Attacks and countermeasures on 802.16: Analysis and assessment

C Kolias, G Kambourakis… - … Surveys & Tutorials, 2012 - ieeexplore.ieee.org
The IEEE 802.16 technology, commonly referred to as WiMAX, gains momentum as an
option for broadband wireless communication access. So far, several research works focus …

Fast and secure multihop broadcast solutions for intervehicular communication

WB Jaballah, M Conti, M Mosbah… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Intervehicular communication (IVC) is an important emerging research area that is expected
to considerably contribute to traffic safety and efficiency. In this context, many possible IVC …

QoS-aware distributed security architecture for 4G multihop wireless networks

P Rengaraju, CH Lung… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Vehicular communications have received a great deal of attention in recent years due to the
demand for multimedia applications during travel and for improvements in safety. Safety …

A reliable group key management scheme for broadcast encryption

J Hur, Y Lee - Journal of Communications and Networks, 2016 - ieeexplore.ieee.org
A major challenge achieving scalable access control for a large number of subscribers in a
public broadcast is to distribute key update messages reliably to all stateless receivers …

[图书][B] Encyclopedia of Information Systems and Technology-Two Volume Set

PA Laplante - 2015 - books.google.com
Spanning the multi-disciplinary scope of information technology, the Encyclopedia of
Information Systems and Technology draws together comprehensive coverage of the inter …

Design of distributed security architecture for multihop WiMAX networks

P Rengaraju, CH Lung… - 2010 Eighth International …, 2010 - ieeexplore.ieee.org
In this paper, we study the current security standards in multihop WiMAX networks and their
security issues. For secured communications, hop-by-hop authentication is necessary for …

Securing recommendations in grouped P2P e-commerce trust model

F Musau, G Wang, S Yu… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
In dynamic peer to peer (P2P) e-commerce, it is an important and difficult problem to
promote online businesses without sacrificing the desired trust to secure transactions. In this …

Survey of Mobile WiMAX and its threats

G Narang, BV Lonavala, R Dadhich… - … Conference on ICT in …, 2016 - ieeexplore.ieee.org
4G is based on two core technologies LTE (Long-Term Evaluation) and Mobile WiMAX
(Worldwide Interoperability for Microwave Access). LTE and WiMAX system architectures …

5G broadcast/multicast security key refresh

SB Lee, M Griot, GB Horn - US Patent 11,671,824, 2023 - Google Patents
Typical wireless communication systems may employ multiple-access technologies capable
of supporting communication with multiple users by sharing available system resources …

An intrusion detection system based on WiMAX

B Zhou - Proceedings of 2011 International Conference on …, 2011 - ieeexplore.ieee.org
Through the analysis of some security vulnerabilities of WiMAX network and according to the
characteristics of the WiMAX network and the research status of intrusion detection, this …