[1]
|
R. Jha and U. D. Dalal, “Security Analysis of WiMAX Network: With Misbehavior Node Attack,” World Congress on Communication Technology, Mumbai, 11-14 December 2011, pp. 391-398.
|
[2]
|
S. A. Ilyas, “WiMAX Standards and Security,” CRC Press, London, 2008.
|
[3]
|
R. Jha and U. D. Dala, “A Journey on WiMAX and Its Security Issues,” International Journal of Computer Science and Information Technologies, Vol. 1, No. 4, 2010, pp. 256-263.
|
[4]
|
N. Vassileva and Y. Koucheryavy “Guard Capacity Implementation in OPNET Modeler WiMAX Suite,” Ultra Modern Telecommunications & Workshops, St. Petersburg, 12-14 October 2009, pp. 1-6.
|
[5]
|
J. G. Andrews, A. Ghosh and R. Muhammad, “Fundamentals of WiMAX Understanding Broadband Wireless Networking,” Prentice Hall, Saddle River, 2007.
|
[6]
|
R. Jha and U. D. Dala, “Location Based Performance of WiMAX Network for QoS with Optimal Base Stations (BS),” Wireless Engineering and Technology, Vol. 2, No. 3, 2011, pp. 135-145. doi:10.4236/wet.2011.23020
|
[7]
|
F. Ohrtman, “WiMAX Handbook Building 802.16 Wireless Networks,” McGraw-Hill, Boston, 2005.
|
[8]
|
R. Jha and U. D. Dala, “Resource Allocation Downlink OFDMA in WiMAX Systems,” Proceedings of the 2011 International Conference on Communication, Computing & Security (ACM), Odisha, 12-14 February 2011, pp. 82-85.
|
[9]
|
R. Jha and U. D. Dala, “A Performance of Security Aspets in WiMAX Physical Layer with Different Modulation Schemes,” Communications in Computer and Information Science, Vol. 125, 2011, pp. 443-440.
|
[10]
|
S.-Y. Tang, “WiMAX Security and Quality of Service an End-to-End Prospective,” John Wiley & Sons, Hoboken, 2010. doi:10.1002/9780470665749
|
[11]
|
R. Jha and U. D. Dala, “WiMAX System Simulation and Performance Analysis under the Influence of Jamming,” Wireless Engineering and Technology, Vol. 1, No. 1, 2010, pp. 20-26. doi:10.4236/wet.2010.11004
|
[12]
|
R. K. Jha, A. V. Wankhede and U. D. Dalal, “Investigation of Internet Key Exchange (IKE) in Terms of Traffic Security with Gateway Security (GSE) in WiMAX Network,” IJCA Special Issue on Network Security and Cryptography (NSC), No. 1, 2011, pp. 59-66.
|