An Assessment of WiMax Security

.
DOI: 10.4236/cn.2010.22020   PDF   HTML     7,994 Downloads   14,671 Views   Citations

Abstract

For a broadband wireless standard such as WiMax, security is important and must be addressed. This is to ensure wide acceptance both from the perspective of the end users and the service providers. In order to com-pete with existing broadband cable or DSL services, the WiMax network must offer comparable security. We discuss the WiMax security mechanisms for authentication, encryption, and availability. We also discuss potential threats to WiMax security. This paper will also discuss how and why these threats play an impor-tant role in the adaptability of WiMax.

Share and Cite:

S. Ahuja and N. Collier, "An Assessment of WiMax Security," Communications and Network, Vol. 2 No. 2, 2010, pp. 134-137. doi: 10.4236/cn.2010.22020.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] A. S. Tanenbaum, “Computer Networks,” 4th Edition, Prentice Hall, Inc., New Jersey, 2006.
[2] http://en.wikipedia.org/wiki/WiMax
[3] S. P. Ahuja and P. K. Potti, “Evolution of Wireless LAN Security,” International Conference on Parallel and Dis-tributed Processing Techniques and Applications, Las Vegas, 24-17 July 2008.
[4] T. Sanders, “Premium Five Essential Elements of WiMax Security,” WiMax.com, November 2007.
[5] http://myhsc.pbwiki.com/wimax::aaa
[6] P. Korsenlowski, “Staying Safe in a WiMax World,” TechNewsWorld.com, 27 February 2007.
[7] M. Barbeau, J. Hall and E. Kranakis, “Detecting Imper-sonation Attacks in Future Wireless and Mobile Net-works,” Secure Mobile Ad-hoc Networks and Sensors, Ottawa, 2006, pp. 80-95.
[8] M. McDowell, “Understanding Denial of Service At-tacks,” National Cyber Alert System, 1 August 2007.
[9] K. Youngwook, L. Hyoung-Kyu and B. Saewoong, “Shared Authentication Information for Preventing DDoS Attacks in Mobile WiMax Networks,” Proceedings of the 5th Consumer Communications and Networking Confe-rence, Las Vegas, 10-12 January 2008.
[10] N. Beacham, “Man in the Middle (MITM) Attacks,” Technology and More, 28 June 2008.
[11] J. M. Hartley, “WiFi and WiMax Protocols of Security,” December 2008. http://softwarecommunity.intel.com/articles/eng/3708.htm
[12] R. Millman, “Security Experts See Vulnerablilites in WiMax,” WiMax.com, 17 October 2006.
[13] M. Barbeau, “Threats: Threats to WiMax,” http://www. freewimaxinfo.com/physical-layer.html.

  
comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.