{"title":"WiMAX安全算法的性能(RSA加密算法与ECC加密算法的比较研究)","authors":"Masood Habib, T. Mehmood, Fasee Ullah, M. Ibrahim","doi":"10.1109/ICCTD.2009.192","DOIUrl":null,"url":null,"abstract":"IEEE 802.16, known as WiMax, is at the top of communication technology drive because it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. A lot of security concerns are needed to secure a wireless network. By keeping in mind the importance of security, the WiMax working groups has designed several security mechanisms to provide protection against unauthorized access and malicious threats, but still facing a lot of challenging situations. An authentication and authorization model provides protection for a network or technology and protects its resources from unauthorized use. This paper examines the threats which are associated with MAC layer and physical layer of WiMax and also proposes some enhancements to the existing model for improving the performance of the encryption algorithm. The paper proposes some techniques in the existing model to enhance its functionality and capability. Simulation is done using Qualnet4.5 simulation tool and the results are given at the end.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"22","resultStr":"{\"title\":\"Performance of WiMAX Security Algorithm (The Comparative Study of RSA Encryption Algorithm with ECC Encryption Algorithm)\",\"authors\":\"Masood Habib, T. Mehmood, Fasee Ullah, M. Ibrahim\",\"doi\":\"10.1109/ICCTD.2009.192\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IEEE 802.16, known as WiMax, is at the top of communication technology drive because it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. A lot of security concerns are needed to secure a wireless network. By keeping in mind the importance of security, the WiMax working groups has designed several security mechanisms to provide protection against unauthorized access and malicious threats, but still facing a lot of challenging situations. An authentication and authorization model provides protection for a network or technology and protects its resources from unauthorized use. This paper examines the threats which are associated with MAC layer and physical layer of WiMax and also proposes some enhancements to the existing model for improving the performance of the encryption algorithm. The paper proposes some techniques in the existing model to enhance its functionality and capability. Simulation is done using Qualnet4.5 simulation tool and the results are given at the end.\",\"PeriodicalId\":269403,\"journal\":{\"name\":\"2009 International Conference on Computer Technology and Development\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"22\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Computer Technology and Development\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCTD.2009.192\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Computer Technology and Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTD.2009.192","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance of WiMAX Security Algorithm (The Comparative Study of RSA Encryption Algorithm with ECC Encryption Algorithm)
IEEE 802.16, known as WiMax, is at the top of communication technology drive because it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. A lot of security concerns are needed to secure a wireless network. By keeping in mind the importance of security, the WiMax working groups has designed several security mechanisms to provide protection against unauthorized access and malicious threats, but still facing a lot of challenging situations. An authentication and authorization model provides protection for a network or technology and protects its resources from unauthorized use. This paper examines the threats which are associated with MAC layer and physical layer of WiMax and also proposes some enhancements to the existing model for improving the performance of the encryption algorithm. The paper proposes some techniques in the existing model to enhance its functionality and capability. Simulation is done using Qualnet4.5 simulation tool and the results are given at the end.