Towards secure wirelessMAN: Revisiting and evaluating authentication in WiMAX

Raheel M. Hashmi, Arooj M. Siddiqui, M. Jabeen, K. S. Alimgeer

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Wireless communication is highly susceptible to security outbreaks with shear advancement in signal processing technology followed by immense deployment of high-speed mobile communication networks. Pitfalls in current architecture of IEEE 802.16 or Worldwide Interoperability for Microwave Access (WiMAX) have been put forth in recent literature, based on analytical reasoning and design methodologies. With identification of these vulnerabilities, some solutions have also been proposed for their rectification; however, the experimental assessment of these solutions has not been carried out in appropriate manners to justify the satisfaction of constraints. In this paper, we present a generic methodology to simulate and analyze the authentication protocols in WiMAX based on obtained results. We focus on the 1st and 2nd version of Privacy & Key Management (PKM) Protocols, which are implemented in the WiMAX architecture at present and compare their performance characteristics with another proposed solution ISNAP; which claims to eradicate most of the existing threats with introducing minimum overheads. The performance evaluation of these protocols has been carried out by simulating the behavior of BS and SS nodes in real-time wireless network using Linux based hosts. This work intends to establish the formal basis to justify the claims put forth in the specification of ISNAP against PKM v1 & v2.

Original languageEnglish
Title of host publicationProceedings of 1st International Conference on Computer Networks and Information Technology, ICCNIT'11
Pages165-173
Number of pages9
DOIs
Publication statusPublished - 2011
Event1st International Conference on Computer Networks and Information Technology, ICCNIT'11 - Abbottabad, Pakistan
Duration: 11 Jul 201113 Jul 2011

Publication series

NameProceedings - International Conference on Computer Networks and Information Technology

Conference

Conference1st International Conference on Computer Networks and Information Technology, ICCNIT'11
Country/TerritoryPakistan
CityAbbottabad
Period11/07/1113/07/11

Keywords

  • Authentication
  • Privacy & Key Management
  • Simulation
  • WiMAX
  • Wireless Security

Fingerprint

Dive into the research topics of 'Towards secure wirelessMAN: Revisiting and evaluating authentication in WiMAX'. Together they form a unique fingerprint.

Cite this