메뉴 건너뛰기




Volumn 15, Issue 1, 2013, Pages 487-514

Attacks and countermeasures on 802.16: Analysis and assessment

Author keywords

802.16; Attacks; Security; Simulation; Survey; WiMAX

Indexed keywords

802.16; ATTACKS; BROADBAND WIRELESS COMMUNICATIONS; IEEE 802.16; SECURITY; SIMULATION;

EID: 84873738656     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2012.021312.00138     Document Type: Article
Times cited : (37)

References (71)
  • 1
    • 84873738942 scopus 로고    scopus 로고
    • (Online Resources)
    • List of Acronyms and Additional Tables (Online Resources) http://www.icsd.aegean.gr/postgraduates/kkolias/attacks-andcountermea -sures-on-802-16/online-resources.pdf
    • List of Acronyms and Additional Tables
  • 20
    • 0033749075 scopus 로고    scopus 로고
    • Performance analysis of the IEEE 802.11 distributed coordination function
    • Mar
    • G.Bianchi, "Performance Analysis of the IEEE 802.11 Distributed Coordination Function," IEEE J. Sel. Areas Commun., vol.18, no.3, pp.535-547, Mar 2000.
    • (2000) IEEE J. Sel. Areas Commun. , vol.18 , Issue.3 , pp. 535-547
    • Bianchi, G.1
  • 23
    • 36348937162 scopus 로고    scopus 로고
    • Performance improvement using dynamic contention window adjustment for initial ranging in IEEE 802.16 P2MP networks
    • 11-15 March
    • L. Lin, W. Jia, B. Han, L. Zhang, "Performance Improvement using Dynamic Contention Window Adjustment for Initial Ranging in IEEE 802.16 P2MP Networks," Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE, vol., no., pp.1877-1882, 11-15 March 2007.
    • (2007) Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE , pp. 1877-1882
    • Lin, L.1    Jia, W.2    Han, B.3    Zhang, L.4
  • 26
    • 34547571167 scopus 로고    scopus 로고
    • Performance evaluation of energy-saving mechanism based on probabilistic sleep interval decision algorithm in IEEE 802.16e
    • July
    • J.R. Lee, D.H. Cho, "Performance Evaluation of Energy-Saving Mechanism Based on Probabilistic Sleep Interval Decision Algorithm in IEEE 802.16e," Vehicular Technology, IEEE Transactions on, vol.56, no.4, pp.1773-1780, July 2007.
    • (2007) Vehicular Technology, IEEE Transactions on , vol.56 , Issue.4 , pp. 1773-1780
    • Lee, J.R.1    Cho, D.H.2
  • 27
    • 68449104742 scopus 로고    scopus 로고
    • On the detection of signaling DoS attacks on 3G/WiMAX wireless networks
    • 12 October
    • P.C. Lee, T. Bu, T. Woo, "On the Detection of Signaling DoS Attacks on 3G/WiMAX Wireless Networks", Computer Networks, Volume 53, Issue 15, pp. 2601-2616, 12 October 2009.
    • (2009) Computer Networks , vol.53 , Issue.15 , pp. 2601-2616
    • Lee, P.C.1    Bu, T.2    Woo, T.3
  • 28
    • 70749139880 scopus 로고    scopus 로고
    • Power saving mechanisms of IEEE 802.16e: Sleep mode vs. idle mode
    • B. Kim, J. Park, Y.-H. Choi, "Power Saving Mechanisms of IEEE 802.16e: Sleep Mode vs. Idle Mode," Lecture Notes in Computer Science, vol. 4331, pp. 332-340, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4331 , pp. 332-340
    • Kim, B.1    Park, J.2    Choi, Y.-H.3
  • 30
    • 38549178532 scopus 로고    scopus 로고
    • Security analysis of IEEE 802.16
    • DOI 10.1109/ICC.2007.197, 4288868, 2007 IEEE International Conference on Communications, ICC'07
    • L. Maccari, M. Paoli, R. Fantacci, "Security Analysis of IEEE 802.16" Communications, 2007. ICC '07. IEEE International Conference on, vol., no., pp.1160-1165, 24-28 June 2007. (Pubitemid 351145694)
    • (2007) IEEE International Conference on Communications , pp. 1160-1165
    • Maccari, L.1    Paoli, M.2    Fantacci, R.3
  • 32
    • 38049024684 scopus 로고    scopus 로고
    • An analysis of mobile WiMAX security: Vulnerabilities and solutions
    • Springer-Verlag
    • T Shon, W. Choi, "An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions" Lecture Notes in Computer Science, 4658, Springer- Verlag, 2007; 8897.
    • (2007) Lecture Notes in Computer Science , vol.4658 , pp. 8897
    • Shon, T.1    Choi, W.2
