A Review of Some Security Aspects of WiMAX and Converged Network
The future for WiMAX-based mobile wireless access is so bright. With the increasing popularity of WiMAX, it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. On the other s...
Saved in:
| Published in | 2010 Second International Conference on Communication Software and Networks pp. 372 - 376 |
|---|---|
| Main Authors | , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.02.2010
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 1424457262 9781424457267 |
| DOI | 10.1109/ICCSN.2010.93 |
Cover
| Abstract | The future for WiMAX-based mobile wireless access is so bright. With the increasing popularity of WiMAX, it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. On the other side the trend is towards converged network in which the same networking infrastructure is used for both data and voice transmission. A lot of security concerns are needed to secure a converged network. This paper aims to review the study of WiMAX and converged network and security considerations for both the technologies. WiMAX security in converged network is studied. The security threats that can occur in converged network to WiMAX and countermeasures that can be taken against these threats are reviewed. |
|---|---|
| AbstractList | The future for WiMAX-based mobile wireless access is so bright. With the increasing popularity of WiMAX, it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. On the other side the trend is towards converged network in which the same networking infrastructure is used for both data and voice transmission. A lot of security concerns are needed to secure a converged network. This paper aims to review the study of WiMAX and converged network and security considerations for both the technologies. WiMAX security in converged network is studied. The security threats that can occur in converged network to WiMAX and countermeasures that can be taken against these threats are reviewed. |
| Author | Ahmad, Masood Habib, Masood |
| Author_xml | – sequence: 1 givenname: Masood surname: Habib fullname: Habib, Masood email: masoodshalmani@gmail.com organization: Dept. of Comput. Sci., Shaheed Zulfikar Ali Bhutto Inst. of Sci. & Technol., Islamabad, Pakistan – sequence: 2 givenname: Masood surname: Ahmad fullname: Ahmad, Masood email: masood.ahmadpk@yahoo.com organization: Dept. of Comput. Sci., Nat. Univ. of Comput. & Emerging Sci., Peshawar, Pakistan |
| BookMark | eNo1js1Kw0AYRUe0oKlZunIzL5D6zX9mZwj-FGoFU9BdmSTfyKhNShJb-vamqHdzOVw43IicNW2DhFwxmDEG9mae58VyxmFkK05IbE3KJJdSGW7kKYn-QfMJiTiAtVJYzc5J3PcfMEYqDiq9ILcZfcFdwD1tPS3aDdICq-8uDAea9Vushv44vIan7I26pqZ52-ywe8eaLnHYt93nJZl499Vj_NdTsrq_W-WPyeL5YZ5niyRYGJJSa28VeNCldQCpkp4po23pFatkZcraGoHHTwZq6ZVgFXcatJNOm1I6MSXXv9qAiOttFzauO6yVFKNEiB_Uu0tQ |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICCSN.2010.93 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9781424457274 1424457270 |
| EndPage | 376 |
| ExternalDocumentID | 5437693 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
| ID | FETCH-LOGICAL-i90t-b66f950f06b9a00854f15769bf51c4c7bd973e520570d4f531c2a606a4a67b4a3 |
| IEDL.DBID | RIE |
| ISBN | 1424457262 9781424457267 |
| IngestDate | Wed Aug 27 07:44:56 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCN | 2009943961 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-b66f950f06b9a00854f15769bf51c4c7bd973e520570d4f531c2a606a4a67b4a3 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_5437693 |
| PublicationCentury | 2000 |
| PublicationDate | 2010-Feb. |
| PublicationDateYYYYMMDD | 2010-02-01 |
| PublicationDate_xml | – month: 02 year: 2010 text: 2010-Feb. |
| PublicationDecade | 2010 |
| PublicationTitle | 2010 Second International Conference on Communication Software and Networks |
| PublicationTitleAbbrev | ICCSN |
| PublicationYear | 2010 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000452058 |
| Score | 1.4949062 |
| Snippet | The future for WiMAX-based mobile wireless access is so bright. With the increasing popularity of WiMAX, it is gaining a great position in the next generation... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 372 |
| SubjectTerms | Communication system security Computer science Computer security Converged Network Data security Mobile communication National security Paper technology Physical layer Security mechanisms Security threats WiMAX Wireless networks Wireless Technologies |
| Title | A Review of Some Security Aspects of WiMAX and Converged Network |
| URI | https://ieeexplore.ieee.org/document/5437693 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED61nZgKtIi3PDCSNnUcO9moIqqC1AqpRXSr7PiMKkSCSrLw64nzaBFiYEvixbrodD7f9wC40UxoKhQ6xoxChwkaOLIoLI6gjJuA-7HAEiA759Nn9rjyVy243XFhELEEn-HAPpazfJ3Gub0qG_rMs9Z9bWiLgFdcrd19ipUGd_2g4W75gnLaSDrV72KvsTl8iKLFvEJ22ZnzD2eVsrBMujBrtlThSd4GeaYG8dcvtcb_7vkQ-nsKH3naFacjaGFyDN3Gw4HUKd2DuzGpxgMkNWSRviNZ1I52ZFyyMD_twstmNl4RmWgSWZT69hU1mVcA8j4sJ_fLaOrUrgrOJnQzR3FuQt81LlehtAcuZkZFzxEq449iFgulQ-GhjaVwNTNFisZUFl2OZJILxaR3Ap0kTfAUCA9CpEpKHaiAodJFr0ip0dzTiokY3TPo2XisPyrdjHUdivO_P1_AQTWZt1CRS-hk2xyvioKfqevyT38D13qlkg |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFH9BPOgJFYzf9uDRwej6sd0kiwQUFhMwciPt2hpiZAbHxb_edR9gjAdv23pp3vLy-vp-HwA3inCFudSOMd3AIRz7jsgKi8MxYcZnNOY6B8hGbPBMHmZ0VoPbDRdGa52Dz3TbPuazfJXEa3tV1qHEs9Z9O7BLCSG0YGttblSsOLhL_Yq9RTlmuBJ1Kt_5VmWzMwzDSVRgu-zU-Ye3Sl5a-g0YV5sqECVv7XUq2_HXL73G_-76AFpbEh962pSnQ6jp5RE0KhcHVCZ1E-56qBgQoMSgSfKu0aT0tEO9nIf5aRdeFuPeDImlQqHFqa9etUJRASFvwbR_Pw0HTumr4CwCN3UkYyagrnGZDIQ9chHTzbqOQBrajUnMpQq4p20suauIyZI0xiLrcwQRjEsivGOoL5OlPgHE_EBjKYTypU-0VFm3iLFRzFOS8Fi7p9C08Zh_FMoZ8zIUZ39_voa9wXQ8mo-G0eM57BdzegscuYB6ulrry6z8p_Iq_-vfudao3w |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+Second+International+Conference+on+Communication+Software+and+Networks&rft.atitle=A+Review+of+Some+Security+Aspects+of+WiMAX+and+Converged+Network&rft.au=Habib%2C+Masood&rft.au=Ahmad%2C+Masood&rft.date=2010-02-01&rft.pub=IEEE&rft.isbn=9781424457267&rft.spage=372&rft.epage=376&rft_id=info:doi/10.1109%2FICCSN.2010.93&rft.externalDocID=5437693 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424457267/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424457267/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424457267/sc.gif&client=summon&freeimage=true |