University of Bahrain
Scientific Journals

Analysis of Attacks in Authentication Protocol IEEE 802.16e

Show simple item record

dc.contributor.author Sameni,Kamran
dc.contributor.author Yazdani, Nasser
dc.contributor.author Payandeh, Ali
dc.date.accessioned 2018-07-31T08:39:36Z
dc.date.available 2018-07-31T08:39:36Z
dc.date.issued 2013
dc.identifier.issn 2210-1519
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/1699
dc.description.abstract Security support in wireless systems is a vital necessity to protect users and network in some applications. Since wireless media are available to all, attackers can easily reach the network and network will be more vulnerable for users and service providers of the network. This article discusses on the analysis of PKM (Privacy Key Management) protocols and its second version (PKMv2) which has been proposed after publication of IEEE 802.16e. This protocol is vulnerable against some attacks. In this article, standard security sub layer (IEEE 802.16) is first studied and then, WiMAX authentication protocol is explained. Finally, possible attacks to PKM Protocol in IEEE 802.16 will be studied. Also, solutions presented against relevant attacks are explained. Analysis of security mechanisms in authentication protocol and comparing between them is the main objective of this paper. In fact, this paper can be used as guidelines for the future research activities and security of WiMAX. en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.rights Attribution-NonCommercial-ShareAlike 4.0 International *
dc.rights.uri http://creativecommons.org/licenses/by-nc-sa/4.0/ *
dc.subject Security
dc.subject Authentication Protocol
dc.subject Attack
dc.subject IEEE 802.16
dc.title Analysis of Attacks in Authentication Protocol IEEE 802.16e en_US
dc.type Article en_US
dc.identifier.doi http://dx.doi.org/10.12785/IJCNT/010103
dc.volume 01
dc.issue 01
dc.source.title International Journal of Computing and Network Technology
dc.abbreviatedsourcetitle IJCNT


Files in this item

This item appears in the following Issue(s)

Show simple item record

Attribution-NonCommercial-ShareAlike 4.0 International Except where otherwise noted, this item's license is described as Attribution-NonCommercial-ShareAlike 4.0 International

All Journals


Advanced Search

Browse

Administrator Account