Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(456.33KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Mutual authentication between base and subscriber station can improve the security of IEEE 802.16 Wimax network.
Mohammad Zavid Parvez, Mohammad Hossain, Mohammad Hamidul Islam
Pages - 292 - 301     |    Revised - 01-09-2011     |    Published - 05-10-2011
Published in International Journal of Engineering (IJE)
Volume - 5   Issue - 4    |    Publication Date - September / October 2011  Table of Contents
MORE INFORMATION
References   |   Cited By (2)   |   Abstracting & Indexing
KEYWORDS
WiMax, Authentication, Base station, Broadband connection, Security
ABSTRACT
High throughput broadband connection over long distance is greatly demanded in the present web application. IEEE 802.16/WiMax technology is one of the latest additions on internet broadband. When wireless devices are connected to the broadband wireless access, security comes on the front line to ensure the communication safe and protected from any kind of attacks or threats. Strong and effective security must be confirmed to make the wireless environment reliable and risk less. Base station authentication is an important part of WiMax security which must be confirmed to make the environment more secure. This paper derived the technique to secure the environment by confirming the authentication of base station.
CITED BY (2)  
1 Hossain, M., Muslima, U., & Islam, H. (2015). Security Analysis of Wireless Sensor Network. network, 2(1).
2 Chen, C. T. (2013). Improved efficient authentication scheme with anonymity in global mobility networks. International Journal of Innovative Computing, Information, and Control, 9(8), 3319-3339.
ABSTRACTING & INDEXING
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
REFERENCES
Derrick D. Boom “Denial of Service Vulnerabilities in IEEE 802.16 Wireless Networks” IEEE C802.16e-04/406.
Frank Ohrtman, WiMAX Handbook, building 802.16 WiMAX networks, McGraw-Hill 2005.
Hyung-Joon Kim, IEEE 802.16/WiMax Security, Dept. of Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, New Jersey, Unpublished.
Jamshed Hasan, School of Computer and Information Science, Edith Cowan University, Australia Security Issues of IEEE 802.16 (WiMax), http://scissec.scis.ecu.edu.au/conference_proceedings/2006/aism/Hasan%20- %20Security%20Issues%20of%20IEEE%20802.16%20(WiMAX).pdf.
Kejie Lu and Yi Qian, University of Puerto rico, Hsiao-Hwa Chen, National Sun Yat-Sen University. A Secure and Service-Oriented Network Control Framework for WiMax Networks, IEEE Communications Magazine, May 2007.
Loutfi Nuaymi, WiMAX Technology for Broadband Wireless Access, John Wiley & Son Ltd.
Mahmoud Nasreldin, Heba Aslan, Magdy El-Hennawy, Adel El- Hennawy. WiMax Security, 22nd International Conference on Advanced Information Networking and Applications Workshops 2008, p. 1335- 1340.
Michel Barbeau, School of Computer Science, Carleton University, Canada. WiMax Threat Analysis, Q2SWinet’05, October 13, 2005, Montreal, Quebec, Canada.
MANUSCRIPT AUTHORS
Mr. Mohammad Zavid Parvez
- Denmark
Mr. Mohammad Hossain
University of Information Technology and Sciences (UITS), Bangladesh - Bangladesh
reganmh8@gmail.com
Mr. Mohammad Hamidul Islam
- Sweden


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions