Open Access Open Access  Restricted Access Subscription Access

Security Enhencement & Solution for Authentication Frame Work in IEEE 802.16


Affiliations
1 Chittagong University of Engineering and Technology, India
 

WIMAX- Worldwide Interoperability for Microwave Access is going to be an emerging wireless technology for the future. Wireless networking market is thriving because of increasing popularity of Broad Band internet. Wireless network is not completely secure because of rapid release of new technologies, lack of physical infrastructure and market competition. It is (WiMAX) a new technology; not deployed widely to justify the evidence of threats, risk and vulnerability in real situations. Although authentication process is a key to secure access in wireless network, the security sub layer of IEEE802.16 employs an authenticated client server key management protocol in which the Base Station (Server), controls the distribution of keying materials to the Mobile Station( the client). In this paper, an overview of authentication framework is first discussed and several threats on authentication process is later interrogated. Finally, possible solutions to overcome them are inaugurated.

Keywords

Authentication, PKM, Time Stamp, Hash, Digital Signature, Visual Cryptography.
User
Notifications
Font Size

Abstract Views: 288

PDF Views: 140




  • Security Enhencement & Solution for Authentication Frame Work in IEEE 802.16

Abstract Views: 288  |  PDF Views: 140

Authors

A. K. M. Nazmus Sakib
Chittagong University of Engineering and Technology, India

Abstract


WIMAX- Worldwide Interoperability for Microwave Access is going to be an emerging wireless technology for the future. Wireless networking market is thriving because of increasing popularity of Broad Band internet. Wireless network is not completely secure because of rapid release of new technologies, lack of physical infrastructure and market competition. It is (WiMAX) a new technology; not deployed widely to justify the evidence of threats, risk and vulnerability in real situations. Although authentication process is a key to secure access in wireless network, the security sub layer of IEEE802.16 employs an authenticated client server key management protocol in which the Base Station (Server), controls the distribution of keying materials to the Mobile Station( the client). In this paper, an overview of authentication framework is first discussed and several threats on authentication process is later interrogated. Finally, possible solutions to overcome them are inaugurated.

Keywords


Authentication, PKM, Time Stamp, Hash, Digital Signature, Visual Cryptography.