CFP last date
20 December 2024
Reseach Article

WiMAX - WLAN Interface using TORA, DSR and OLSR Protocols with their Evaluation under Wormhole Attack

by Sharanbeer Kaur, Shivani Khurana
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 14
Year of Publication: 2014
Authors: Sharanbeer Kaur, Shivani Khurana
10.5120/15791-4543

Sharanbeer Kaur, Shivani Khurana . WiMAX - WLAN Interface using TORA, DSR and OLSR Protocols with their Evaluation under Wormhole Attack. International Journal of Computer Applications. 90, 14 ( March 2014), 37-42. DOI=10.5120/15791-4543

@article{ 10.5120/15791-4543,
author = { Sharanbeer Kaur, Shivani Khurana },
title = { WiMAX - WLAN Interface using TORA, DSR and OLSR Protocols with their Evaluation under Wormhole Attack },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 14 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 37-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number14/15791-4543/ },
doi = { 10.5120/15791-4543 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:11:03.886451+05:30
%A Sharanbeer Kaur
%A Shivani Khurana
%T WiMAX - WLAN Interface using TORA, DSR and OLSR Protocols with their Evaluation under Wormhole Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 14
%P 37-42
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As it is know that WiMAX and WLAN are two wireless developing technologies. The researchers are working on the integrated scenarios of these two technologies so as to approach the maximum benefits out of these technologies. Therefore in this paper we are performing simulations over the two scenarios i. e. with wormhole attack and without wormhole attack. The evaluation is taken on three different protocols i. e. DSR, OLSR and TORA. The results are shown in graphical figures and according to them results are made.

References
  1. Mrs. M. Rekha , Dr. C. Chanderasekar "Trust based authentication technique for security in WiMax networks" 2012. http://ijcae. org/admin/journals/Journals465. pdf
  2. Chauhan, N , Yadav, R. K ,"Security Analysis of Identity Based Cryptography and Certificate Based in Wimax Network ) " 2012. http://ieeexplore. ieee. org/xpl/login. jsp?tp=&arnumber=6168423&url=http%3A%2F%2Fieeexplore. ieee. org%2Fxpls%2Fabs_all. jsp%3Farnumber%3D6168423
  3. Adnan Shahid Khan, Norsheila Fisal, Sharifah, Kamilah, Sharifah Hafizah, Mazlina Esa, Zurkarmawan, Abu Bakar, M. Abbas," An Efficient Self-Organized Authentication and Key Management Scheme for Distributed Multihop Relay-Based IEEE 802. 16 Networks" 2011http://sites. google. com/site/ijcsis/, ISSN 1947-5500
  4. Jin Cao , Nanyang , Maode Ma ; Ariff, M. A. B "Security enhancements in WiMAX mesh networks"2011. http://ieeexplore. ieee. org/xpl/login. jsp?tp=&arnumber=6156000&url=http%3A%2F%2Fieeexplore. ieee. org%2Fiel5%2F6153216%2F6155882%2F06156000. pdf%3Farnumber%3D6156000
  5. Hashmi, R. M. Politec. di Milano, Milan, Italy Siddiqui, A. M. ; Jabeen, M. ; Alimgeer, K. S. ," Towards secure wireless MAN: Revisiting and evaluating authentication in WiMAX , 2011. http://ieeexplore. ieee. org/xpl/login. jsp?tp=&arnumber=6020925&url=http%3A%2F%2Fieeexplore. ieee. org%2Fxpls%2Fabs_all. jsp%3Farnumber%3D6020925
  6. Karen Scarfone, Cyrus Tibbs, Matthew Sexton,"Guide to Securing WiMAX wireless communications"2010. http://dl. acm. org/citation. cfm?id=2206213
  7. Shojaee, M. , Iran Movahhedinia, N Ladani, B. T. "Traffic analysis for WiMAX network under DDoS attack,"2010. http://ieeexplore. ieee. org/xpl/login. jsp?tp=&arnumber=5626885&url=http%3A%2F%2Fieeexplore. ieee. org%2Fxpls%2Fabs_all. jsp%3Farnumber%3D5626885
  8. N. Seddigh, B. Nandy, R. Makkar J. F. Beaumont ,"Security Advances and Challenges in 4G Wireless Networks"2010. http://ieeexplore. ieee. org/xpl/login. jsp?tp=&arnumber=5593244&url=http%3A%2F%2Fieeexplore. ieee. org%2Fxpls%2Fabs_all. jsp%3Farnumber%3D5593244
  9. Nasreldin, M. MCIT, Cairo Asian, H. ; El-Hennawy, M. ; El-Hennawy, A. ,"WiMAX Security" 2008. http://ieeexplore. ieee. org/xpl/login. jsp?tp=&arnumber=4483104&url=http%3A%2F%2Fieeexplore. ieee. org%2Fxpls%2Fabs_all. jsp%3Farnumber%3D4483104
  10. Michel Barbeau ,"WiMax/802. 16 threat analysis" 2005. http://www. multiinfocom. ru/ru/artpdf/iq2-barbeau. pdf
  11. "Comparison of the basic features of Wi-Fi (802. 11b/g) - WiMAX (802. 16)". Wi-Fi Mail. baskent. edu. tr/. . . /0401/. . . /burak-usgurlu-lastHW-wifiVSwimax. pdf.
Index Terms

Computer Science
Information Sciences

Keywords

WiMAX WLAN WIMAX-WLAN Integrated circuit OLSR DSR TORA.