A Journey on WiMAX and its Security Issues
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 4
Abstract
Security has become a primary concern in order to provide protected communication in Wireless environment. We know the basic concept of communication is sent the information from source node to destination node but in my view the communication is not sent the information but the amount of secure information which is sent from source node to destination node. The much anticipated technology for wireless broadband access, the WiMAX (Wireless Interoperability for Microwave Access) is finally starting to be available in the market with the aim to provide high data rates and provide interoperability of vendor devices at the same time. In this report we give an overview on the different performance evaluations that have been conducted on WiMAX systems and show the current capabilities and future trends in the WiMAX technology. As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks in. This report is a survey of security vulnerabilities found in WiMAX network. Vulnerabilities and threats associated with both layers in WiMAX (Physical and MAC layers).
Authors and Affiliations
Rakesh Kumar Jha , Dr Upena D Dalal
NETWORK STORAGE AND ITS FUTURE
In the IT world storage becomes a serious issue. Information storage systems are the bedrock on which a modern company rests. Data has to be available to whoever needs it, whenever they need it, from...
An Approach to Secure Larger Size Data with Authenticity and Integrity
The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authen...
An Efficient Routing scheme for reliable path establishment among Mobile Devices in Heterogeneous Networks
In heterogeneous networks, devices available with varying connectivity help to provide many new opportunities for efficiently utilizing new resources. In mobile ad hoc networks with varying layered a...
Performance Analysis Of Guaranteed Packet Transfer In Coverage Area And Less Coverage Area For MANET
The main challenge in mobile adhoc network is guaranteed transfer of packet within coverage area and less coverage area. The hierarchical clustering is used to increase coverage area to reduce the packet loss in MANET.Th...
Securing Mobile Agent Using Dummy and Monitoring Mobile Agents
Mobile agent is a very important concept for distributed computing & utilizing the resources available on the connected network because of their capability of operation on different environments...