Abstract

Mobile multi-hop relay (MMR) WiMAX networks have attracted lots of interest in the wireless communication industry recently because of its scalable coverage, improved data rates and relatively low cost. However, security of MMR WiMAX networks is the main challenge. In this paper, we first identify a possible attack on MMR WiMAX networks in which a rogue base station (BS) or relay station (RS) can get authenticated and gain control over the connections. We also show that the current standard does not address this problem well. We then propose a set of new authentication protocols for protecting MMR WiMAX networks from rogue BS and rogue RS attacks. Our protocols provide centralized authentication by using a trusted authentication server to support mutual authentication between RS and BS, between RS and RS, and between MS and RS. Our protocols can also provide distributed authentication with a license issued by the trusted server.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.