2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT) 2018
DOI: 10.1109/icicct.2018.8473100
|View full text |Cite
|
Sign up to set email alerts
|

A review Report on WiMAX Vulnerabilities, Security Threats and their Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…WiMAX is for global cooperation for microwave access and is a wireless technique that enables the provision of wireless fast broadband connections that are an alternative to a conventional digital subscriber line (DSL) [142]. This standard offers fast information rates [143], quality of service (QoS) [144], and wide coverage compared to WLAN [145,146]. WiMAX was launched in 1999 to provide the conditions for wideband wireless metropolitan area networks [147].…”
Section: Fsoc For Wimaxmentioning
confidence: 99%
“…WiMAX is for global cooperation for microwave access and is a wireless technique that enables the provision of wireless fast broadband connections that are an alternative to a conventional digital subscriber line (DSL) [142]. This standard offers fast information rates [143], quality of service (QoS) [144], and wide coverage compared to WLAN [145,146]. WiMAX was launched in 1999 to provide the conditions for wideband wireless metropolitan area networks [147].…”
Section: Fsoc For Wimaxmentioning
confidence: 99%
“…The considered technologies are heavily used in IoT. A large majority have studied security attacks considering multiple wireless communication technologies, such as Wi-Fi, Bluetooth, RFID, WiMax, UMTS, LTE, and WSNs 5 [88]- [90], whereas others have chosen to survey attacks in one particular wireless communication technology, e.g., Wi-Fi [91]- [94], Bluetooth [95]- [102], ZigBee (or IEEE 802.15.4) [103]- [107], RFID [108]- [114], 6LoWPAN (Ipv6 over Low-Power Wireless Personal Area Networks) [115]- [118], LoRaWAN [119]- [121], Zwave and Thread [122], WiMax [123]- [128], and 4G (i.e., LTE) or 5G [129]- [131]. Table 1 summarizes the three IoT security attack research directions (i.e., RD1, RD2, and RD3), with respect to the considered IoT applications (Column 2), IoT wireless communication technologies (Column 3), IoT network architectures (Column 4), and IoT security services (Column 5).…”
Section: Existing Iot Attack Research Directionsmentioning
confidence: 99%