Attacks and Countermeasures on 802.16: Analysis and Assessment
暂无分享,去创建一个
[1] Michel Barbeau. WiMax/802.16 threat analysis , 2005, Q2SWinet '05.
[2] Romano Fantacci,et al. Security Analysis of IEEE 802.16 , 2007, 2007 IEEE International Conference on Communications.
[3] V. K. Govindan,et al. A Novel Initial Ranging Algorithm for mobile WiMAX (802.16e) , 2010 .
[4] Michel Barbeau,et al. Analysis of Threats to WiMax/802.16 Security , 2006 .
[5] Chin-Tser Huang,et al. Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions , 2006, 2006 3rd International Symposium on Wireless Communication Systems.
[6] Yu Zhang,et al. Collaborative attacks in WiMAX networks , 2009, Secur. Commun. Networks.
[7] Deepinder P. Sidhu,et al. Initialization vector attacks on the IPsec protocol suite , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).
[8] Eduardo B. Fernandez,et al. An Overview of WiMAX Security , 2018, WiMAX.
[9] Muhammad Younus,et al. Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.
[10] Peng Xu,et al. Notice of RetractionExperimental Research on a New Authentication Protocol for Wireless Communication Network Based on WiMAX , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[11] Chin-Tser Huang,et al. Responding to Security Issues in WiMAX Networks , 2008, IT Professional.
[12] David Johnston,et al. Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.
[13] Lei Lu,et al. A WPKI-Based Security Mechanism for IEEE 802.16e , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.
[14] Naser Movahhedinia,et al. Traffic analysis for WiMAX network under DDoS attack , 2010, 2010 Second Pacific-Asia Conference on Circuits, Communications and System.
[15] Dong-Ho Cho,et al. Performance Evaluation of Energy-Saving Mechanism Based on Probabilistic Sleep Interval Decision Algorithm in IEEE 802.16e , 2007, IEEE Transactions on Vehicular Technology.
[16] Li Tu,et al. An Improved Mutual Authentication Scheme in Multi-Hop WiMax Network , 2008, 2008 International Conference on Computer and Electrical Engineering.
[17] E. Eren. WiMAX Security Architecture - Analysis and Assessment , 2007, 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.
[18] Chin-Tser Huang,et al. Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR , 2008, 2008 IEEE International Symposium on Wireless Communication Systems.
[19] Mohammed Abdul Qadeer,et al. Security concerns in WiMAX , 2009, 2009 First Asian Himalayas International Conference on Internet.
[20] Karen A. Scarfone,et al. Guide to Securing WiMAX Wireless Communications , 2010 .
[21] Patrick P. C. Lee,et al. On the detection of signaling DoS attacks on 3G/WiMax wireless networks , 2009, Comput. Networks.
[22] Mir Md. Saki Kowsar,et al. WiMAX security analysis and enhancement , 2009, 2009 12th International Conference on Computers and Information Technology.
[23] G. S. Vernam. Cipher printing telegraph systems: For secret wire and radio telegraphic communications , 2022, Journal of the A.I.E.E..
[24] Sunghyun Choi,et al. Performance Analysis of Sleep Mode Operation in IEEE 802.16e Mobile Broadband Wireless Access Systems , 2006, 2006 IEEE 63rd Vehicular Technology Conference.
[25] Raheem A. Beyah,et al. Key challenges in securing WiMAX mesh networks , 2009, Secur. Commun. Networks.
[26] Bok-Min Goi,et al. Simulating denial of service attack using WiMAX experimental setup , 2011 .
[27] Lars R. Knudsen,et al. Block Ciphers: Analysis, Design and Applications , 1994 .
[28] M.P. Sebastian,et al. A Revised Secure Authentication Protocol for IEEE 802.16 (e) , 2010, 2010 International Conference on Advances in Computer Engineering.
[29] Virtual Bridged,et al. IEEE Standards for Local and Metropolitan Area Networks: Specification for 802.3 Full Duplex Operation , 1997, IEEE Std 802.3x-1997 and IEEE Std 802.3y-1997 (Supplement to ISO/IEC 8802-3: 1996/ANSI/IEEE Std 802.3, 1996 Edition).
[30] Teemupekka Virtanen,et al. Attacking Predictable IPsec ESP Initialization Vectors , 2002, ICICS.
[31] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[32] Ning Zhang,et al. Analysis of mobile WiMAX security: Vulnerabilities and solutions , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[33] Li Gong,et al. A security risk of depending on synchronized clocks , 1992, OPSR.
[34] Chin-Laung Lei,et al. A prevention approach to scrambling attacks in WiMAX networks , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.
[35] F. Ibikunle,et al. Security issues in mobile WiMAX (IEEE 802.16e) , 2009 .
[36] Jing Chi. A Novel Mechanism for Contention-based Initial Ranging in IEEE 802 . 16 e Networks , 2008 .
[37] Sherali Zeadally,et al. A Proposed Authentication Protocol for Mobile Users of WiMAX Networks , 2010, 2010 3rd International Conference on Human-Centric Computing.
[38] Saewoong Bahk,et al. Enhancing Security Using the Discarded Security Information in Mobile WiMAX Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[39] Jong Hyuk Park,et al. Novel Approaches to Enhance Mobile WiMAX Security , 2010, EURASIP J. Wirel. Commun. Netw..
[40] Richard R. Brooks,et al. Assessing the Effect of WiMAX System Parameter Settings on MAC-level Local DoS Vulnerability , 2012 .
[41] Krishnun Sansurooah. An assessment of threats of the Physical and MAC Address Layers in WiMAX/802.16 , 2006 .
[42] M. Younus Javed,et al. Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005 , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.
[43] Zhengjun Cao. How to Launch A Birthday Attack Against DES , 2008, IACR Cryptol. ePrint Arch..
[44] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[45] Lars R. Knudsen,et al. DES-X (or DESX) , 2005, Encyclopedia of Cryptography and Security.
[46] Yong-Hoon Choi,et al. Power Saving Mechanisms of IEEE 802.16e: Sleep Mode vs. Idle Mode , 2006, ISPA Workshops.
[47] Yuguang Fang,et al. Security of IEEE 802.16 in Mesh Mode , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[48] Mohsen Guizani,et al. Efficient rekeying algorithms for WiMAX networks , 2009, Secur. Commun. Networks.
[49] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[50] Weijia Jia,et al. Performance Improvement using Dynamic Contention Window Adjustment for Initial Ranging in IEEE 802.16 P2MP Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[51] Yusun Chang,et al. A Security Scheme for Centralized Scheduling in IEEE 802.16 Mesh Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[52] Saewoong Bahk,et al. Shared Authentication Information for Preventing DDoS attacks in Mobile WiMAX Networks , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.
[53] Chin-Tser Huang,et al. Secure Multicast in WiMAX , 2008, J. Networks.
[54] Pang Liaojun,et al. Key Management Protocol of the IEEE 802.16e , 2007 .
[55] Toshiaki Tanaka,et al. Security Vulnerabilities and Solutions in Mobile WiMAX , 2007 .
[56] Mohamad Yusoff Alias,et al. Potential denial of service attacks in IEEE802.16e-2005 networks , 2009, 2009 9th International Symposium on Communications and Information Technology.
[57] Ieee Microwave Theory,et al. IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems Draft Amendment: Management Information Base Extensions , 2007 .
[58] Georgios Kambourakis,et al. Revisiting WiMAX MBS security , 2010, Comput. Math. Appl..