oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Novel Approaches to Enhance Mobile WiMAX Security  [cached]
Taeshik Shon,Bonhyun Koo,Jong Hyuk Park,Hangbae Chang
EURASIP Journal on Wireless Communications and Networking , 2010, DOI: 10.1155/2010/926275
Abstract: The IEEE 802.16 Working Group on Broadband Wireless Access Standards released IEEE 802.16-2004 which is a standardized technology for supporting broadband and wireless communication with fixed and nomadic access. After the IEEE 802.16-2004 standard, a new advanced and revised standard was released as the IEEE 802.16e-2005 amendment which is foundation of Mobile WiMAX network supporting handover and roaming capabilities. In the area of security aspects, compared to IEEE 802.16-2004, IEEE 802.16e, called Mobile WiMAX, adopts improved security architecture—PKMv2 which includes EAP authentication, AES-based authenticated encryption, and CMAC or HMAC message protection. However, there is no guarantee that PKMv2-based Mobile WiMAX network will not have security flaws. In this paper, we investigate the current Mobile WiMAX security architecture focusing mainly on pointing out new security vulnerabilities such as a disclosure of security context in network entry, a lack of secure communication in network domain, and a necessity of efficient handover supporting mutual authentication. Based on the investigation results, we propose a novel Mobile WiMAX security architecture, called RObust and Secure MobilE WiMAX (ROSMEX), to prevent the new security vulnerabilities.
Novel Approaches to Enhance Mobile WiMAX Security  [cached]
Shon Taeshik,Koo Bonhyun,Park JongHyuk,Chang Hangbae
EURASIP Journal on Wireless Communications and Networking , 2010,
Abstract: The IEEE 802.16 Working Group on Broadband Wireless Access Standards released IEEE 802.16-2004 which is a standardized technology for supporting broadband and wireless communication with fixed and nomadic access. After the IEEE 802.16-2004 standard, a new advanced and revised standard was released as the IEEE 802.16e-2005 amendment which is foundation of Mobile WiMAX network supporting handover and roaming capabilities. In the area of security aspects, compared to IEEE 802.16-2004, IEEE 802.16e, called Mobile WiMAX, adopts improved security architecture—PKMv2 which includes EAP authentication, AES-based authenticated encryption, and CMAC or HMAC message protection. However, there is no guarantee that PKMv2-based Mobile WiMAX network will not have security flaws. In this paper, we investigate the current Mobile WiMAX security architecture focusing mainly on pointing out new security vulnerabilities such as a disclosure of security context in network entry, a lack of secure communication in network domain, and a necessity of efficient handover supporting mutual authentication. Based on the investigation results, we propose a novel Mobile WiMAX security architecture, called RObust and Secure MobilE WiMAX (ROSMEX), to prevent the new security vulnerabilities.
Mobile WiMAX Security, Architecture and Assessment
Ashish Kaushik
International Journal of Electronics and Computer Science Engineering , 2012,
Abstract: WiMAX (Worldwide Interoperability for Microwave Access) is an emerging wireless communication system that can provide broadband access with large-scale coverage. Since 2001, WiMAX has evolved from 802.16 to 802.16d standard for fixed wireless access and to the new IEEE 802.16e (Mobile WiMAX) standard with mobility support. The importance of IEEE-Standard 802.16 WiMAX is growing and will compete with technologies such as UMTS. In this paper, we focus on how WiMAX can be used in an enterprise environment under the assumption that a WiMAX network can be hosted by enterprise. Three research questions naturally arise when we consider an enterprise wireless infrastructure built with WiMAX - what integrated wireless network architecture would look like, if it is possible to derive a unified security model for such an integrated network. We will discuss these questions in detail based on our investigation in our research and present the results we have come up with so far. Our study can provide a guideline for the design of a more secure and practical WiMAX network.
Implementation Of Secure & Cost Effective Authentication Process In IEEE 802.16e WiMAX  [PDF]
B.Sridevi,M.Brindha,R.Umamaheswari,S.Rajaram
International Journal of Distributed and Parallel Systems , 2012,
Abstract: The Mobile WiMAX IEEE 802.16e is a neoteric technology providing broadband data access to mobile and stationary users while supporting handover and roaming capabilities. In the area of security aspects, Mobile WiMAX exhibits vulnerabilities while adopting improved security architecture. Bandwidth is an additional overhead in reducing these vulnerabilities. To compensate bandwidth and security, this project focuses on reducing the security vulnerabilities in the initial network entry process and access network of the WiMAX domain with a view to reduce the memory required for key management. This paper proposes the usage of 1.Modified Diffie-Hellman algorithm and 2.Device certificate for key exchange process to provide secure authentication and 3.Compression technique to reduce the memory space and the transmission bandwidth. The 802.16e mobile WiMAX model is implemented using Qualnet and security enhancement is implemented using MATLAB.MYSQL is used as the database for Key storage. This proposed work enhances the security of the WiMAX network and reduces at least 50% of the bandwidth.
