2013
DOI: 10.1109/surv.2012.021312.00138
|View full text |Cite
|
Sign up to set email alerts
|

Attacks and Countermeasures on 802.16: Analysis and Assessment

Abstract: The IEEE 802.16 technology, commonly referred to as WiMAX, gains momentum as an option for broadband wireless communication access. So far, several research works focus on the security of the 802.16 family of standards. In this context, the contribution of this paper is twofold. First, it provides a comprehensive taxonomy of attacks and countermeasures on 802.16. Each attack is classified based on several factors, e.g. its type, likelihood of occurrence, impact upon the system etc. and its potential is reviewe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0
3

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 45 publications
(29 citation statements)
references
References 51 publications
0
26
0
3
Order By: Relevance
“…Constantinos Kolias [4] it provides a comprehensive taxonomy of attacks and countermeasures on 802.16. Each attack is classified based on several factors, e.g.…”
Section: Daeinabi A[2] the Detection Of Malicious Vehicles (Dmv)mentioning
confidence: 99%
See 1 more Smart Citation
“…Constantinos Kolias [4] it provides a comprehensive taxonomy of attacks and countermeasures on 802.16. Each attack is classified based on several factors, e.g.…”
Section: Daeinabi A[2] the Detection Of Malicious Vehicles (Dmv)mentioning
confidence: 99%
“…Security of the VANET has been known as an enormous challenge. The applications of the VANET compromise with life crucial information and support the period communication to try it properly, it's essential to follow some security needs like integrity, non-repudiation, authentication and privacy across assaulters and malicious attacker nodes [4]. There are a unit the no.…”
Section: Introductionmentioning
confidence: 99%
“…It has pointed out that 4G systems will inherit all the security problems of underlying access networks and most of the IP-specific security vulnerabilities due to their heterogeneous and IP-based open architecture. Kolias [3] provided a comprehensive taxonomy of the malicious attacks and countermeasures in the LTE systems. In the survey, the qualitative characteristic of each type of the attacks has been evaluated in terms of both breadth and depth.…”
Section: Figure 1 the Architecture Of Evolved Packet Systemmentioning
confidence: 99%
“…Solution: Paper [8] provides a comprehensive taxonomy of attacks and countermeasures on 802.16 followed by a fullscale assessment study of indicative attacks that belong to broader attack classes. Each attack has been classified based on its type, occurrence, impact upon the system etc with possible countermeasures and remedies.…”
Section: Literature Review Of Mobile Wimax Attacksmentioning
confidence: 99%