Proceedings of the 6th International Conference on Security of Information and Networks 2013
DOI: 10.1145/2523514.2523586
|View full text |Cite
|
Sign up to set email alerts
|

Addressing security challenges in WiMAX environment

Abstract: The primary motivation for this research is to focus on issues of WiMAX security problems and analyzes of vulnerabilities on IEEE 802.16, which is a new and promised topic in telecommunication and wireless networks. Mobile WiMAX system based on the IEEE 802.16e-2005 amendment has more improved security features than previous IEEE 802.16d-based WiMAX network system. WiMAX authentication is achieved by using public key interchange protocol privacy key management and it is supported by RSA cryptography exchange a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
7

Relationship

7
0

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…The proposed mechanisms and models offered variety of solution for different types of communication infrastructures and protection against different types of vulnerabilities from different aspects such as link encryption, end-to-end or message encryption perspective [31][32][33][34][35][36][37][38][39][40][41].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The proposed mechanisms and models offered variety of solution for different types of communication infrastructures and protection against different types of vulnerabilities from different aspects such as link encryption, end-to-end or message encryption perspective [31][32][33][34][35][36][37][38][39][40][41].…”
Section: Literature Reviewmentioning
confidence: 99%
“…However the emerging technology called "Blockchain" provided all these series of functions together free of charge. Even the deployment of different application in different environment, such as Big data and cloud environment become much easier and applicable due to security and flexibility of the blockchain environment [22][23].…”
Section: Related Workmentioning
confidence: 99%
“…Vehicular Ad Hoc Network (VANET) utilizes cars as a mobile node to create a mobile network [13]. Vehicles act as a mobile node with the corresponding network.…”
Section: Vehicular Ad Hoc Network (Vanet)mentioning
confidence: 99%