The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


WIMAX- Worldwide Interoperability for Microwave Access is going to be an emerging wireless technology for the future. Wireless networking market is thriving because of increasing popularity of Broad Band internet. Wireless network is not completely secure because of rapid release of new technologies, lack of physical infrastructure and market competition. It is (WiMAX) a new technology; not deployed widely to justify the evidence of threats, risk and vulnerability in real situations. Although authentication process is a key to secure access in wireless network, the security sub layer of IEEE802.16 employs an authenticated client server key management protocol in which the Base Station (Server), controls the distribution of keying materials to the Mobile Station( the client). In this paper, an overview of authentication framework is first discussed and several threats on authentication process is later interrogated. Finally, possible solutions to overcome them are inaugurated.

Keywords

Authentication, PKM, Time Stamp, Hash, Digital Signature, Visual Cryptography.
User
Notifications
Font Size