Security Issues of Wimax
DOI:
https://doi.org/10.53555/cse.v2i2.553Keywords:
SECURITY, ISSUES, WIMAXAbstract
WiMAX: worldwide interoperability for microwave access is newly emerging technology, which is under developing. The main difference from the Wi-Fi to WiMAX is the range i.e. it covers more area than that of Wi-Fi. But in the development process of the newly emerging technology also there are different issues to be considered in order to eliminate threats to security. The actual security techniques have been implementing in the physical and mac layers. So the threats to security also may occur in these two layers only. In this paper we will address the different types of layers and the functions of each layer which is other than protocol architecture, the different types of security solutions, and what are the different types of threats to physical and mac layers.
Downloads
References
Mohammed shafeeq ahmed, department of computer science, Gulbarga university” A STUDY ON IEEE 802.16(WiMAX) ABD UTS SECURITY ISSUES”,2014.
Mitko bogdanoski,pero latkoski. Aleksandar risteski,”IEEE 802.16 Security Issues:A survey” 2008.
Aditya Kumar, Prof. P S Sharma, Prof vivek Kumar Gupta “Review of SecSolution in WiMAX (802.16e)” International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3965-3970.
Jamshed Hasan Edith “Security Issues of IEEE 802.16 (WiMAX)” 2006.
H. Kaur and J. Saini, “Review Paper on Performance Improvement of WiMAX using Coding Techniques, International Journal of Current Engineering and Technology, Vol. 3, No. 4”, October 2013.
A. Kumar, P. S. Sharma, V. K. Gupta, “Review of Security Threat and Solution in WiMAX (802.16e), International Journal of Scientific and Engineering Research, Vol. 4”, July 2013.
M. Barbeau, “WiMAX/802.16 threat analysis,” in Proceedings of the 1st ACM international workshop on Quality of service security in wireless and mobile networks, Quebec, June 2005 . [8] J. K. T. T. Andreas Deininger, Shinsaku Kiyomoto, “Security vulnerabilities and solutions in mobile wimax,” vol. 7, no. 11, Nov 2007.
M. E.-H. A. E.-H. Mahmoud Narsreldin, Heba Aslan, “Wimax security,” in 22nd International Conference on Advanced Information Networking and Applications, 2008, pp. 1335–1340.
W. C. Taeshik Shon, “An analysis of mobile wimax security: Vulnerabilities and solutions,” in Lecture notes in computer science, Springer, 2007
R. Poisel, “Modern communications jamming principles and techinques,” in Artech House Publishers, 2003.
A. A. Ayesha Altaf, Rabia Sirhindi, “A novel approach against dos attacks in wimax authentication using visual cryptography,” in The Second International Conference on Emerging Security Information, Systems and Technologies, securware, Cap Esterel, France, 2008. urity Threat and
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 gnpublication@
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
In consideration of the journal, Green Publication taking action in reviewing and editing our manuscript, the authors undersigned hereby transfer, assign, or otherwise convey all copyright ownership to the Editorial Office of the Green Publication in the event that such work is published in the journal. Such conveyance covers any product that may derive from the published journal, whether print or electronic. Green Publication shall have the right to register copyright to the Article in its name as claimant, whether separately
or as part of the journal issue or other medium in which the Article is included.
By signing this Agreement, the author(s), and in the case of a Work Made For Hire, the employer, jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties, and that the Article has not been published elsewhere, and is not being considered for publication elsewhere in any form, except as provided herein. Each author’s signature should appear below. The signing author(s) (and, in