 2024
Reseach Article

Investigation of Internet Key Exchange (IKE) in terms of Traffic Security with Gateway Security (GSE) In WiMAX Network

Published on December 2011 by Rakesh Kumar Jha, Wankhede Vishal A, Upena D Dalal
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 1
December 2011
Authors: Rakesh Kumar Jha, Wankhede Vishal A, Upena D Dalal
c2a4ba22-e5f8-448b-be8c-1ab7af051fee

Rakesh Kumar Jha, Wankhede Vishal A, Upena D Dalal . Investigation of Internet Key Exchange (IKE) in terms of Traffic Security with Gateway Security (GSE) In WiMAX Network. Network Security and Cryptography. NSC, 1 (December 2011), 59-66.

@article{
author = { Rakesh Kumar Jha, Wankhede Vishal A, Upena D Dalal },
title = { Investigation of Internet Key Exchange (IKE) in terms of Traffic Security with Gateway Security (GSE) In WiMAX Network },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 1 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 59-66 },
numpages = 8,
url = { /specialissues/nsc/number1/5918-spe053t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Network Security and Cryptography
%A Rakesh Kumar Jha
%A Wankhede Vishal A
%A Upena D Dalal
%T Investigation of Internet Key Exchange (IKE) in terms of Traffic Security with Gateway Security (GSE) In WiMAX Network
%J Network Security and Cryptography
%@ 0975-8887
%V NSC
%N 1
%P 59-66
%D 2011
%I International Journal of Computer Applications
Abstract

In this paper, we identify and study a novel approach to secure WiMAX network for IKE (Investigation of internet key exchange) in terms of traffic security with the help of gateway security (GSE).Propose work has been applied on Location based network and we have observed the performance analysis of this attack on both type of network possible in WiMAX i.e Packet CS and ATM CS networks. We have done investigation on ASN-GW security with AES, 3 DES and MD5.IPSec is the primary Protocol use in wireless for traffic protection between the communicating entities. It operates on Network Layer and provides protection IP Datagram by encapsulating it into ESP tunnel. In security architecture there are security sublayer for data exchange between the MAC layer and PHY layer. There is no any security Layer has been provided between (ASN and BS) Network Layer/ IP Layer to application layer so this area is still a good for Research for security issues in WiMAX. We have proposed on Gateway security (GSE). In last phase we have given performance comparison between all four conditions with four scenarios. Analysis based on network simulation tool OPNET Modeler 14.5.

References
  1. Md. Rezaul Karim Siddiqui, Sayed Mohammad Atiqur Rahman, “Security analysis of the WiMAX technology in Wireless Mesh networks”, Thesis from Blekinge Institute of Technology (BTH), Karlskrona, Sweden, 2009, pp 42-46
  2. ILYAS, S. A, “WiMAX Standards and Security”, 2008. London: CRC Press.
  3. Jeffrey G. Andrews, Arunabha Ghosh, Rias Muhammad, “Fundamentals of WiMAX Understanding Broadband Wireless Networking, 2007
  4. Seok-Yee Tang, “WiMAX Security and Quality of Service an End-to-End Prospective”, 2010
  5. Rakesh jha,Upena D Dalal, “Location Based Performance of WiMAX Network for QoS with Optimal Base Stations (BS)”Wireless engineering and Technology(WET) journal by scientific research, Vol. 2, No.3, PP.135-145, July 2011
  6. Rakesh Jha, Upena D Dalal, “Security Analysis of WiMAX Network: With Misbehavior Node Attack” 2011 World Congress on Information and Communication Technologies, WICT-2011, IEEE Xplore, pp-397-404, Dec 2011
  7. Rakesh Jha, Upena D Dalal,“ WiMAX System Simulation and Performance Analysis under the Influence of Jamming”, Scientific Journal, Volume -1,No-1,July 2010, pp-20-26
Index Terms

Computer Science
Information Sciences

Keywords

WiMAX Security Analysis IKE GSE Packet CS ATM CS AES MD5 RSA Signature OPNET Modeler IKE GSE Packet CS ATM CS AES MD5 RSA Signature OPNET Modeler