Open Access Open Access  Restricted Access Subscription or Fee Access

Authentication Mechanism for Bandwidth Request Messages in Wi-MAX

Rohit Vaid, Kaushik Adhikary, Rajinder Kumar


The IEEE 802.16 standard defines the security sublayer basically used to provide privacy, authentication or confidentiality. WiMAX is the emerging solution in the market to replace DSL/fibre cable to provide backhaul connectivity to wifi hotspots in cheaper rate, but the demand of security is increased. This paper analyze the IEEE 802.16 standard, to investigate various vulnerabilities and to propose possible solutions to improve the security of Privacy Key Management protocol. We found out various attacks of bandwidth request messages,which arise question to home user for the use of WiMAX. We have proposed a new method to authenticate band width request message. The results that we have obtained after implementing the new authentication method is shown in the end of this paper.


Authentication Key, EAP, PKM, SAID, WiMAX

Full Text:



“Security Enhencement & Solution for Authentication Frame work in IEEE 802.16” by A.K.M. NAZMUS SAKIB in International Journal of Computer Science & Information Technology (IJCSIT), Vol 2, No 6, December 2010

“A Journey on WiMAX and its Security Issues” by Rakesh Kumar Jha#1, Dr Upena D Dalal in International Journal of Computer Science and Information Technologies, Vol. 1 (4) , 2010, 256-263

“Secure Access Authentication for Media Independent Information Service” by Guangsong Li1, 2, Qi Jiang1, Xi Chen1, and Jianfeng Ma1 in Proceedings of the Third International Symposium on Computer Science

and Computational Technology(ISCSCT ’10) Jiaozuo, P. R. China, 14-15, August 2010, pp. 409-413

“Efficient Distributed Authentication Key Scheme for Multi-hop Relay In IEEE 802.16j Network” by ADNAN SHAHID KHAN, NORSHEILA FISAL, SHARIFAH KAMILAH, MAZLAN ABBAS in international Journal of Engineering Science and Technology Vol. 2(6), 2010, 2192-2199

“AAS: An Authenticated Acknowledgement Based Scheme for Preventing Selfish Nodes in Mobile Ad Hoc Networks”, by M. Gunasekaran, P. Sampath and B. Gopalakrishnan in International Journal of Recent Trends in Engineering, Vol 1, No. 1, May 2009, page no. 294-298, 2009.

“Security Vulnerabilities and Solutions in Mobile WiMAX” by Andreas Deininger, Shinsaku Kiyomoto, Jun Kurihara, Toshiaki Tanaka” in IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.11, November 2007

”Security Issues in Privacy and Key Management Protocols of IEEE 802.16” by Sen Xu Manton Matthews Chin-Tser Huang, Department of Computer Science and Engineering, University of South Carolina, SC 29208, USA.

“ Analysis and Enhancement of BWR Mechanism in MAC 802.16 for WiMAX Networks “ by R. Bhakthavathsalam , R. ShashiKumar, V. Kiran, Y. R. Manjunath in International Journal of Advanced Computer Science and Applications Vol. 1, No. 5, November 2010


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.