A SURVEY OF WIMAX SECURITY THREATS
1
Author(s):
DR.INDERJIT KAUR
Vol - 4, Issue- 1 ,
Page(s) : 167 - 184
(2013 )
DOI : https://doi.org/10.32804/IRJMST
Abstract
As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks in. This report is a survey of security vulnerabilities found in WiMAX network. Vulnerabilities and threats associated with both layers in WiMAX (physical and MAC layers) are discussed along with possible solutions.
- http://en.wikipedia.org/wiki/802.16
- http://en.wikipedia.org/wiki/WiMAX
- http://www.wimaxforum.org/about
- http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
- http://www.cse.wustl.edu/~jain/cse574-08/
- David Johnson and Jesse Walker, "Overview of IEEE 802.16 Security", Intel Corp, IEEE Security and Privacy, 2004
- http://portal.acm.org/citation.cfm?id=1009288
- Michel Barbeau, ?WiMax/802.16 Threat Analysis?, Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, Quebec, Canada 2005.
- http://portal.acm.org/citation.cfm?id=1089761.1089764
- Mahmoud Narsreldin, Heba Aslan, Magdy El-Hennawy, Adel El- ennawy, ?WiMAX
- security?, 22nd International Conference on Advanced Information Networking and Applications, 2008.
- http://portal.acm.org/citation.cfm?id=1395554
- Andreas Deininger, Shinsaku Kiyomoto, Jun Kurihara, Toshiaki Tanaka, Security Vulnerabilities and Solutions in Mobile WiMAX?, International Journal of Computer Science and Network Security, VOL.7 No.11, November 2007.
- http://paper.ijcsns.org/07_book/200711/20071102.pdf
- Abdelrahman Elleithy, Alaa Abuzaghleh, Abdelshakour Abuzneid, ?A new mechanism to solve IEEE 802.16 authentication vulnerabilities?, Computer Science and Engineering Department University of Bridgeport, Bridgeport, CT.
- http://www.asee.org/activities/organizations/zones/proceedings/zone1/200 /Professional/ASEE12008_0022_paper.pdf
- Tao Han, Ning Zhang, Kaiming Liu, Bihua Tang, Yuan'an Liu, ?Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions?, Mobile Ad Hoc and Sensor Systems, 2008. MASS 2008
- http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4660134
- Sen Xu, Chin-Tser Huang, ?Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions?, 3rd International Symposium on Wireless Communication Systems, ISWCS 2006.
- http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4362284
- Taeshik Shon, Wook Choi, ?An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions?, Lecture notes in computer science, Springer, 2007.
- http://www.springerlink.com/content/d03p14w7720x842l/
- Sheraz Naseer, Dr. Muhammad Younus, Attiq Ahmed, ?Vulnerabilities Exposing IEEE 802.16e Networks To DoS Attacks: A Survey?, Proceedings of the 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008.
- http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4617395
- R. Poisel, ?Modern Communications Jamming Principles and Techinques?, Artech House Publishers, 2003.
- Click here to order from Amazon.com
- Ayesha Altaf, Rabia Sirhindi, Attiq Ahmed, ?A Novel Approach against DoS Attacks in WiMAX Authentication using Visual Cryptography?, The Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE, Cap Esterel, France 2008.
- http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4622589
- D.W. Park, ?A Study of Packet Analysis regarding a DoS Attack in WiBro Environments?, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008.
- http://paper.ijcsns.org/07_book/200812/
- Methodius University, Skopje, Macedonia.
- http://2008.telfor.rs/files/radovi/02_32.pdf
- Last Modified: April 20, 2009. This and other papers on latest advances in network security are available on line at http://www.cse.wustl.edu /~jain/cse571-09/index.html Back to Raj Jain's Home Page
|