A Journey on WiMAX and its Security Issues

نویسندگان

  • Rakesh Kumar Jha
  • Upena D Dalal
چکیده

Security has become a primary concern in order to provide protected communication in Wireless environment. We know the basic concept of communication is sent the information from source node to destination node but in my view the communication is not sent the information but the amount of secure information which is sent from source node to destination node. The much anticipated technology for wireless broadband access, the WiMAX (Wireless Interoperability for Microwave Access) is finally starting to be available in the market with the aim to provide high data rates and provide interoperability of vendor devices at the same time. In this report we give an overview on the different performance evaluations that have been conducted on WiMAX systems and show the current capabilities and future trends in the WiMAX technology. As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks in. This report is a survey of security vulnerabilities found in WiMAX network. Vulnerabilities and threats associated with both layers in WiMAX (Physical and MAC layers). Keywords— WiMAX, Security Threats, Physical Layer, MAC Layer, Security Model, Towerstream, Authentication

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evolution of Wimax Technology, Security Issues and Available Solutions

Over the period, Wimax has under gone series of changes in its technologies with various new versions. In every version it has faced serious security threats and various attempts have been made to plug the security holes. In this paper we discuss about various security problems in each version and how they have been handled, here we give an overview of the evolution of Wimax Technology as well ...

متن کامل

Investigation of Security Issues in WiMAX Networks

In today's era of communication where wireless media is replacing wired media, security is of utmost concern. The WiMAX technology was developed after the analysis of security failures in IEEE 802.11 technology. As WiMAX has a very high coverage area, security becomes one of the most important issues. Both mobile and fixed WiMAX has many striking features like connection-oriented MAC layer, pre...

متن کامل

Security issues and proposed solutions concerning authentication and authorization for WiMAX (IEEE 802.16e)

In this paper, a research is described analyzing the solutions to the security issues in WiMAX (802.16e). At first a global overview of the technology WiMAX is given followed by an explanation of authentication and authorization for WiMAX. Then the security issues mentioned in literature are presented along with possible solutions. Next, the solutions are analyzed using criteria which are also ...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

A Security Architecture for Wimax Networks

Wimax is one of the fast growing technologies in the world as compare to other wireless networks. IEEE has defined standard IEEE 802.16 for Wimax. Wimax growing rapidly due to the services it’s provides and long range accessibility, but still Wimax facing a lot of security issues and threats like jamming , DDOS , Rogue Base station attack ,Reply Attack and so on.Wimax furnish different security...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010