Detection and Fortification Analysis of WiMAX Network: With Misbehavior Node Attack


Wireless networks are playing an imperative role in our daily existence; in current scenario, the users want wireless connectivity for all location with all types of service. One of the major challenges for wireless network is security issue. First and foremost task is to detect the security attacks in the network and the second task is to prevent from an authorized attacks. In our view, a lot of researches are going on and somehow we have succeeded in the first case but the second task is very tough due to wireless channel. Our research is based on how to avoid network attack i.e. misbehavior node attack in the WiMAX system. In this paper we have proposed an algorithm for WiMAX network and our algorithm are able to prevent fixed as well as mobile misbehavior node attacks. As we know, misbehavior node misbehaves in the sense that the node does not esteem its MAC protocols and avariciously sends its packets without any restriction (Flooding of packets) because it doesn't follow any protocol. Our proposed work based on the standard time required for communication for valid user with some threshold time for valid delay and some unwanted delay with network conditions. Our approach can control continuous flooding of packets and continuously transmits Constant Bit Rate (CBR) packets by misbehavior node, which introduces noise in the network and upset the performance of the network. In the mean while the valid user communicate in a trouble-free approach.

Share and Cite:

R. Jha, I. Bholebawa, U. Dalal and A. Wankhede, "Detection and Fortification Analysis of WiMAX Network: With Misbehavior Node Attack," International Journal of Communications, Network and System Sciences, Vol. 5 No. 6, 2012, pp. 353-367. doi: 10.4236/ijcns.2012.56046.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] R. Jha and U. D. Dalal, “Security Analysis of WiMAX Network: With Misbehavior Node Attack,” World Congress on Communication Technology, Mumbai, 11-14 December 2011, pp. 391-398.
[2] S. A. Ilyas, “WiMAX Standards and Security,” CRC Press, London, 2008.
[3] R. Jha and U. D. Dala, “A Journey on WiMAX and Its Security Issues,” International Journal of Computer Science and Information Technologies, Vol. 1, No. 4, 2010, pp. 256-263.
[4] N. Vassileva and Y. Koucheryavy “Guard Capacity Implementation in OPNET Modeler WiMAX Suite,” Ultra Modern Telecommunications & Workshops, St. Petersburg, 12-14 October 2009, pp. 1-6.
[5] J. G. Andrews, A. Ghosh and R. Muhammad, “Fundamentals of WiMAX Understanding Broadband Wireless Networking,” Prentice Hall, Saddle River, 2007.
[6] R. Jha and U. D. Dala, “Location Based Performance of WiMAX Network for QoS with Optimal Base Stations (BS),” Wireless Engineering and Technology, Vol. 2, No. 3, 2011, pp. 135-145. doi:10.4236/wet.2011.23020
[7] F. Ohrtman, “WiMAX Handbook Building 802.16 Wireless Networks,” McGraw-Hill, Boston, 2005.
[8] R. Jha and U. D. Dala, “Resource Allocation Downlink OFDMA in WiMAX Systems,” Proceedings of the 2011 International Conference on Communication, Computing & Security (ACM), Odisha, 12-14 February 2011, pp. 82-85.
[9] R. Jha and U. D. Dala, “A Performance of Security Aspets in WiMAX Physical Layer with Different Modulation Schemes,” Communications in Computer and Information Science, Vol. 125, 2011, pp. 443-440.
[10] S.-Y. Tang, “WiMAX Security and Quality of Service an End-to-End Prospective,” John Wiley & Sons, Hoboken, 2010. doi:10.1002/9780470665749
[11] R. Jha and U. D. Dala, “WiMAX System Simulation and Performance Analysis under the Influence of Jamming,” Wireless Engineering and Technology, Vol. 1, No. 1, 2010, pp. 20-26. doi:10.4236/wet.2010.11004
[12] R. K. Jha, A. V. Wankhede and U. D. Dalal, “Investigation of Internet Key Exchange (IKE) in Terms of Traffic Security with Gateway Security (GSE) in WiMAX Network,” IJCA Special Issue on Network Security and Cryptography (NSC), No. 1, 2011, pp. 59-66.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.