Performance Analysis of Secured Privacy and Key Management Protocol in IEEE 802-16e-2005

نویسندگان

  • Ayesha Altaf
  • M. Younus Javed
  • Sheraz Naseer
  • Aisha Latif
چکیده

Security is always the core focus for the researchers. Mobile WiMAX (World wide interoperability for Microwave Access) comes in 2005 and currently adopted by many organizations for broadband access. In this paper different security aspects for Mobile WiMAX or IEEE 802.16e-2005 has been analyzed. Numerous and diverse attacks related to authorization key distribution are a direct consequence of the existing susceptibilities in IEEE802.16e-2005. So security enhancement against these attacks and provision of proper authentication to SS (Subscriber Station) is the foremost necessity in mobile network. OMNET++ simulator is used to simulate and verify the proposed solution. The scenario is verified against different attacks and shows the results in scalar and vector output graphs. The results show the proposed solution's suitability against prone environment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Enhancement of WEP Protocol IEEE 802 . 11 b with Dynamic Key Management

Wireless network security has become a strong requirement for effective deployment of wireless communication applications. There are obviously some reasons for users who like to use wireless technology because of its various benefits. However, as the attacks against WLANs are easier than LAN, the security architectures in WLANs have been discussed frequently. In this paper, the vulnerabilities ...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

Performance Analysis of Vertical Handover between Heterogeneous Networks

For the development of the 4G wireless networks the design of seamless and efficient Vertical handovers is an essential issue. Next generation wireless communications will likely rely on integrated networks consisting of multiple wireless technologies. So the integration of WiMAX with other wireless technologies, such as WLAN, Wi-Fi, UMTS or 3G, has attracted research community for the last few...

متن کامل

Performance Analysis of Wireless Network Throughput and Security Protocol Integration

Wireless network security protocols are essential for enhancing security, privacy and confidentiality. However, network security protocols also require network resources in other to carry out authentication of users through the use of encryption keys and packet encryption. It is therefore relevant to investigate the effects of the amount of resources used by recommended wireless network securit...

متن کامل

Key Scheduling Scheme for Secured Routing in Wireless Adhoc Network

A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards does not provide any security approach for monitoring of these authentication in a distribute...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JDCTA

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2009