Back
 CN  Vol.2 No.2 , May 2010
An Assessment of WiMax Security
Abstract: For a broadband wireless standard such as WiMax, security is important and must be addressed. This is to ensure wide acceptance both from the perspective of the end users and the service providers. In order to com-pete with existing broadband cable or DSL services, the WiMax network must offer comparable security. We discuss the WiMax security mechanisms for authentication, encryption, and availability. We also discuss potential threats to WiMax security. This paper will also discuss how and why these threats play an impor-tant role in the adaptability of WiMax.
Cite this paper: nullS. Ahuja and N. Collier, "An Assessment of WiMax Security," Communications and Network, Vol. 2 No. 2, 2010, pp. 134-137. doi: 10.4236/cn.2010.22020.
References

[1]   A. S. Tanenbaum, “Computer Networks,” 4th Edition, Prentice Hall, Inc., New Jersey, 2006.

[2]   http://en.wikipedia.org/wiki/WiMax

[3]   S. P. Ahuja and P. K. Potti, “Evolution of Wireless LAN Security,” International Conference on Parallel and Dis-tributed Processing Techniques and Applications, Las Vegas, 24-17 July 2008.

[4]   T. Sanders, “Premium Five Essential Elements of WiMax Security,” WiMax.com, November 2007.

[5]   http://myhsc.pbwiki.com/wimax::aaa

[6]   P. Korsenlowski, “Staying Safe in a WiMax World,” TechNewsWorld.com, 27 February 2007.

[7]   M. Barbeau, J. Hall and E. Kranakis, “Detecting Imper-sonation Attacks in Future Wireless and Mobile Net-works,” Secure Mobile Ad-hoc Networks and Sensors, Ottawa, 2006, pp. 80-95.

[8]   M. McDowell, “Understanding Denial of Service At-tacks,” National Cyber Alert System, 1 August 2007.

[9]   K. Youngwook, L. Hyoung-Kyu and B. Saewoong, “Shared Authentication Information for Preventing DDoS Attacks in Mobile WiMax Networks,” Proceedings of the 5th Consumer Communications and Networking Confe-rence, Las Vegas, 10-12 January 2008.

[10]   N. Beacham, “Man in the Middle (MITM) Attacks,” Technology and More, 28 June 2008.

[11]   J. M. Hartley, “WiFi and WiMax Protocols of Security,” December 2008. http://softwarecommunity.intel.com/articles/eng/3708.htm

[12]   R. Millman, “Security Experts See Vulnerablilites in WiMax,” WiMax.com, 17 October 2006.

[13]   M. Barbeau, “Threats: Threats to WiMax,” http://www. freewimaxinfo.com/physical-layer.html.

 
 
Top