IMPROVING SECURITY IN INITIAL NETWORK ENTRY PROCESS OF IEEE 802.16
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 9
Abstract
IEEE 802.16 basically designed to provide more security as compared to other wireless networks. It provides many security features to protect the information in the network as well as to protect the network from unauthorized access, still it vulnerable to many attacks. The process, where attack or threat is possible, is the initial network entry process of IEEE 802.16. This is because many of the MAC management messages, which are used in this process, are not encrypted. The initial network entry process is very important as this is the first gate to establish connection between MS and BS. The solution to this problem provided by some paper is to use Diffie-Hellman key exchange algorithm, but the algorithm we are going to use here is elliptic curve Diffie-Hellman key exchange algorithm. This paper provides the solution to the initial network entry process by using elliptic curve Diffie-Hellman key exchange algorithm as it is faster than the Diffie-Hellman key exchange algorithm. Hence it also improves the performance of IEEE 802.16.
Authors and Affiliations
Prof. Pranita K. Gandhewar , Prof. Prasad P. Lokulwar
Email Spam Filtering using Supervised Machine Learning Techniques
E-mail spam, known as unsolicited bulk Email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted e-mail messages, requently with commercial content, in large quantities to an ind...
Ubiquitous Computing-Approach to Intelligence Building
Ubiquitous computing (often abbreviated to “ubicomp”) refers to a new genre of computing in which the computer completely permeates the life of the user. In ubiquitous computing, computers become a helpful but invisible...
MEASURING THE QUALITY OF OBJECT ORIENTED SOFTWARE MODULARIZATION DEFINING METRICS AND ALGORITHM
We proposed a System to measure the quality of modularization of object-oriented software system. Our work is proposed in three Parts as follows: MODULE 1: DEFINING METRICS FOR OBJECT ORIENTED SOFTWARE AND ALGORITHM M...
Educational Approach of Refactoring in Facilitating Reverse Engineering
Refactoring improves software codes and design. This activity often neglected by software developers because they need time to decide tactically where and when to refactor codes. Although the concepts theoretically insti...
Differential Evolution and Dynamic Differential Evolution Variants for High Dimensional Function Optimization : An Empirical Scalability Study
This paper empirically compares the performance and scalability of Differential Evolution (DE) and Dynamic Differential Evolution (DDE) variants for solving high dimensional unconstrained global optimization functions. F...