What is it about?
This work reviews the state of art of WiMAX authentication mechanisms, namely, PKMv1, PKMv2, and the recent authentication protocols. We discuss their mechanisms, strengths, weaknesses, and potential countermeasures against each other. Our discussion is based on four categories, namely, enhancements, differences, advantages, and limitations.
Featured Image
Why is it important?
To help the researchers in the field of authentication protocols
Perspectives
The aim of this paper is twofold. The first aim is to present a comprehensive survey of existing and recent literature in the domain of WiMAX security, particularly on the authentication process. We attempt to assess the ongoing work in this area and consolidate existing results. Given that this paper surveys the WiMAX authentication techniques proposed in the last 7 years, we also describe some of the earlier works that are seminal to this area. Nevertheless, for a detailed exposition of techniques proposed before 2007, the reader is directed to the surveys in [8–13]. Our second aim is to identify and highlight the open problems and research challenges in this area.
Mr Kamal Ali Alezabi
UPM
Read the Original
This page is a summary of: Authentication process enhancements in WiMAX networks, Security and Communication Networks, August 2016, Wiley,
DOI: 10.1002/sec.1577.
You can read the full text:
Contributors
The following have contributed to this page