Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Communications of the ACM
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Overview of IEEE 802.16 Security
IEEE Security and Privacy
Security issues in IEEE 802.11 wireless local area networks: a survey: Research Articles
Wireless Communications & Mobile Computing - Special Issue: Emerging WLAN Apllications and Technologies
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Your 80211 wireless network has no clothes
IEEE Wireless Communications
QoS differentiation for IEEE 802.16 WiMAX mesh networking
Mobile Networks and Applications
Secure roaming of key association scheme providing perfect forward secrecy in IEEE 802.16
CSNA '07 Proceedings of the IASTED International Conference on Communication Systems, Networks, and Applications
Polynomial based scheme (PBS) for establishing Authentic Associations in Wireless Mesh Networks
Journal of Parallel and Distributed Computing
Towards efficient and secure rekeying for IEEE 802.16e WiMAX networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
An efficient security framework for mobile WiMAX
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Hi-index | 0.00 |
IEEE 802.16 (WiMAX) has been seen as a promising technique for future mesh networks to provide broadband wireless access. Meanwhile, its security is becoming a critical issue with the proliferation of wireless threats in current IEEE 802.11 systems. Though incorporating some security methods in conventional onehop networks, IEEE 802.16 is still vulnerable to malicious attacks in multihop environments such as mesh networks. In this paper, we analyze the security of IEEE 802.16 standard in its Mesh mode, point out some security holes, and propose some solutions to deal with attacks to IEEE 802.16 mesh networks.