Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/10826
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKhan, A. S.-
dc.contributor.authorFisal, N.-
dc.contributor.authorBakar, Z. A.-
dc.contributor.authorSalawu, N.-
dc.contributor.authorMaqbool, W.-
dc.contributor.authorUllah, R.-
dc.contributor.authorSafdar, H.-
dc.date.accessioned2021-07-21T11:56:04Z-
dc.date.available2021-07-21T11:56:04Z-
dc.date.issued2014-03-
dc.identifier.citationA. S. Khan, N. Fisal, Z. A. Bakar, N. Salawu, W. Maqbool, R. Ullah and H. Safdar " Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks." Indian Journal of Science and Technology, Vol 7(3), 282–295, March 2014. ISSN (Print): 0974-6846, ISSN (Online): 0974-5645. Available online: http://www.indjst.org/index.php/indjst/article/view/47646/38663en_US
dc.identifier.issnISSN (Print) : 0974-6846, ISSN (Online) : 0974-5645-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/10826-
dc.description.abstractMobile Multihop Relay (MMR) network is one of the emerging technologies, especially LTE-Advanced, WiMAX and the Smart grid communications. Ensuring security is one of the most imperative and challenging issues in MMR networks. Privacy Key Management (PKM) protocol is proposed to ensure the security measures in MMR networks. However, the protocol still faces several security threats, specifically Denial of Service (DoS), replay attacks, Man in the Middle (MitM) attacks and the interleaving attacks, which is termed as Medium Access Control (MAC) layer attacks. This paper proposed a modified version PKM protocol for both unilateral and mutual authentication, which is termed as Self-organized Efficient Authentication and Key Management Scheme (SEAKS) authentication protocol. This protocol ensures secure end-to-end data transmission using distributed hop-by-hop authentication and localized key management schemes with a very simple and efficient way. The performance evaluation of the proposed schemes in terms of packet delivery ratio, packet overhead, processing time and the effect of increasing number of rogue relay stations is carried out and compared with the official draft of MMR WiMAX and the SEN XU. The result showed that our proposed scheme out-performed the base line protocols.en_US
dc.description.sponsorshipResearch Management Center, Universiti Teknologi Malaysia (UTM.J.02.02/12.23/1/3/1 Jld.4 (16)).en_US
dc.language.isoenen_US
dc.publisherIndian Journal of Science and Technologyen_US
dc.subjectDenial of Service, Hop-by-Hop Authentication, IEEE 802.16, MMR WiMAX Network, Security Issuesen_US
dc.titleSecure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networksen_US
dc.typeArticleen_US
Appears in Collections:Telecommunication Engineering

Files in This Item:
File Description SizeFormat 
Journal Paper 5.pdf1.34 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.