Traffic Analysis for WiMAX

WiMAX is a broadband wireless technology uses radio transmission for high speed direct access to internet. It is similar to Wi-Fi in working but differs in coverage area, bandwidth and many other aspects. The work discusses various security challenges of WiMAX. Moreover, traffic analysis at different packet length is also presented over IEEE 802.16(e) network so as to give a clear picture of traffic flow in a WiMAX network.

[1]  Brijesh Kumar Chaurasia,et al.  Privacy preserving mutual authentication in WiMAX , 2013, Int. J. Inf. Technol. Commun. Convergence.

[2]  Li Tu,et al.  An Improved Mutual Authentication Scheme in Multi-Hop WiMax Network , 2008, 2008 International Conference on Computer and Electrical Engineering.

[3]  Jie Huang,et al.  Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations , 2011, 2011 IEEE International Conference on Communications (ICC).

[4]  David Johnston,et al.  Overview of IEEE 802.16 security , 2004, IEEE Security & Privacy Magazine.

[5]  Michel Barbeau WiMax/802.16 threat analysis , 2005, Q2SWinet '05.

[6]  Raheel M. Hashmi,et al.  Towards secure wirelessMAN: Revisiting and evaluating authentication in WiMAX , 2011, International Conference on Computer Networks and Information Technology.

[7]  Stuart Jacobs WiMAX subscriber and mobile station authentication challenges , 2011, IEEE Communications Magazine.

[8]  M. Younus Javed,et al.  Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005 , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.