“WiMAX-WLAN Interface usingTORA, DSR and OLSR protocols with their evaluation under Wormhole Attack on VOICE and HTTP applications”

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3

Abstract

 Abstract: We are in advanced world of internet with new technologies in now these days. So many new wireless networks technologies have been emerged. WiMAX is one of the advanced technologies from those. Due to advancement, the security related issues has also been increased in this technology. Information Security has become one of the challenging and important tasks to maintain the confidentiality, integrity and availability of the information. This paper is all about the security of WiMAX technology. During the research we learn that there are several security related threats and attacks in this technology by which the adversary can perform several malicious activities. We also found some security methods which can be applied against several security related threats and attacks. The scope of this paper is to research the security related issues in the WiMAX technology and find the possible security solutions against that issues.

Authors and Affiliations

Sharanbeer Kaur , Shivani Khurana

Keywords

Related Articles

Optimal Planning of the Production of Corpus Details on Metal Cutting Machines with the Help of Computer Numeric Control

Abstract: The optimal planning of details mechanical processing is a key problem, directly affecting the productivity and efficiency of the activity of a machine building company. The combinatorial character of the prob...

 A Novel Method of Data Staging For Better Mobile User Accessibility through Cloud

 Abstract: In this paper, we identify and create vantage sites to stage shared data items for the ease of mobile user accesses. As mobile users will be charged on the usage of communication bandwidth and for the amo...

 Classification of Tumors in Human Brain MRI using Wavelet and Support Vector Machine

 The task of classification in recovery systems is to differentiate between normal and abnormal brain. In this paper feature extraction from MR Images is carried out by DAUB-4 Wavelet method. DAUB-4 is an effici...

Use of MPSO To Break Transposition Cipher System

Particle swarm optimization (PSO) based cryptanalysis has acquired much attention because it has fast convergence rate. We investigate the use of Modify Particle Swarm Optimization (MPSO) with some modification in fitnes...

Analysis of Various Recommendation Systems

Abstract: In today’s world the only way to catch and keep user’s attention to one’s website is to provide them with the recommendation list to match the needs of user. In this paper the most popular and widely used recom...

Download PDF file
  • EP ID EP131768
  • DOI 10.9790/0661-16398086
  • Views 84
  • Downloads 0

How To Cite

Sharanbeer Kaur, Shivani Khurana (2014).  “WiMAX-WLAN Interface usingTORA, DSR and OLSR protocols with their evaluation under Wormhole Attack on VOICE and HTTP applications”. IOSR Journals (IOSR Journal of Computer Engineering), 16(3), 80-96. https://europub.co.uk/articles/-A-131768