The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Successful "cracking" of bit-level security compromises network integrity and physical layer augmentation is being investigated to improve overall security. Intra-cellular security is addressed here using device-specific RF "Distinct Native Attribute" (RF-DNA) fingerprints in a localized regional air monitor, with targeted applications including cellular networks such as the Global...
Along with raptly development of wireless join technique, it's network security problem is increasing austerity. This paper introduces several relative mature network joining techniques at present, systemic explains wireless network security problem aiming at distinct techniques, proposes rational advices for security safety, and offers consult for security safety of multiform wireless network joining.
Wireless communication security is addressed using device-specific RF-DNA fingerprints in a localized regional air monitor. The targeted application includes IEEE 802.16 WiMax-based airport communications such as being proposed by the Euro control and FAA organizations-concept validation is currently underway using the Aeronautical Mobile Airport Communications System (AeroMACS) network. Security...
This paper presents a study of security advances and challenges associated with emergent 4G wireless technologies. The paper makes a number of contributions to the field. First, it studies the security standards evolution across different generations of wireless standards. Second, the security-related standards, architecture and design for the LTE and WiMAX technologies are analyzed. Third, security...
In this paper, we study the current security standards in multihop WiMAX networks and their security issues. For secured communications, hop-by-hop authentication is necessary for any multihop wireless networks [5][6]. WiMAX multihop networks provide default hop-by-hop authentication in a distributed security mode only. Apart from this, the multihop standards should consider the existing security...
High data rate transmissions in recent broadband wireless technologies such as WiMAX have caused them to be more vulnerable to security threats. Moreover, due to new application scopes, the security requirements of WiMAX networks have been escalated in this technology, transmission of high volume of Ranging Request (RNG-REQ) messages toward the base station (BS) can lead to exposure to Distributed...
With the development of wireless technologies, wireless networking market is thriving. IEEE 802.16J mobile multi-hop relay (MMR) network is likely to achieve great market success because it provides an attractive solution for the coverage extension and throughput enhancement of IEEE 802.16e network. However, security issues can restrain its development. IEEE standard 802.16J-2009 has been published...
Network Security represents a continuously moving target, which has to be reached in order to assure the desired level of confidentiality, integrity and availability for the network systems and services. In this case, one of the most important steps in setting up a new (WiMAX) network is the definition of the security plan. At the end of the paper, after taking it step by step, we will have an interdependent...
Wireless Networks based on WIFI or WIMAX become popular and are used in many places as compliment network to wired LAN to support mobility. There is performance issues associated with the usage of WLAN that put some restriction on adapting this technology everywhere. Securing the open access to avoid attacks at the physical and MAC layer with high speed performance during authentication is considered...
The report concerns the main ways of increasing security of communication channels of digital communication systems for departmental communication networks at the physical level.
The IEEE 802.16 standard (mobile broadband wireless access system), which is also known as worldwide interoperability for microwave access (WiMAX), is one of the latest technologies in the wireless world. The main goal of WiMAX is to deliver wireless communications with quality of service (QoS) guarantees, security, and mobility. In this article, we have evaluated the performance of the Internet Protocol...
One of the major challenges for Real-time applications over next-generation heterogeneous networks is the seamless vertical handoff. These applications require fast and efficient handover that realize service continuity and seamless mobility preserving the security and the QoS. In this paper we propose a new seamless vertical handover solution performing fast authentication while guaranteeing the...
In this paper, we study the rekeying issue in IEEE 802.16e WiMAX networks. The existing rekeying scheme the Multicast and Broadcast Rekeying Algorithm (MBRA) unicasts new keys to each subscriber station (SS). This scheme does not scale well since it incurs large communication overhead when the number of SSs increase. In our work, first we propose a general tree-based rekeying scheme, which is more...
WiMAX (Worldwide Interoperability for Microwave Access)/ IEEE 802.16 is a very promising 4G technology. WiMAX is now in the testing via implementation stage at various locations like Taiwan, India. The results have been, so far, very promising. With the growing popularity of WiMAX, the security risks have increased many folds. In this paper we will give an overview of the security architecture of...
The following topics are dealt with: protocols; wireless sensor networks; Web technology; optical networks; peer-to-peer computing; queueing theory; congestion control; IP networking; coding; WiMax; vehicular ad hoc network; and security.
Security support is mandatory for any communication networks. For wireless systems, security support is even more important to protect the users as well as the network. Since wireless medium is available to all, the attackers can easily access the network and the network becomes more vulnerable for the user and the network service provider. In the existing research, there is lack of integrated presentation...
Integrated WiFi and WiMAX network is of great potential for the future due to the high data transport capacity of WiFi and the wider coverage of WiMAX. Under an integrated architecture, a mobile station (MS) with dual-interface should be able to seamlessly roam between WiFi and WiMAX networks. In addition to network handover, a proper security model is recognized as a key issue for such a heterogeneous...
IEEE 802.16/Worldwide Interoperability for Microwave Access (WiMAX) technology is a very promising successor to the current wireless technologies like 3G, IEEE 802.11/WiFi. WiMAX incorporates a number of advanced techniques which make it stand apart from the current technologies. WiMAX has evolved quite a lot from the 802.16 standard which was approved in December, 2001. It now has different modes...
Security is amongst one of the major issues in broadband wireless access (BWA) networks. After the launch of the IEEE 802.16 standard (WiMAX), a number of security issues were reported in several articles. Ever since the beginning, work has been in progress for the neutralization of these identified threats. In this paper, the analysis of the authentication protocols implemented in WiMAX has been...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.