“WiMAX-WLAN Interface usingTORA, DSR and OLSR protocols with their evaluation under Wormhole Attack on VOICE and HTTP applications”
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: We are in advanced world of internet with new technologies in now these days. So many new wireless networks technologies have been emerged. WiMAX is one of the advanced technologies from those. Due to advancement, the security related issues has also been increased in this technology. Information Security has become one of the challenging and important tasks to maintain the confidentiality, integrity and availability of the information. This paper is all about the security of WiMAX technology. During the research we learn that there are several security related threats and attacks in this technology by which the adversary can perform several malicious activities. We also found some security methods which can be applied against several security related threats and attacks. The scope of this paper is to research the security related issues in the WiMAX technology and find the possible security solutions against that issues.
Authors and Affiliations
Sharanbeer Kaur , Shivani Khurana
Optimal Planning of the Production of Corpus Details on Metal Cutting Machines with the Help of Computer Numeric Control
Abstract: The optimal planning of details mechanical processing is a key problem, directly affecting the productivity and efficiency of the activity of a machine building company. The combinatorial character of the prob...
A Novel Method of Data Staging For Better Mobile User Accessibility through Cloud
Abstract: In this paper, we identify and create vantage sites to stage shared data items for the ease of mobile user accesses. As mobile users will be charged on the usage of communication bandwidth and for the amo...
Classification of Tumors in Human Brain MRI using Wavelet and Support Vector Machine
The task of classification in recovery systems is to differentiate between normal and abnormal brain. In this paper feature extraction from MR Images is carried out by DAUB-4 Wavelet method. DAUB-4 is an effici...
Use of MPSO To Break Transposition Cipher System
Particle swarm optimization (PSO) based cryptanalysis has acquired much attention because it has fast convergence rate. We investigate the use of Modify Particle Swarm Optimization (MPSO) with some modification in fitnes...
Analysis of Various Recommendation Systems
Abstract: In today’s world the only way to catch and keep user’s attention to one’s website is to provide them with the recommendation list to match the needs of user. In this paper the most popular and widely used recom...