By Topic

Performance of WiMAX Security Algorithm (The Comparative Study of RSA Encryption Algorithm with ECC Encryption Algorithm)

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Habib, M. ; Dept. of Comput. Sci. & IT, Shaheed Zulfikar Ali Bhutto Inst. of Sci. & Technol., Islamabad, Pakistan ; Mehmood, T. ; Ullah, F. ; Ibrahim, M.

IEEE 802.16, known as WiMax, is at the top of communication technology drive because it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. A lot of security concerns are needed to secure a wireless network. By keeping in mind the importance of security, the WiMax working groups has designed several security mechanisms to provide protection against unauthorized access and malicious threats, but still facing a lot of challenging situations. An authentication and authorization model provides protection for a network or technology and protects its resources from unauthorized use. This paper examines the threats which are associated with MAC layer and physical layer of WiMax and also proposes some enhancements to the existing model for improving the performance of the encryption algorithm. The paper proposes some techniques in the existing model to enhance its functionality and capability. Simulation is done using Qualnet4.5 simulation tool and the results are given at the end.

Published in:

Computer Technology and Development, 2009. ICCTD '09. International Conference on  (Volume:2 )

Date of Conference:

13-15 Nov. 2009