A Survey of Security Threats and Authentication Schemes in WiMAX

نویسنده

  • Parampreet Singh
چکیده

WiMAX networks have advantages over the wired network, such as convenience, mobility, and flexibility. The security concerns in this network may prevent its further widespread adoption. Hence, improving the security of WiMAX is of considerable importance. In WiMAX networks by providing security features like authentication, authorization and encryption. The absence of proper authentication mechanism can lead to many threats like denial of service, masquerading and attacks on the authentication protocol. Authentication is the most difficult from the perspective of network security; hence, various forms and threats related to authentication are needed to be studied. The aim of this paper is to study the various authentication schemes such as RSA, EAP and HMAC.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey of WiMAX security threats

As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks in. This report is a survey of security vulnerabilities found in WiMAX network. Vulnerabilities and...

متن کامل

Survey & Assessment of Wimax, its Security Threats and Their Solutions

For a broadband wireless standard such as WiMax, security is important and must be addressed. This is to ensure wide acceptance both from the perspective of the end users and the service providers. In order to compete with existing broadband cable or DSL services, the WiMax network must offer comparable security. We discuss the WiMax security mechanisms for authentication, encryption, and avail...

متن کامل

A Journey on WiMAX and its Security Issues

Security has become a primary concern in order to provide protected communication in Wireless environment. We know the basic concept of communication is sent the information from source node to destination node but in my view the communication is not sent the information but the amount of secure information which is sent from source node to destination node. The much anticipated technology for ...

متن کامل

An Assessment of WiMax Security

For a broadband wireless standard such as WiMax, security is important and must be addressed. This is to ensure wide acceptance both from the perspective of the end users and the service providers. In order to compete with existing broadband cable or DSL services, the WiMax network must offer comparable security. We discuss the WiMax security mechanisms for authentication, encryption, and avail...

متن کامل

Enhancing privacy of recent authentication schemes for low-cost RFID systems

Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013