An Overview of Various Security Aspects for WiMAX Network Technology
Manorma Kaushik,Sweta Kaushik
International Journal of Electronics and Computer Science Engineering , 2012,
Abstract: WiMAX, Worldwide Interoperability for Microwave Access, is an emerging wireless communication system that provides broadband access with large-scale coverage. As a cost-effective solution, multihop communication is becoming more and more important to WiMAX systems. To deploy successfully multihop WiMAX networks, security is one of the major challenges that must be addressed. Another important aspect is how to support different services and applications in WiMAX networks. New ICT and e-Learning strategies and advances in Wireless standards and technologies particularly in the areas of WiMAX (Worldwide Interoperability for Microwave Access) and mobile computing can help to make the digital divide in education and research fields. This technology aim to provide low-cost, high-performance wireless access to residential and business applications. The required features and performance of the system will increase as technology evolves to address portable and mobile applications. Our study can provide a guideline to the WiMAX for the design of a more secure and practical network.
Resource Allocation in Mobile WiMAX Network: An Optimal Approach  [PDF]
Rakesh Kumar Jha,Upena D Dalal,A. Vishal Wankhade
Computer Science , 2012,
Abstract: In the last few years there has been significant growth in the area of wireless communication. IEEE 802.16/WiMAX is the network which is designed for providing high speed wide area broadband wireless access; WiMAX is an emerging wireless technology for creating multi-hop Mesh network. Future generation networks will be characterized by variable and high data rates, Quality of Services (QoS), seamless mobility both within a network and between networks of different technologies and service providers. A technology is developed to accomplish these necessities is regular by IEEE, is 802.16, also called as WiMAX (Worldwide Interoperability for Microwave Access). This architecture aims to apply Long range connectivity, High data rates, High security, Low power utilization and Excellent Quality of Services and squat deployment costs to a wireless access technology on a metropolitan level. In this paper we have observed the performance analysis of location based resource allocation for WiMAX and WLAN-WiMAX client and in second phase we observed the rate-adaptive algorithms. We know that base station (BS) is observed the ranging first for all subscribers then established the link between them and in final phase they will allocate the resource with Subcarriers allocation according to the demand (UL) i.e. video, voice and data application. We propose linear approach, Active-Set optimization and Genetic Algorithm for Resource Allocation in downlink Mobile WiMAX networks. Purpose of proposed algorithms is to optimize total throughput. Simulation results show that Genetic Algorithm and Active-Set algorithm performs better than previous methods in terms of higher capacities but GA have high complexity then active set.
WiMAX Security Issues in E-learning Systems  [cached]
Felician Alecu,Paul Pocatilu,Sergiu Capisizu
Journal of Mobile, Embedded and Distributed Systems , 2010,
Abstract: WiMAX (Worldwide Interoperability for Microwave Access) is a point-to-multipoint wireless network based on IEEE 802.16 standard. The WiMAX signal is broadcasted from a base station to the wide-geographically spread receivers. WiMAX enabled mobile devices become very popular due to the fact the network connections can be easily maintained on move. Regarding the network security, WiMAX provides strong user authentication, access control, data privacy and data integrity using sophisticated encryption technology. WiMAX technology is the only solution for isolated locations where e-learning distributed platforms need to be used. This paper focuses on security issues for e-learning solutions, especially when WiMAX technology is used.
Features of calculation of network parameters in WiMAX mobile  [PDF]
Dmitriev Vadim Nikolaevich,Shalaev Ivan Gennadievich
Vestnik Astrahanskogo Gosudarstvennogo Tehni?eskogo Universiteta. Seria: Upravlenie, Vy?islitel?naa Tehnika i Informatika , 2010,
Abstract: The features of calculating the parameters of the network of IEEE 802.16e standard using the developed program of planning WiMAX mobile network are considered. The program allows to take into account the peculiarities of the chosen standard and the working group recommendations, to assess more effec-tively the required level of the receiver sensitivity, the distance to the subscriber, data transfer rate, the number of base stations and other parameters necessary for design.
Novel Fast Encryption Algorithms for Multimedia Transmission over Mobile WiMax Networks  [PDF]
M.A. Mohamed,F.W. Zaki,A.M. Elmohandes
International Journal of Computer Science Issues , 2012,
Abstract: Security support is mandatory for any communication networks. For wireless systems, security support is even more important to protect the users as well as the network. Since wireless medium is available to all, the attackers can easily access the network and the network becomes more vulnerable for the user and the network service provider. Worldwide Interoperability for Microwave Access (WiMax) is going to be an emerging wireless technology nowadays. With the increasing popularity of Broadband internet, wireless networking market is thriving. In the IEEE 802.16e, security has been considered as the main issue during the design of the protocol. However, security mechanism of WiMax still remains an open research field. WiMax is relatively a new technology not deployed widely to justify the evidence of threats, risk and vulnerability in real situations. In this paper, a research is described three proposed chaos encryption techniques for multimedia transmission over Mobile WiMax physical and MAC layers. At first a global overview of the technology WiMax is given followed by an explanation of traditional encryption techniques used in WiMax. Then the proposed encryption techniques are presented with its chaos systems. Next, these techniques will be applied to different multimedia contents to compare between them and traditional techniques such as AES, IDEA, Blowfish and DES.
The WiMAX Technology
Felician ALECU
Oeconomics of Knowledge , 2010,
Abstract: WiMAX enabled mobile devices become very popular due to the fact the network connections can be easily maintained on move. Regarding the network security, WiMAX provides strong user authentication, access control, data privacy and data integrity using sophisticated encryption technology. WiMAX technology is the only solution for isolated locations where e-learning distributed platforms need to be used.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.