Javascript must be enabled to continue!
Authentication process enhancements in WiMAX networks
View through CrossRef
AbstractAuthentication is one of the most important security processes in Worldwide Interoperability for Microwave Access (WiMAX) networks. This process allows the receiver (whether base station or subscriber station) of a packet to be confident of the identity of the sender and the integrity of the message. Most attacks will attempt to violate the authentication process. If such attacks become successful, an attacker will gain an illegitimate access to network resources, thus increasing the probability of future malicious attacks. A number of algorithms and methods have been proposed to improve the security level of authentication in WiMAX networks. However, the evaluations of these algorithms and methods have always been based on a particular aspect, such as reducing overhead, protecting unauthenticated management messages, preventing WiMAX from external attacks, and protection during the handover process. Motivated by these variations, we review the state of art of WiMAX authentication mechanisms, namely, PKMv1, PKMv2, and the recent authentication protocols. We discuss their mechanisms, strengths, weaknesses, and potential countermeasures against each other. Our discussion is based on four categories, namely, enhancements, differences, advantages, and limitations. Copyright © 2016 John Wiley & Sons, Ltd.
Title: Authentication process enhancements in WiMAX networks
Description:
AbstractAuthentication is one of the most important security processes in Worldwide Interoperability for Microwave Access (WiMAX) networks.
This process allows the receiver (whether base station or subscriber station) of a packet to be confident of the identity of the sender and the integrity of the message.
Most attacks will attempt to violate the authentication process.
If such attacks become successful, an attacker will gain an illegitimate access to network resources, thus increasing the probability of future malicious attacks.
A number of algorithms and methods have been proposed to improve the security level of authentication in WiMAX networks.
However, the evaluations of these algorithms and methods have always been based on a particular aspect, such as reducing overhead, protecting unauthenticated management messages, preventing WiMAX from external attacks, and protection during the handover process.
Motivated by these variations, we review the state of art of WiMAX authentication mechanisms, namely, PKMv1, PKMv2, and the recent authentication protocols.
We discuss their mechanisms, strengths, weaknesses, and potential countermeasures against each other.
Our discussion is based on four categories, namely, enhancements, differences, advantages, and limitations.
Copyright © 2016 John Wiley & Sons, Ltd.
Related Results
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
AbstractIn the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge. This paper prop...
The Future of WiMAX
The Future of WiMAX
WiMAX is being promoted as a potential solution to a number of problems that have plagued the wired and wireless broadband industry since it originated. Can WiMAX fulfill this prom...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Orthogonal Frequency Division Multiple Access in WiMAX and LTE: A Comparison
Orthogonal Frequency Division Multiple Access in WiMAX and LTE: A Comparison
<p>Orthogonal frequency-division multiple access has been adopted by both the WiMAX and Long Term Evolution standards, which are the two main contenders in the 4G wireless sc...
Orthogonal Frequency Division Multiple Access in WiMAX and LTE: A Comparison
Orthogonal Frequency Division Multiple Access in WiMAX and LTE: A Comparison
<p>Orthogonal frequency-division multiple access has been adopted by both the WiMAX and Long Term Evolution standards, which are the two main contenders in the 4G wireless sc...
Sentencing Enhancements
Sentencing Enhancements
Sentencing enhancements are policies that mandate that people who are convicted of criminalized behaviors while engaging in generally non-criminalized behaviors—such as being in a ...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
EVALUATING USER AUTHENTICATION PROTOCOLS AND SECURITY ALGORITHMS FOR NETWORKS
EVALUATING USER AUTHENTICATION PROTOCOLS AND SECURITY ALGORITHMS FOR NETWORKS
This paper addresses the want for evaluating consumer authentication protocols and protection algorithms for
networks. Specially, this paper specializes in the effectiveness and sa...

