Automated Secured Cost Effective Key Refreshing Technique to Enhance WiMAX Privacy Key Management
Download
WiMAX Security Presentation Transcript:
1.Automated Secured Cost Effective Key Refreshing Technique to Enhance WiMAX Privacy Key Management
2.Agenda
Introduction
Related works
Objective
Proposed work
Algorithm
Results obtained
References
3.Introduction
WiMAX (Worldwide Interoperability for Microwave Access) is an IP based 4G technology IEEE 802.16e(Mobile WiMAX) provides seamless broadband access for mobile users Security is provided by a separate security sublayer Key Management plays a vital role in WiMAX Security Synchronized & secure distribution of keying data from BS to MS – Privacy Key Management Protocol
4.WiMAX Security
5.Related Works
6.Existing Key Generation
7.Key Exchange
8.Inadequacies In Existing Work
9.Huge amount of bandwidth is utilized Large Storage is required Time consumption for key exchange is more Impersonation and Man in the middle attack
10.Objective
Automated Key Refreshing Technique is proposed in EAP based PKMv2 key generation To reduce the key exchange time & key storage
Effective utilization of bandwidth and resources
Also provide security by overcome Man in the Middle attacks and forgery attacks.
Download
WiMAX Security Presentation Transcript:
1.Automated Secured Cost Effective Key Refreshing Technique to Enhance WiMAX Privacy Key Management
2.Agenda
Introduction
Related works
Objective
Proposed work
Algorithm
Results obtained
References
3.Introduction
WiMAX (Worldwide Interoperability for Microwave Access) is an IP based 4G technology IEEE 802.16e(Mobile WiMAX) provides seamless broadband access for mobile users Security is provided by a separate security sublayer Key Management plays a vital role in WiMAX Security Synchronized & secure distribution of keying data from BS to MS – Privacy Key Management Protocol
4.WiMAX Security
5.Related Works
6.Existing Key Generation
7.Key Exchange
8.Inadequacies In Existing Work
9.Huge amount of bandwidth is utilized Large Storage is required Time consumption for key exchange is more Impersonation and Man in the middle attack
10.Objective
Automated Key Refreshing Technique is proposed in EAP based PKMv2 key generation To reduce the key exchange time & key storage
Effective utilization of bandwidth and resources
Also provide security by overcome Man in the Middle attacks and forgery attacks.
No comments:
Post a Comment