全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

An Assessment of WiMax Security

DOI: 10.4236/cn.2010.22020, PP. 134-137

Keywords: WiMax, WiMax Security, Service Provider

Full-Text   Cite this paper   Add to My Lib

Abstract:

For a broadband wireless standard such as WiMax, security is important and must be addressed. This is to ensure wide acceptance both from the perspective of the end users and the service providers. In order to com-pete with existing broadband cable or DSL services, the WiMax network must offer comparable security. We discuss the WiMax security mechanisms for authentication, encryption, and availability. We also discuss potential threats to WiMax security. This paper will also discuss how and why these threats play an impor-tant role in the adaptability of WiMax.

References

[1]  A. S. Tanenbaum, “Computer Networks,” 4th Edition, Prentice Hall, Inc., New Jersey, 2006.
[2]  http://en.wikipedia.org/wiki/WiMax
[3]  S. P. Ahuja and P. K. Potti, “Evolution of Wireless LAN Security,” International Conference on Parallel and Dis-tributed Processing Techniques and Applications, Las Vegas, 24-17 July 2008.
[4]  T. Sanders, “Premium Five Essential Elements of WiMax Security,” WiMax.com, November 2007.
[5]  http://myhsc.pbwiki.com/wimax::aaa
[6]  P. Korsenlowski, “Staying Safe in a WiMax World,” TechNewsWorld.com, 27 February 2007.
[7]  M. Barbeau, J. Hall and E. Kranakis, “Detecting Imper-sonation Attacks in Future Wireless and Mobile Net-works,” Secure Mobile Ad-hoc Networks and Sensors, Ottawa, 2006, pp. 80-95.
[8]  M. McDowell, “Understanding Denial of Service At-tacks,” National Cyber Alert System, 1 August 2007.
[9]  K. Youngwook, L. Hyoung-Kyu and B. Saewoong, “Shared Authentication Information for Preventing DDoS Attacks in Mobile WiMax Networks,” Proceedings of the 5th Consumer Communications and Networking Confe-rence, Las Vegas, 10-12 January 2008.
[10]  N. Beacham, “Man in the Middle (MITM) Attacks,” Technology and More, 28 June 2008.
[11]  J. M. Hartley, “WiFi and WiMax Protocols of Security,” December 2008. http://softwarecommunity.intel.com/articles/eng/3708.htm
[12]  R. Millman, “Security Experts See Vulnerablilites in WiMax,” WiMax.com, 17 October 2006.
[13]  M. Barbeau, “Threats: Threats to WiMax,” http://www. freewimaxinfo.com/physical-layer.html.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133