Authentication process enhancements in WiMAX networks

2Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Authentication is one of the most important security processes in Worldwide Interoperability for Microwave Access (WiMAX) networks. This process allows the receiver (whether base station or subscriber station) of a packet to be confident of the identity of the sender and the integrity of the message. Most attacks will attempt to violate the authentication process. If such attacks become successful, an attacker will gain an illegitimate access to network resources, thus increasing the probability of future malicious attacks. A number of algorithms and methods have been proposed to improve the security level of authentication in WiMAX networks. However, the evaluations of these algorithms and methods have always been based on a particular aspect, such as reducing overhead, protecting unauthenticated management messages, preventing WiMAX from external attacks, and protection during the handover process. Motivated by these variations, we review the state of art of WiMAX authentication mechanisms, namely, PKMv1, PKMv2, and the recent authentication protocols. We discuss their mechanisms, strengths, weaknesses, and potential countermeasures against each other. Our discussion is based on four categories, namely, enhancements, differences, advantages, and limitations. Copyright © 2016 John Wiley & Sons, Ltd.

Author supplied keywords

Cite

CITATION STYLE

APA

Alezabi, K. A., Hashim, F., Hashim, S. J., Ali, B. M., & Jamalipour, A. (2016, November 25). Authentication process enhancements in WiMAX networks. Security and Communication Networks. John Wiley and Sons Inc. https://doi.org/10.1002/sec.1577

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free