Authentication process enhancements in WiMAX networks

Authentication is one of the most important security processes in Worldwide Interoperability for Microwave Access (WiMAX) networks. This process allows the receiver (whether base station or subscriber station) of a packet to be confi- dent of the identity of the sender and the integrity of the mes...

Full description

Bibliographic Details
Main Authors: Alezabi, Kamal Ali, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Mohd Ali, Borhanuddin, Jamalipour, Abbas
Format: Article
Language:English
Published: John Wiley & Sons 2016
Online Access:http://psasir.upm.edu.my/id/eprint/55177/
http://psasir.upm.edu.my/id/eprint/55177/1/Authentication%20process%20enhancements%20in%20WiMAX%20networks.pdf
_version_ 1848852733546725376
author Alezabi, Kamal Ali
Hashim, Fazirulhisyam
Hashim, Shaiful Jahari
Mohd Ali, Borhanuddin
Jamalipour, Abbas
author_facet Alezabi, Kamal Ali
Hashim, Fazirulhisyam
Hashim, Shaiful Jahari
Mohd Ali, Borhanuddin
Jamalipour, Abbas
author_sort Alezabi, Kamal Ali
building UPM Institutional Repository
collection Online Access
description Authentication is one of the most important security processes in Worldwide Interoperability for Microwave Access (WiMAX) networks. This process allows the receiver (whether base station or subscriber station) of a packet to be confi- dent of the identity of the sender and the integrity of the message. Most attacks will attempt to violate the authentication process. If such attacks become successful, an attacker will gain an illegitimate access to network resources, thus increasing the probability of future malicious attacks. A number of algorithms and methods have been proposed to improve the security level of authentication in WiMAX networks. However, the evaluations of these algorithms and methods have always been based on a particular aspect, such as reducing overhead, protecting unauthenticated management messages, preventing WiMAX from external attacks, and protection during the handover process. Motivated by these variations, we review the state of art of WiMAX authentication mechanisms, namely, PKMv1, PKMv2, and the recent authentication protocols. We discuss their mechanisms, strengths, weaknesses, and potential countermeasures against each other. Our discussion is based on four categories, namely, enhancements, differences, advantages, and limitations.
first_indexed 2025-11-15T10:42:46Z
format Article
id upm-55177
institution Universiti Putra Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T10:42:46Z
publishDate 2016
publisher John Wiley & Sons
recordtype eprints
repository_type Digital Repository
spelling upm-551772018-03-29T02:34:51Z http://psasir.upm.edu.my/id/eprint/55177/ Authentication process enhancements in WiMAX networks Alezabi, Kamal Ali Hashim, Fazirulhisyam Hashim, Shaiful Jahari Mohd Ali, Borhanuddin Jamalipour, Abbas Authentication is one of the most important security processes in Worldwide Interoperability for Microwave Access (WiMAX) networks. This process allows the receiver (whether base station or subscriber station) of a packet to be confi- dent of the identity of the sender and the integrity of the message. Most attacks will attempt to violate the authentication process. If such attacks become successful, an attacker will gain an illegitimate access to network resources, thus increasing the probability of future malicious attacks. A number of algorithms and methods have been proposed to improve the security level of authentication in WiMAX networks. However, the evaluations of these algorithms and methods have always been based on a particular aspect, such as reducing overhead, protecting unauthenticated management messages, preventing WiMAX from external attacks, and protection during the handover process. Motivated by these variations, we review the state of art of WiMAX authentication mechanisms, namely, PKMv1, PKMv2, and the recent authentication protocols. We discuss their mechanisms, strengths, weaknesses, and potential countermeasures against each other. Our discussion is based on four categories, namely, enhancements, differences, advantages, and limitations. John Wiley & Sons 2016 Article PeerReviewed text en http://psasir.upm.edu.my/id/eprint/55177/1/Authentication%20process%20enhancements%20in%20WiMAX%20networks.pdf Alezabi, Kamal Ali and Hashim, Fazirulhisyam and Hashim, Shaiful Jahari and Mohd Ali, Borhanuddin and Jamalipour, Abbas (2016) Authentication process enhancements in WiMAX networks. Security and Communication Networks, 9 (17). pp. 4703-4725. ISSN 1939-0114; ESSN: 1939-0122 10.1002/sec.1577
spellingShingle Alezabi, Kamal Ali
Hashim, Fazirulhisyam
Hashim, Shaiful Jahari
Mohd Ali, Borhanuddin
Jamalipour, Abbas
Authentication process enhancements in WiMAX networks
title Authentication process enhancements in WiMAX networks
title_full Authentication process enhancements in WiMAX networks
title_fullStr Authentication process enhancements in WiMAX networks
title_full_unstemmed Authentication process enhancements in WiMAX networks
title_short Authentication process enhancements in WiMAX networks
title_sort authentication process enhancements in wimax networks
url http://psasir.upm.edu.my/id/eprint/55177/
http://psasir.upm.edu.my/id/eprint/55177/
http://psasir.upm.edu.my/id/eprint/55177/1/Authentication%20process%20enhancements%20in%20WiMAX%20networks.pdf