[1]
|
A. S. Tanenbaum, “Computer Networks,” 4th Edition, Prentice Hall, Inc., New Jersey, 2006.
|
[2]
|
http://en.wikipedia.org/wiki/WiMax
|
[3]
|
S. P. Ahuja and P. K. Potti, “Evolution of Wireless LAN Security,” International Conference on Parallel and Dis-tributed Processing Techniques and Applications, Las Vegas, 24-17 July 2008.
|
[4]
|
T. Sanders, “Premium Five Essential Elements of WiMax Security,” WiMax.com, November 2007.
|
[5]
|
http://myhsc.pbwiki.com/wimax::aaa
|
[6]
|
P. Korsenlowski, “Staying Safe in a WiMax World,” TechNewsWorld.com, 27 February 2007.
|
[7]
|
M. Barbeau, J. Hall and E. Kranakis, “Detecting Imper-sonation Attacks in Future Wireless and Mobile Net-works,” Secure Mobile Ad-hoc Networks and Sensors, Ottawa, 2006, pp. 80-95.
|
[8]
|
M. McDowell, “Understanding Denial of Service At-tacks,” National Cyber Alert System, 1 August 2007.
|
[9]
|
K. Youngwook, L. Hyoung-Kyu and B. Saewoong, “Shared Authentication Information for Preventing DDoS Attacks in Mobile WiMax Networks,” Proceedings of the 5th Consumer Communications and Networking Confe-rence, Las Vegas, 10-12 January 2008.
|
[10]
|
N. Beacham, “Man in the Middle (MITM) Attacks,” Technology and More, 28 June 2008.
|
[11]
|
J. M. Hartley, “WiFi and WiMax Protocols of Security,” December 2008. http://softwarecommunity.intel.com/articles/eng/3708.htm
|
[12]
|
R. Millman, “Security Experts See Vulnerablilites in WiMax,” WiMax.com, 17 October 2006.
|
[13]
|
M. Barbeau, “Threats: Threats to WiMax,” http://www. freewimaxinfo.com/physical-layer.html.
|