Security Issues of Wimax

Authors

  • V. Venkata Santosh B.Tech Student, CSE Department, GMR Institute of Technology, Rajam, Andhra Pradesh, India
  • Balajee Maram Assistant Professor, Department of CSE, GMR Institute of Technology, Rajam, Andhra Pradesh, India
  • V. Kumar Assistant Professor, Department of Computer Science, Central University of Kerala, Kasaragod, Kerala, India

DOI:

https://doi.org/10.53555/cse.v2i2.553

Keywords:

SECURITY, ISSUES, WIMAX

Abstract

WiMAX: worldwide interoperability for microwave access is newly emerging technology, which is under developing. The main difference from the Wi-Fi to WiMAX is the range i.e. it covers more area than that of Wi-Fi. But in the development process of the newly emerging technology also there are different issues to be considered in order to eliminate threats to security. The actual security techniques have been implementing in the physical and mac layers. So the threats to security also may occur in these two layers only. In this paper we will address the different types of layers and the functions of each layer which is other than protocol architecture, the different types of security solutions, and what are the different types of threats to physical and mac layers. 

Downloads

Download data is not yet available.

References

Mohammed shafeeq ahmed, department of computer science, Gulbarga university” A STUDY ON IEEE 802.16(WiMAX) ABD UTS SECURITY ISSUES”,2014.

Mitko bogdanoski,pero latkoski. Aleksandar risteski,”IEEE 802.16 Security Issues:A survey” 2008.

Aditya Kumar, Prof. P S Sharma, Prof vivek Kumar Gupta “Review of SecSolution in WiMAX (802.16e)” International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3965-3970.

Jamshed Hasan Edith “Security Issues of IEEE 802.16 (WiMAX)” 2006.

H. Kaur and J. Saini, “Review Paper on Performance Improvement of WiMAX using Coding Techniques, International Journal of Current Engineering and Technology, Vol. 3, No. 4”, October 2013.

A. Kumar, P. S. Sharma, V. K. Gupta, “Review of Security Threat and Solution in WiMAX (802.16e), International Journal of Scientific and Engineering Research, Vol. 4”, July 2013.

M. Barbeau, “WiMAX/802.16 threat analysis,” in Proceedings of the 1st ACM international workshop on Quality of service security in wireless and mobile networks, Quebec, June 2005 . [8] J. K. T. T. Andreas Deininger, Shinsaku Kiyomoto, “Security vulnerabilities and solutions in mobile wimax,” vol. 7, no. 11, Nov 2007.

M. E.-H. A. E.-H. Mahmoud Narsreldin, Heba Aslan, “Wimax security,” in 22nd International Conference on Advanced Information Networking and Applications, 2008, pp. 1335–1340.

W. C. Taeshik Shon, “An analysis of mobile wimax security: Vulnerabilities and solutions,” in Lecture notes in computer science, Springer, 2007

R. Poisel, “Modern communications jamming principles and techinques,” in Artech House Publishers, 2003.

A. A. Ayesha Altaf, Rabia Sirhindi, “A novel approach against dos attacks in wimax authentication using visual cryptography,” in The Second International Conference on Emerging Security Information, Systems and Technologies, securware, Cap Esterel, France, 2008. urity Threat and

Downloads

Published

2016-02-29

How to Cite

Santosh, V. V., Maram, B., & Kumar, V. . (2016). Security Issues of Wimax. International Journal For Research In Advanced Computer Science And Engineering, 2(2), 66–77. https://doi.org/10.53555/cse.v2i2.553