Mutual Authentication in Fixed Wimax Computer Science Essay
The RSU is a stationary wireless device, e.g. WiFi, WiMAX, that is located along the road and acts as an intermediary between the TA and the vehicle OBU and transmits safety instructions to vehicles within range. 4. The OBU is a storage device mounted on a vehicle for receiving or transmitting important messages to other adjacent vehicles. An energy-efficient generalized digital certificate GDC-based mutual authentication protocol is proposed and the efficiency of the proposed work in defending attacks such as man-in-the-middle attack and rogue base station problem is analyzed. With emerging wireless technologies, ensuring security is a challenge due to limited energy. Mutual authentication, also called two-way authentication or website-to-user authentication, is a cybersecurity method. It ensures that both sides of a communication channel prove their identity to each other, and not just to one side. This ensures secure communication before it goes any further. WiMAX combines in a single technology the broadband typical of wired connections via fiber optic or DSL, the ability to connect to the Internet anywhere and with any device, as happens with Wi-Fi and the enormous possibilities. WiMax works with a single antenna to cover much larger areas, even up to kilometers with a band. The above procedure accomplishes three things: client authentication, server authentication, and mutual authentication between the client and the server. Also, the calculated values of different functions namely IDS, G n 1 and G n 2 are in line for both the client and server to be used in the next communication between the same client. Chen 12 proposes a secure wireless city architecture that has three network access methods, including: i Wi-Fi and/or Wi-Fi mesh, ii Mobile WiMAX, and iii Integration of fixed WiMAX and Wi-Fi. Moreover, it also becomes a crucial challenge to achieve mutual authentication and secure shared cryptographic key establishment in a resource-constrained architecture, i.e., with limited computing and communication capabilities. Li et al. 16 designed a scheme with anonymous mutual authentication and key agreement. In this paper, we propose a novel authentication scheme for cloud computing that can address these issues and also provide user anonymity. The trick we use is to use the password, smart card and public key technique to protect the user's authentication and key exchange processes. This paper presented a secure, lightweight approach to mutual authentication in the fog computing environment. The proposed system is lightweight compared to the existing solutions, is efficient, secure and ensures the anonymity of the end users. The formal security analysis using BAN logic proves that the proposed Cloud computing is a disruptive technology that has transformed the way people access and use computing resources. Due to the diversity of services and the complexity of environments, there is widespread interest in how to authenticate users within the same domain securely and efficiently. However, many traditional authentication. This paper proposes an efficient and lightweight mutual authentication protocol for MEC environments, based on Elliptic Curve Cryptography ECC, one-way hash functions and concatenation operations, and takes advantage of the advantages of discrete,