Author_Institution :
Electr. & Inf. Eng. Dept., Covenant Univ., Ota, Nigeria
Abstract :
Notice of Violation of IEEE Publication Principles
"Security Issues in Mobile WiMAX (IEEE 802.16e)"
by Frank A. Ibikunle
in the Proceedings of the Mobile WiMAX Symposium (MWS 2009)July 2009, pp. 117-122
After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE\´s Publication Principles.
This paper contains significant portions of original text from the paper cited below. The original text was copied with insufficient attribution (including appropriate references to the original author(s) and/or paper title) and without permission.
Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:
"Security Vulnerabilities and Solutions in Mobile WiMAX"
by Andreas Deininger,Shinsaku Kiyomoto, Jun Kurihara, Toshiaki Tanaka
International Journal of Computer Science and Network Security, Vol 7, No 11 November 2007
The IEEE 802.16 standard, commonly known as WiMAX, is the latest technology that has promised to offer broadband wireless access over long distance. Since 2001, WiMAX has evolved from 802.16 to 802.16d standard for fixed wireless access and to the new IEEE 802.16e (Mobile WiMAX) standard with mobility support. Meanwhile, its security is becoming a critical issue with the proliferation of wireless threats. Though incorporating some security methods, IEEE 802.16e is still vulnerable to malicious attacks. In this paper, we analyze the security of Mobile WiMAX, point out several potential security threats and vulnerabilities. We propose some possible security improvements and solutions to eliminate the vulnerabilities.
Keywords :
WiMax; broadband networks; mobile radio; radio access networks; telecommunication security; IEEE 802.16 standard; broadband wireless access technology; fixed wireless access technology; mobile WiMAX; security method; Authentication; Broadcasting; Communication system security; Data security; Information security; Protection; Protocols; Virtual private networks; WiMAX; Wireless networks; Keywords: Mobile WiMAX; authentication; hash chaining; multicast and broadcast service; security vulnerability;