CFP last date
20 January 2025
Reseach Article

Comparative Analysis of MAC and HMAC-Sha3 using NS-2

by Tanika Gupta, Mehak Aggarwal, Mandeep Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 160 - Number 6
Year of Publication: 2017
Authors: Tanika Gupta, Mehak Aggarwal, Mandeep Kumar
10.5120/ijca2017913059

Tanika Gupta, Mehak Aggarwal, Mandeep Kumar . Comparative Analysis of MAC and HMAC-Sha3 using NS-2. International Journal of Computer Applications. 160, 6 ( Feb 2017), 9-14. DOI=10.5120/ijca2017913059

@article{ 10.5120/ijca2017913059,
author = { Tanika Gupta, Mehak Aggarwal, Mandeep Kumar },
title = { Comparative Analysis of MAC and HMAC-Sha3 using NS-2 },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2017 },
volume = { 160 },
number = { 6 },
month = { Feb },
year = { 2017 },
issn = { 0975-8887 },
pages = { 9-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume160/number6/27076-2017913059/ },
doi = { 10.5120/ijca2017913059 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:05:56.074613+05:30
%A Tanika Gupta
%A Mehak Aggarwal
%A Mandeep Kumar
%T Comparative Analysis of MAC and HMAC-Sha3 using NS-2
%J International Journal of Computer Applications
%@ 0975-8887
%V 160
%N 6
%P 9-14
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless Broadband offers tremendously fast and always on provide internet similar to ADSL and the user free from the fixed access areas and remove the hindrance of fixed access area for users. In order to achieve these features in formalized way was achieved for Wireless LAN and Wireless Metropolitan Area Networks with the advent of IEEE802.16 standards respectively from the beginning. The information is accessible for users in various areas because of that wireless network has become the major focus area as for as security matter is concerned .In this paper, we enhance the security levels by using HMAC in WiMax.

References
  1. Syed Shabih Hasan, Mohammed Abdul Qadeer, “Security concerns in WiMAX”, International Conference on Digital Object Identifier, 2009.
  2. Michel Barbeau, “WiMax/802.16 Threat analysis”, Carleton University, 2005.
  3. Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  4. Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  5. Sannella, M. J. 1994 Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398., University of Washington.
  6. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  7. Brown, L. D., Hua, H., and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  8. Y.T. Yu, M.F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
  9. Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender
Index Terms

Computer Science
Information Sciences

Keywords

Wimax MAC HMAC PHY CS