Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/10826
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Khan, A. S. | - |
dc.contributor.author | Fisal, N. | - |
dc.contributor.author | Bakar, Z. A. | - |
dc.contributor.author | Salawu, N. | - |
dc.contributor.author | Maqbool, W. | - |
dc.contributor.author | Ullah, R. | - |
dc.contributor.author | Safdar, H. | - |
dc.date.accessioned | 2021-07-21T11:56:04Z | - |
dc.date.available | 2021-07-21T11:56:04Z | - |
dc.date.issued | 2014-03 | - |
dc.identifier.citation | A. S. Khan, N. Fisal, Z. A. Bakar, N. Salawu, W. Maqbool, R. Ullah and H. Safdar " Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks." Indian Journal of Science and Technology, Vol 7(3), 282–295, March 2014. ISSN (Print): 0974-6846, ISSN (Online): 0974-5645. Available online: http://www.indjst.org/index.php/indjst/article/view/47646/38663 | en_US |
dc.identifier.issn | ISSN (Print) : 0974-6846, ISSN (Online) : 0974-5645 | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/10826 | - |
dc.description.abstract | Mobile Multihop Relay (MMR) network is one of the emerging technologies, especially LTE-Advanced, WiMAX and the Smart grid communications. Ensuring security is one of the most imperative and challenging issues in MMR networks. Privacy Key Management (PKM) protocol is proposed to ensure the security measures in MMR networks. However, the protocol still faces several security threats, specifically Denial of Service (DoS), replay attacks, Man in the Middle (MitM) attacks and the interleaving attacks, which is termed as Medium Access Control (MAC) layer attacks. This paper proposed a modified version PKM protocol for both unilateral and mutual authentication, which is termed as Self-organized Efficient Authentication and Key Management Scheme (SEAKS) authentication protocol. This protocol ensures secure end-to-end data transmission using distributed hop-by-hop authentication and localized key management schemes with a very simple and efficient way. The performance evaluation of the proposed schemes in terms of packet delivery ratio, packet overhead, processing time and the effect of increasing number of rogue relay stations is carried out and compared with the official draft of MMR WiMAX and the SEN XU. The result showed that our proposed scheme out-performed the base line protocols. | en_US |
dc.description.sponsorship | Research Management Center, Universiti Teknologi Malaysia (UTM.J.02.02/12.23/1/3/1 Jld.4 (16)). | en_US |
dc.language.iso | en | en_US |
dc.publisher | Indian Journal of Science and Technology | en_US |
dc.subject | Denial of Service, Hop-by-Hop Authentication, IEEE 802.16, MMR WiMAX Network, Security Issues | en_US |
dc.title | Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks | en_US |
dc.type | Article | en_US |
Appears in Collections: | Telecommunication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Journal Paper 5.pdf | 1.34 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.