2010
DOI: 10.1155/2010/926275
|View full text |Cite
|
Sign up to set email alerts
|

Novel Approaches to Enhance Mobile WiMAX Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0
1

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(30 citation statements)
references
References 1 publication
0
29
0
1
Order By: Relevance
“…Security sub-layer architecture [3] Initially, WiMAX security was introduced in the security sub-layer of IEEE 802.16 standard [1]. After releasing the initial versions of the IEEE 802.16 standard, a number of articles such as in [8][9][10] criticized the security weaknesses of the standard, after which some security improvements were added in IEEE 802.16e [3] and IEEE 802.16m [11]. The security functions regarding key managements have been addressed by PKM protocol.…”
Section: Security Sub-layermentioning
confidence: 99%
“…Security sub-layer architecture [3] Initially, WiMAX security was introduced in the security sub-layer of IEEE 802.16 standard [1]. After releasing the initial versions of the IEEE 802.16 standard, a number of articles such as in [8][9][10] criticized the security weaknesses of the standard, after which some security improvements were added in IEEE 802.16e [3] and IEEE 802.16m [11]. The security functions regarding key managements have been addressed by PKM protocol.…”
Section: Security Sub-layermentioning
confidence: 99%
“…WiMAX (Worldwide Interoperability for Microwave Access) is also called 802.16 wireless intracity networks or 802.16 [2,3]. WiMAX is an emerging broadband wireless access technology, which can provide high-speed connection for Internet, data transmission farthest distance can be up to 50 km, can offer a broader regional service than Wi-Fi [4].…”
Section: B Wimaxmentioning
confidence: 99%
“…In [9], Shon et al also pointed out an attack on 802.16 security using Auth Invalid vulnerablility where the attacker [3] to improve the initial network entry security level. However, Shon et al [7] pointed out that the DH key exchange can cause overhead in distributing the initial DH random number.…”
Section: Related Workmentioning
confidence: 99%
“…Shon et al [9] proposed a countermeasure to the initial network entry vulnerability. Their proposed countermeasure works as follows:…”
Section: A Shon Et Al's Proposed Countermeasure To Initial Network Ementioning
confidence: 99%
See 1 more Smart Citation