A Review of Some Security Aspects of WiMAX and Converged Network

The future for WiMAX-based mobile wireless access is so bright. With the increasing popularity of WiMAX, it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. On the other s...

Full description

Saved in:
Bibliographic Details
Published in2010 Second International Conference on Communication Software and Networks pp. 372 - 376
Main Authors Habib, Masood, Ahmad, Masood
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.02.2010
Subjects
Online AccessGet full text
ISBN1424457262
9781424457267
DOI10.1109/ICCSN.2010.93

Cover

Abstract The future for WiMAX-based mobile wireless access is so bright. With the increasing popularity of WiMAX, it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. On the other side the trend is towards converged network in which the same networking infrastructure is used for both data and voice transmission. A lot of security concerns are needed to secure a converged network. This paper aims to review the study of WiMAX and converged network and security considerations for both the technologies. WiMAX security in converged network is studied. The security threats that can occur in converged network to WiMAX and countermeasures that can be taken against these threats are reviewed.
AbstractList The future for WiMAX-based mobile wireless access is so bright. With the increasing popularity of WiMAX, it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. On the other side the trend is towards converged network in which the same networking infrastructure is used for both data and voice transmission. A lot of security concerns are needed to secure a converged network. This paper aims to review the study of WiMAX and converged network and security considerations for both the technologies. WiMAX security in converged network is studied. The security threats that can occur in converged network to WiMAX and countermeasures that can be taken against these threats are reviewed.
Author Ahmad, Masood
Habib, Masood
Author_xml – sequence: 1
  givenname: Masood
  surname: Habib
  fullname: Habib, Masood
  email: masoodshalmani@gmail.com
  organization: Dept. of Comput. Sci., Shaheed Zulfikar Ali Bhutto Inst. of Sci. & Technol., Islamabad, Pakistan
– sequence: 2
  givenname: Masood
  surname: Ahmad
  fullname: Ahmad, Masood
  email: masood.ahmadpk@yahoo.com
  organization: Dept. of Comput. Sci., Nat. Univ. of Comput. & Emerging Sci., Peshawar, Pakistan
BookMark eNo1js1Kw0AYRUe0oKlZunIzL5D6zX9mZwj-FGoFU9BdmSTfyKhNShJb-vamqHdzOVw43IicNW2DhFwxmDEG9mae58VyxmFkK05IbE3KJJdSGW7kKYn-QfMJiTiAtVJYzc5J3PcfMEYqDiq9ILcZfcFdwD1tPS3aDdICq-8uDAea9Vushv44vIan7I26pqZ52-ywe8eaLnHYt93nJZl499Vj_NdTsrq_W-WPyeL5YZ5niyRYGJJSa28VeNCldQCpkp4po23pFatkZcraGoHHTwZq6ZVgFXcatJNOm1I6MSXXv9qAiOttFzauO6yVFKNEiB_Uu0tQ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCSN.2010.93
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9781424457274
1424457270
EndPage 376
ExternalDocumentID 5437693
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-b66f950f06b9a00854f15769bf51c4c7bd973e520570d4f531c2a606a4a67b4a3
IEDL.DBID RIE
ISBN 1424457262
9781424457267
IngestDate Wed Aug 27 07:44:56 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2009943961
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-b66f950f06b9a00854f15769bf51c4c7bd973e520570d4f531c2a606a4a67b4a3
PageCount 5
ParticipantIDs ieee_primary_5437693
PublicationCentury 2000
PublicationDate 2010-Feb.
PublicationDateYYYYMMDD 2010-02-01
PublicationDate_xml – month: 02
  year: 2010
  text: 2010-Feb.
PublicationDecade 2010
PublicationTitle 2010 Second International Conference on Communication Software and Networks
PublicationTitleAbbrev ICCSN
PublicationYear 2010
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000452058
Score 1.4949062
Snippet The future for WiMAX-based mobile wireless access is so bright. With the increasing popularity of WiMAX, it is gaining a great position in the next generation...
SourceID ieee
SourceType Publisher
StartPage 372
SubjectTerms Communication system security
Computer science
Computer security
Converged Network
Data security
Mobile communication
National security
Paper technology
Physical layer
Security mechanisms
Security threats
WiMAX
Wireless networks
Wireless Technologies
Title A Review of Some Security Aspects of WiMAX and Converged Network
URI https://ieeexplore.ieee.org/document/5437693
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED61nZgKtIi3PDCSNnUcO9moIqqC1AqpRXSr7PiMKkSCSrLw64nzaBFiYEvixbrodD7f9wC40UxoKhQ6xoxChwkaOLIoLI6gjJuA-7HAEiA759Nn9rjyVy243XFhELEEn-HAPpazfJ3Gub0qG_rMs9Z9bWiLgFdcrd19ipUGd_2g4W75gnLaSDrV72KvsTl8iKLFvEJ22ZnzD2eVsrBMujBrtlThSd4GeaYG8dcvtcb_7vkQ-nsKH3naFacjaGFyDN3Gw4HUKd2DuzGpxgMkNWSRviNZ1I52ZFyyMD_twstmNl4RmWgSWZT69hU1mVcA8j4sJ_fLaOrUrgrOJnQzR3FuQt81LlehtAcuZkZFzxEq449iFgulQ-GhjaVwNTNFisZUFl2OZJILxaR3Ap0kTfAUCA9CpEpKHaiAodJFr0ip0dzTiokY3TPo2XisPyrdjHUdivO_P1_AQTWZt1CRS-hk2xyvioKfqevyT38D13qlkg
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFH9BPOgJFYzf9uDRwej6sd0kiwQUFhMwciPt2hpiZAbHxb_edR9gjAdv23pp3vLy-vp-HwA3inCFudSOMd3AIRz7jsgKi8MxYcZnNOY6B8hGbPBMHmZ0VoPbDRdGa52Dz3TbPuazfJXEa3tV1qHEs9Z9O7BLCSG0YGttblSsOLhL_Yq9RTlmuBJ1Kt_5VmWzMwzDSVRgu-zU-Ye3Sl5a-g0YV5sqECVv7XUq2_HXL73G_-76AFpbEh962pSnQ6jp5RE0KhcHVCZ1E-56qBgQoMSgSfKu0aT0tEO9nIf5aRdeFuPeDImlQqHFqa9etUJRASFvwbR_Pw0HTumr4CwCN3UkYyagrnGZDIQ9chHTzbqOQBrajUnMpQq4p20suauIyZI0xiLrcwQRjEsivGOoL5OlPgHE_EBjKYTypU-0VFm3iLFRzFOS8Fi7p9C08Zh_FMoZ8zIUZ39_voa9wXQ8mo-G0eM57BdzegscuYB6ulrry6z8p_Iq_-vfudao3w
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+Second+International+Conference+on+Communication+Software+and+Networks&rft.atitle=A+Review+of+Some+Security+Aspects+of+WiMAX+and+Converged+Network&rft.au=Habib%2C+Masood&rft.au=Ahmad%2C+Masood&rft.date=2010-02-01&rft.pub=IEEE&rft.isbn=9781424457267&rft.spage=372&rft.epage=376&rft_id=info:doi/10.1109%2FICCSN.2010.93&rft.externalDocID=5437693
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424457267/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424457267/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424457267/sc.gif&client=summon&freeimage=true