Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 158 countries worldwide.
Mutual authentication between base and subscriber station can improve the security of IEEE 802.16 Wimax network.
Mohammad Zavid Parvez, Mohammad Hossain, Mohammad Hamidul Islam
Pages - 292 - 301     |    Revised - 01-09-2011     |    Published - 05-10-2011
Volume - 5   Issue - 4    |    Publication Date - September / October 2011  Table of Contents
WiMax, Authentication, Base station, Broadband connection, Security
High throughput broadband connection over long distance is greatly demanded in the present web application. IEEE 802.16/WiMax technology is one of the latest additions on internet broadband. When wireless devices are connected to the broadband wireless access, security comes on the front line to ensure the communication safe and protected from any kind of attacks or threats. Strong and effective security must be confirmed to make the wireless environment reliable and risk less. Base station authentication is an important part of WiMax security which must be confirmed to make the environment more secure. This paper derived the technique to secure the environment by confirming the authentication of base station.
CITED BY (2)  
1 Hossain, M., Muslima, U., & Islam, H. (2015). Security Analysis of Wireless Sensor Network. network, 2(1).
2 Chen, C. T. (2013). Improved efficient authentication scheme with anonymity in global mobility networks. International Journal of Innovative Computing, Information, and Control, 9(8), 3319-3339.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
1 Frank Ohrtman, WiMAX Handbook, building 802.16 WiMAX networks, McGraw-Hill 2005.
2 Mahmoud Nasreldin, Heba Aslan, Magdy El-Hennawy, Adel El- Hennawy. WiMax Security, 22nd International Conference on Advanced Information Networking and Applications Workshops 2008, p. 1335- 1340.
3 Kejie Lu and Yi Qian, University of Puerto rico, Hsiao-Hwa Chen, National Sun Yat-Sen University. A Secure and Service-Oriented Network Control Framework for WiMax Networks, IEEE Communications Magazine, May 2007.
4 Michel Barbeau, School of Computer Science, Carleton University, Canada. WiMax Threat Analysis, Q2SWinet’05, October 13, 2005, Montreal, Quebec, Canada.
5 Hyung-Joon Kim, IEEE 802.16/WiMax Security, Dept. of Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, New Jersey, Unpublished.
6 Jamshed Hasan, School of Computer and Information Science, Edith Cowan University, Australia Security Issues of IEEE 802.16 (WiMax), http://scissec.scis.ecu.edu.au/conference_proceedings/2006/aism/Hasan%20- %20Security%20Issues%20of%20IEEE%20802.16%20(WiMAX).pdf.
7 Derrick D. Boom “Denial of Service Vulnerabilities in IEEE 802.16 Wireless Networks” IEEE C802.16e-04/406.
8 Loutfi Nuaymi, WiMAX Technology for Broadband Wireless Access, John Wiley & Son Ltd.
Mr. Mohammad Zavid Parvez
- Denmark
Mr. Mohammad Hossain
University of Information Technology and Sciences (UITS), Bangladesh - Bangladesh
Mr. Mohammad Hamidul Islam
- Sweden