DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
IEEE Communications Magazine
A proactive wireless self-protection system
Proceedings of the 5th international conference on Pervasive services
Denial of service vulnerabilities in the 802.16 protocol
Proceedings of the 4th Annual International Conference on Wireless Internet
Secure roaming of key association scheme providing perfect forward secrecy in IEEE 802.16
CSNA '07 Proceedings of the IASTED International Conference on Communication Systems, Networks, and Applications
A network based approach to secure communication in mobile IP networks
WOC '08 Proceedings of the Eighth IASTED International Conference on Wireless and Optical Communications
Security issues in mobile WiMAX (IEEE 802.16e)
MWS'09 Proceedings of the 2009 IEEE conference on Mobile WiMAX
WiFi and WiMAX secure deployments
Journal of Computer Systems, Networks, and Communications - Special issue on WiMAX, LTE, and WiFi interworking
Threats analysis for e-learning
International Journal of Technology Enhanced Learning
Security of IEEE 802.16 in mesh mode
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A PMP-friendly MANET networking approach for WiMAX/IEEE 802.16
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Novel approaches to enhance mobile WiMAX security
EURASIP Journal on Wireless Communications and Networking - Special issue on multimedia communications over next generation wireless networks
Specification-based intrusion detection system for WiBro
ICHIT'11 Proceedings of the 5th international conference on Convergence and hybrid information technology
Threats to security in DSRC/WAVE
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Hi-index | 0.00 |
This paper examines threats to the security of the WiMax/ 802.16 broadband wireless access technology. Threats associated with the physical layer and MAC layer are reviewed in detail. The likelihood, impact and risk are evaluated according to a threat assessment methodology proposed by the ETSI. Threats are listed and ranked according to the level of risk they represent. This work can be used to prioritize future research directions in WiMax/802.16 security.