Browse > Article
http://dx.doi.org/10.7840/KICS.2011.36B.11.1305

BCC Based Mobile WIMAX Initial Network Entry with Improved Security  

Choi, Do-Hyun (숭실대학교 컴퓨터학과)
Park, Jung-Oh (성결대학교 정보산업기술연구소)
Jun, Moon-Seog (숭실대학교 컴퓨터학과)
Abstract
Initial entry section has vulnerability which exposes plain text parameter in Mobile WIMAX environment which is the 4th generation technology. Each node message need to be encrypted to prevent the third party attack or message leakage. In this paper, we propose Mobile WIMAX initial entry section encryption using Elliptic Curve Cryptosystem. We have compared proposed model with existing model using OPNET simulator tool. He delay rate has increased little bit in initial entry section than before after the comparison, but it has shown more effective in average delay and throughput than encryption applied other existing model.
Keywords
Mobile WIMAX; Wibro; 802.16; 4G; OPNET;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Wullems, K. Tham, 1. Smith, and M. Looi, "A trivial denial of service attack on IEEE 802.11 direct sequence spread spectrum wireless LANs," in Proceedings of the Wireless Telecommunications Symposium (WTS '04), pp.129-136, 2004.
2 Prof. Dr. Ing. Evren Eren, Prof. Dr. Ing. Kai-Oliver Detken "WiMax-Security- Assessment of the Security Mechanisms in IEEE 802. 16d/e".
3 Mahmoud Nasreldin, Heba Asian, Magdy El-Hennawy, Adel El-Hennawy, "WiMax Security" International Conference on Advanced Information Networking and Applications 2008, IEEE.
4 ITU, "Mobile telephony", (http://www-.itu.int/ ITU-D/ict/statistics/), 2010.
5 Perumalraja Rengaraju, Chung-Horng Lung, "Analysis on Mobile WIMAX Security", IEEE TIC-STH 2009, pp. 27-29, Sep., 2009
6 Taeshik Shon, Bonhyun Koo, Jong Hyuk Park:, and Hangbae Chang, "Novel Approaches to Enhance Mobile WIMAX Security", EURASIP Journal on Wireless Communications and Networking, 11 pages, 2010.
7 Masood Habib, Tahir Mehmood, Fasee Ullah, Muhammad Ibrahim, "Performance of WiMAX Security Algorithm", International Conference on Computer Technology and Development, 2009.
8 IEEE 802.16 Task Group m (TGm), "IEEE 802.16rn System Description Document (SDD)", (http://www.ieee802-.org/16/tgmJindex. html), IEEE 802. 16m-09/oo34r4, 2010.
9 IEEE 802.16 Task Group m (TGm), "IEEE 802.16m Work Plan", (http://www.ieee802.org/ 16/tgmJ)
10 J. Bellardo and S. Savage, "802.11 denialof- service attacks: real vulnerabilities and practical solutions," in Proceedings of the 12th USENIX Security Symposium, Vol.12, Washington, DC, USA, Aug., 2003 .