CFP last date
20 January 2025
Reseach Article

A Review of Privacy and Key Management Protocol in IEEE 802.16e

by Fuden Tshering, Anjali Sardana
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 20 - Number 2
Year of Publication: 2011
Authors: Fuden Tshering, Anjali Sardana
10.5120/2405-3199

Fuden Tshering, Anjali Sardana . A Review of Privacy and Key Management Protocol in IEEE 802.16e. International Journal of Computer Applications. 20, 2 ( April 2011), 25-31. DOI=10.5120/2405-3199

@article{ 10.5120/2405-3199,
author = { Fuden Tshering, Anjali Sardana },
title = { A Review of Privacy and Key Management Protocol in IEEE 802.16e },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 20 },
number = { 2 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 25-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume20/number2/2405-3199/ },
doi = { 10.5120/2405-3199 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:06:45.376826+05:30
%A Fuden Tshering
%A Anjali Sardana
%T A Review of Privacy and Key Management Protocol in IEEE 802.16e
%J International Journal of Computer Applications
%@ 0975-8887
%V 20
%N 2
%P 25-31
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

WiMAX is the next generation technology that offers broadband wireless access over long distances. As WiMAX standards expand from considering a fixed line-of-sight propagation and point-to-multipoint infrastructure high frequency system to a lower frequency non-line-of-sight mobile system, WiMAX is open to more security threats than other wireless systems. This paper presents the different security issues present in Privacy and Key Management Protocol along with the proposed solutions.

References
  1. IEEE 802.16-2004. IEEE standard for Local and Metropolitan Area networks-Part 16: Air Interface for Fixed Broadband Wireless Access Systems. IEEE Press.
  2. IEEE 802.16-2005, IEEE standard for Local and Metropolitan Area networks- Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems. IEEE Press.
  3. Ahson, S. and Ilyas, M. 2008. WiMAX: Standards and Security: CRC Press, Inc. Boca Raton, FL, USA.
  4. Hasan, J. 2006. Security Issues of IEEE 802.16 (WiMAX). In School of Computer and Information Science, Edith Cowan University, Australia.
  5. Eren, E. 2007. WiMAX Security Architecture - Analysis and Assessment. In 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. IDAACS 2007, pp. 673-677.
  6. Panagiotis, T. and George, G. 2010. WiFi and WiMAX Secure Deployments," Journal of Computer Systems, Networks, and Communications, vol. 2010.
  7. Luo, C. 2009. A Simple Encryption Scheme Based on WiMAX. In International Conference on E-Business and Information System Security, 2009. EBISS '09. pp. 1-4.
  8. Xu, S., Matthews, M. and Huang, C. 2006. Security issues in privacy and key management protocols of IEEE 802.16. In 44th Annual South-east regional conference, Melbourne, Florida. pp. 113-118.
  9. Hashmi, R.M., Siddiqui, A.M., Jabeen, M., Shehzad, K., Zubair, A., and Alimgeer, K.S. 2009. Improved Secure Network Authentication Protocol (ISNAP) for IEEE 802.16. In Information and Communication Technologies, 2009. ICICT '09. Doha, Qatar. pp.101-105.
  10. Altaf, A., Sirhindi, R., and Ahmed, A. 2008. A Novel Approach against DoS Attacks in WiMAX Authentication using Visual Cryptography, In Proc. of Int’l conference on Emerging Security Information, System and Technologies, Securware, France
  11. Dong, H., and Yan, W. 2008. Secure Authentication on WiMAX with Neural Cryptography. In International Conference on Information Security and Assurance, 2008. ISA 2008, pp. 366-369.
  12. Yang, Y., and Li, R. 2009. Toward Wimax Security. In Proceedings of Computational Intelligence and Software Engineering, Wuhan, China, pp. 1-5.
  13. Sikkens, B., 2008. Security Issues and Proposed Solutions Concerning Authentication and Authorization for WiMAX. In Proceedings of 8th Twente Student Confereence on IT, Enschede.
  14. Liu, F., and Lu, L. 2006. A WPKI-based Security Mechanism for IEEE 802.16e. In Proc. of Int’l Conference on WirelessComm., Networking and Mobile Computing, pp. 1–4.
  15. Habib, M., Mehmood, T., Ullah, F., and Ibrahim, M. 2009. Performance of WiMAX Security Algorithm (The Comparative Study of RSA Encryption Algorithm with ECC Encryption Algorithm). In Proc. of International Conference on Computer Technology and Development. ICCTD '09, Kota Kinabalu, Malaysia, pp. 108-112.
  16. Shon, T., and Choi, W. 2007. An analysis of mobile WiMAX security: vulnerabilities and solutions. In Proc. of the 1st International Conference on Network-based information systems, Regensburg, Germany, pp. 88-97.
  17. Han, T., Zhang, N., Liu, K., and Tang, B. 2008. Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. In Proc. of 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems,’08. Atlanta, GA, pp. 828 - 833.
Index Terms

Computer Science
Information Sciences

Keywords

WiMAX security privacy and key management protocol Multimedia application authentication authorization