Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Mutual authentication between base and subscriber station can improve the security of IEEE 802.16 Wimax network.
Mohammad Zavid Parvez, Mohammad Hossain, Mohammad Hamidul Islam
Pages - 292 - 301 | Revised - 01-09-2011 | Published - 05-10-2011
Published in International Journal of Engineering (IJE)
MORE INFORMATION
KEYWORDS
WiMax, Authentication, Base station, Broadband connection, Security
ABSTRACT
High throughput broadband connection over long distance is greatly demanded in the present web application. IEEE 802.16/WiMax technology is one of the latest additions on internet broadband. When wireless devices are connected to the broadband wireless access, security comes on the front line to ensure the communication safe and protected from any kind of attacks or threats. Strong and effective security must be confirmed to make the wireless environment reliable and risk less. Base station authentication is an important part of WiMax security which must be confirmed to make the environment more secure. This paper derived the technique to secure the environment by confirming the authentication of base station.
1 | Hossain, M., Muslima, U., & Islam, H. (2015). Security Analysis of Wireless Sensor Network. network, 2(1). |
2 | Chen, C. T. (2013). Improved efficient authentication scheme with anonymity in global mobility networks. International Journal of Innovative Computing, Information, and Control, 9(8), 3319-3339. |
Derrick D. Boom “Denial of Service Vulnerabilities in IEEE 802.16 Wireless Networks” IEEE C802.16e-04/406. | |
Frank Ohrtman, WiMAX Handbook, building 802.16 WiMAX networks, McGraw-Hill 2005. | |
Hyung-Joon Kim, IEEE 802.16/WiMax Security, Dept. of Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, New Jersey, Unpublished. | |
Jamshed Hasan, School of Computer and Information Science, Edith Cowan University, Australia Security Issues of IEEE 802.16 (WiMax), http://scissec.scis.ecu.edu.au/conference_proceedings/2006/aism/Hasan%20- %20Security%20Issues%20of%20IEEE%20802.16%20(WiMAX).pdf. | |
Kejie Lu and Yi Qian, University of Puerto rico, Hsiao-Hwa Chen, National Sun Yat-Sen University. A Secure and Service-Oriented Network Control Framework for WiMax Networks, IEEE Communications Magazine, May 2007. | |
Loutfi Nuaymi, WiMAX Technology for Broadband Wireless Access, John Wiley & Son Ltd. | |
Mahmoud Nasreldin, Heba Aslan, Magdy El-Hennawy, Adel El- Hennawy. WiMax Security, 22nd International Conference on Advanced Information Networking and Applications Workshops 2008, p. 1335- 1340. | |
Michel Barbeau, School of Computer Science, Carleton University, Canada. WiMax Threat Analysis, Q2SWinet’05, October 13, 2005, Montreal, Quebec, Canada. | |
Mr. Mohammad Zavid Parvez
- Denmark
Mr. Mohammad Hossain
University of Information Technology and Sciences (UITS), Bangladesh - Bangladesh
reganmh8@gmail.com
Mr. Mohammad Hamidul Islam
- Sweden
|
|
|
|
View all special issues >> | |
|
|