Privacy Key Management Protocols and Their Analysis in Mobile Multihop Relay WiMAX Networks

[1]  Antonio F. Gómez-Skarmeta,et al.  Providing security using IKEv2 in a vehicular network based on WiMAX technology , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[2]  Mir Md. Saki Kowsar,et al.  Shared key vulnerability in IEEE 802.16e: Analysis & solution , 2010, 2010 13th International Conference on Computer and Information Technology (ICCIT).

[3]  N. Nagarajan,et al.  Relay technologies and technical issues in IEEE 802.16j Mobile Multi-hop Relay (MMR) networks , 2013, J. Netw. Comput. Appl..

[4]  Joseph Chee,et al.  Improving Security in the IEEE 802.16 Standards , 2011, 2011 Eighth International Conference on Information Technology: New Generations.

[5]  Raheel M. Hashmi,et al.  Towards secure wirelessMAN: Revisiting and evaluating authentication in WiMAX , 2011, International Conference on Computer Networks and Information Technology.

[6]  N. Chauhan,et al.  Security Analysis of Identity Based Cryptography and Certificate Based in Wimax Network Using Omnet++ Simulator , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[7]  Chin-Tser Huang,et al.  Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions , 2006, 2006 3rd International Symposium on Wireless Communication Systems.

[8]  Nurul Nazirah Mohd. Imam Ma'arof,et al.  Security issues and modified version of PKM protocol in non-transparent multihop relay in IEEE 802.16j networks , 2011 .

[9]  Masakatsu Nishigaki,et al.  Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings , 2011, IWSEC.

[10]  M.P. Sebastian,et al.  A Revised Secure Authentication Protocol for IEEE 802.16 (e) , 2010, 2010 International Conference on Advances in Computer Engineering.

[11]  Karim Djouani,et al.  SPIN-Based Verification of Authentication Protocols in WiMAX Networks , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).

[12]  Goo Yeon Lee,et al.  Performance analysis of authentication and key distribution scheme for mobile multi-hop relay in IEEE 802.16j , 2011, Personal and Ubiquitous Computing.

[13]  Naixue Xiong,et al.  Security analysis and improvements of IEEE standard 802.16 in next generation wireless metropolitan access network , 2011, Wirel. Commun. Mob. Comput..

[14]  J. Sengathir,et al.  Root node attack in a WiMAX 802.16e network , 2010, Trendz in Information Sciences & Computing(TISC2010).

[15]  Chin-Tser Huang,et al.  Responding to Security Issues in WiMAX Networks , 2008, IT Professional.

[16]  Chung-Horng Lung,et al.  Design of distributed security architecture for multihop WiMAX networks , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[17]  Naser Movahhedinia,et al.  Traffic analysis for WiMAX network under DDoS attack , 2010, 2010 Second Pacific-Asia Conference on Circuits, Communications and System.

[18]  Hisashi Kobayashi,et al.  Modeling and analysis , 1978 .

[19]  Georgios Kambourakis,et al.  Attacks and Countermeasures on 802.16: Analysis and Assessment , 2013, IEEE Communications Surveys & Tutorials.