International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 125    Submit Your Rating     Cite This   Download        Certificate

A SURVEY OF WIMAX SECURITY THREATS

    1 Author(s):  DR.INDERJIT KAUR

Vol -  4, Issue- 1 ,         Page(s) : 167 - 184  (2013 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks in. This report is a survey of security vulnerabilities found in WiMAX network. Vulnerabilities and threats associated with both layers in WiMAX (physical and MAC layers) are discussed along with possible solutions.

order online

  1.  http://en.wikipedia.org/wiki/802.16
  2.   http://en.wikipedia.org/wiki/WiMAX
  3.       http://www.wimaxforum.org/about
  4.   http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
  5.  http://www.cse.wustl.edu/~jain/cse574-08/
  6. David Johnson and Jesse Walker, "Overview of IEEE 802.16 Security", Intel Corp, IEEE Security and Privacy, 2004
  7. http://portal.acm.org/citation.cfm?id=1009288
  8. Michel Barbeau, ?WiMax/802.16 Threat Analysis?, Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, Quebec, Canada 2005.
  9. http://portal.acm.org/citation.cfm?id=1089761.1089764

  10. Mahmoud Narsreldin, Heba Aslan, Magdy El-Hennawy, Adel El- ennawy, ?WiMAX
  11. security?, 22nd International Conference on Advanced Information Networking and  Applications, 2008.
  12. http://portal.acm.org/citation.cfm?id=1395554
  13. Andreas Deininger, Shinsaku Kiyomoto, Jun Kurihara, Toshiaki Tanaka,  Security Vulnerabilities and Solutions in Mobile WiMAX?, International Journal of Computer Science and Network Security, VOL.7 No.11, November 2007.
  14. http://paper.ijcsns.org/07_book/200711/20071102.pdf
  15. Abdelrahman Elleithy, Alaa Abuzaghleh, Abdelshakour Abuzneid, ?A new mechanism to solve IEEE 802.16 authentication vulnerabilities?, Computer Science and Engineering Department University of Bridgeport, Bridgeport, CT.
  16. http://www.asee.org/activities/organizations/zones/proceedings/zone1/200 /Professional/ASEE12008_0022_paper.pdf
  17. Tao Han, Ning Zhang, Kaiming Liu, Bihua Tang, Yuan'an Liu, ?Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions?, Mobile Ad Hoc and Sensor Systems, 2008. MASS 2008
  18. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4660134
  19. Sen Xu, Chin-Tser Huang, ?Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions?, 3rd International Symposium on Wireless Communication Systems, ISWCS 2006.
  20. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4362284
  21. Taeshik Shon, Wook Choi, ?An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions?, Lecture notes in computer science, Springer, 2007.
  22. http://www.springerlink.com/content/d03p14w7720x842l/
  23. Sheraz Naseer, Dr. Muhammad Younus, Attiq Ahmed, ?Vulnerabilities Exposing IEEE 802.16e Networks To DoS Attacks: A Survey?, Proceedings of the 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2008.
  24. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4617395
  25. R. Poisel, ?Modern Communications Jamming Principles and Techinques?, Artech House Publishers, 2003.
  26. Click here to order from Amazon.com
  27. Ayesha Altaf, Rabia Sirhindi, Attiq Ahmed, ?A Novel Approach against DoS Attacks in WiMAX Authentication using Visual Cryptography?, The Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE, Cap Esterel, France 2008.
  28. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4622589
  29. D.W. Park, ?A Study of Packet Analysis regarding a DoS Attack in WiBro Environments?, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008.
  30. http://paper.ijcsns.org/07_book/200812/
  31.  Methodius University, Skopje, Macedonia.
  32. http://2008.telfor.rs/files/radovi/02_32.pdf
  33. Last Modified: April 20, 2009. This and other papers on latest advances in network security are available on line at http://www.cse.wustl.edu /~jain/cse571-09/index.html Back to Raj Jain's Home Page

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details