By Topic

Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Ayesha Altaf ; Coll. of Signals, NUST, Rawalpindi ; M. Younus Javed ; Attiq Ahmed

Security is highly critical in wireless communication, as wireless media is vulnerable to attacks. Mobile WiMAX is a new standard and it opens new horizons for security researchers. In this paper, authorization protocol for both versions of PKM in WiMAX has been analyzed. Possible attacks are also considered including interleaving, replay and suppress replay attack and a methodology is presented to prevent these attacks. It also describes WiMAX architecture, privacy and key management (PKM) protocols, their shortcomings and existing solutions for providing security along with enhanced proposed security solution for mentioned attacks. Existing solutions address these problems using timestamp or nonce. A hybrid approach of nonce and timestamp has been proposed to prevent the authorization protocol from such attacks.

Published in:

Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008. SNPD '08. Ninth ACIS International Conference on

Date of Conference:

6-8 Aug. 2008