Security Enhancement for Mobile WiMAX Network
D. David Neels Pon Kumar1, Praveen David2, S.Rimlon Shibi3, K. Arun Kumar4
1D. David NeelsPon Kumar, Professor, Department of ECE, Einstein College of Engineering, TN, India.
2Praveen David, PG scholar, Department of ECE, Einstein College of Engineering, TN, India.
3S.Rimlon Shibi, Lecturer, Department of IT, Saint Joseph Engineering College, India.
4K.Arun Kumar, Assistant Professor, Department of ECE, Einstein College of Engg., TN, India
Manuscript received on January 01, 2013. | Revised Manuscript received on January 02, 2013. | Manuscript published on January 05, 2013. | PP: 1-5 | Volume-2, Issue-6, January 2013. | Retrieval Number: F1142112612/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Security in wireless networks has traditionally been considered to be an issue to be addressed at the higher layers of the network.IEEE 802.16, known as WiMAX, is at the top of communication technology drive because it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. A lot of security concerns are needed to secure a wireless network.Secure communication can only be provided after successful authentication and a robust security network association is established. By keeping in mind the importance of security, the WiMAX working groups has designed several security mechanisms to provide protection against unauthorized access and threats, but still facing a lot of challenging situations. WiMAX security architecture deals with all of the basic wireless security requirements like authentication, authorization, access control, data integrity, confidentiality and privacy.This paper examines the threats which are associated with MAC layer and physical layer of WiMAX and also proposes some enhancements to the existing model for improving the performance of the encryption algorithm and proposes some techniques in the existing model to enhance its functionality and capability.
Keywords: WiMAX, Authentication, Authorization, Access control, Data integrity, Confidentiality