What is it about?

This work reviews the state of art of WiMAX authentication mechanisms, namely, PKMv1, PKMv2, and the recent authentication protocols. We discuss their mechanisms, strengths, weaknesses, and potential countermeasures against each other. Our discussion is based on four categories, namely, enhancements, differences, advantages, and limitations.

Featured Image

Why is it important?

To help the researchers in the field of authentication protocols

Perspectives

The aim of this paper is twofold. The first aim is to present a comprehensive survey of existing and recent literature in the domain of WiMAX security, particularly on the authentication process. We attempt to assess the ongoing work in this area and consolidate existing results. Given that this paper surveys the WiMAX authentication techniques proposed in the last 7 years, we also describe some of the earlier works that are seminal to this area. Nevertheless, for a detailed exposition of techniques proposed before 2007, the reader is directed to the surveys in [8–13]. Our second aim is to identify and highlight the open problems and research challenges in this area.

Mr Kamal Ali Alezabi
UPM

Read the Original

This page is a summary of: Authentication process enhancements in WiMAX networks, Security and Communication Networks, August 2016, Wiley,
DOI: 10.1002/sec.1577.
You can read the full text:

Read

Contributors

The following have contributed to this page