  • 33
    • 67049154498 scopus 로고    scopus 로고
    • Security vulnerabilities and solutions in mobile WiMAX
    • A. Deininger, S. Kiyomoto, J. Kurihara, T. Tanaka, "Security Vulnerabilities and Solutions in Mobile WiMAX", IJCSNS vol.7, no.11, pp.7-15, 2007.
    • (2007) IJCSNS , vol.7 , Issue.11 , pp. 7-15
    • Deininger, A.1    Kiyomoto, S.2    Kurihara, J.3    Tanaka, T.4
  • 36
    • 52949098405 scopus 로고    scopus 로고
    • Responding to security issues in WiMAX networks
    • C. Huang, L. Chang, "Responding to Security Issues in WiMAX Networks", IT Professional 2008; 10(5):15-21.
    • (2008) IT Professional , vol.10 , Issue.5 , pp. 15-21
    • Huang, C.1    Chang, L.2
  • 39
    • 3042685819 scopus 로고    scopus 로고
    • Overview of IEEE 802.16 security
    • May-June
    • D. Johnston, J. Walker, "Overview of IEEE 802.16 Security," Security & Privacy, IEEE, vol.2, no.3, pp.40-48, May-June 2004.
    • (2004) Security & Privacy, IEEE , vol.2 , Issue.3 , pp. 40-48
    • Johnston, D.1    Walker, J.2
  • 41
    • 77949571723 scopus 로고    scopus 로고
    • An overview of WiMAX security
    • M. Ilyas, Ed. Boca Raton, FL: CRCPress
    • E. B. Fernandez, M. VanHilst, "An Overview of WiMAX Security" in WiMAX Standards and Security, M. Ilyas, Ed. Boca Raton, FL: CRCPress, 2008, pp. 197204.
    • (2008) WiMAX Standards and Security , pp. 197204
    • Fernandez, E.B.1    Vanhilst, M.2
  • 44
    • 84974667019 scopus 로고    scopus 로고
    • A chosen-plaintext linear attack on DES
    • Fast Software Encryption
    • L. R. Knudsen, J. E. Mathiassen, "A Chosen-Plaintext Linear Attack on DES", In Proc. 7th International Workshop on Fast Software Encryption (FSE '00), Bruce Schneier (Ed.). Springer-Verlag, London, UK, 262- 272, 2000. (Pubitemid 33236954)
    • (2001) Lecture Notes in Computer Science , Issue.1978 , pp. 262-272
    • Knudsen, L.R.1    Mathiassen, J.E.2
  • 45
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for des cipher
    • T. Helleseth, Ed., Springer-Verlag
    • M. Matsui, "Linear Cryptanalysis Method for DES Cipher," Advances in Cryptology, Proceedings Eurocrypt'93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, pp. 386-397 1994
    • (1994) Advances in Cryptology, Proceedings Eurocrypt'93, LNCS , vol.765 , pp. 386-397
    • Matsui, M.1
  • 48
    • 77955717620 scopus 로고    scopus 로고
    • Revisiting WiMAX MBS security
    • Advances in Cryptography Security and Applications for Future Computer Science, July
    • G. Kambourakis, E. Konstantinou, S. Gritzalis, "Revisiting WiMAX MBS security", Computers & Mathematics with Applications, Volume 60, Issue 2, Advances in Cryptography, Security and Applications for Future Computer Science, Pages 217-223, July 2010.
    • (2010) Computers & Mathematics with Applications , vol.60 , Issue.2 , pp. 217-223
    • Kambourakis, G.1    Konstantinou, E.2    Gritzalis, S.3
  • 53
    • 0003370741 scopus 로고
    • A security risk of depending on synchronized clocks
    • Jan.
    • L. Gong, "A Security Risk of Depending on Synchronized Clocks", ACM SIGOPS Operating Systems Review, v.26 n.1, p.49-53, Jan. 1992.
    • (1992) ACM SIGOPS Operating Systems Review , vol.26 , Issue.1 , pp. 49-53
    • Gong, L.1
  • 56
    • 0000478762 scopus 로고
    • Cipher printing telegraph systems for secret wire and radio telegraphic communications
    • Gilbert S. Vernam, "Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications", Journal of the IEEE, Vol 55, pp109115 (1926).
    • (1926) Journal of the IEEE , vol.55 , pp. 109115
    • Vernam, G.S.1
  • 62
  • 66
    • 67249151067 scopus 로고    scopus 로고
    • Enhancing security using the discarded security information in mobile WiMAX networks
    • Nov. 30 2008-Dec. 4
    • Y. Kim, S. Bahk, "Enhancing Security Using the Discarded Security Information in Mobile WiMAX Networks," Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, vol., no., pp.1-5, Nov. 30 2008-Dec. 4 2008.
    • (2008) Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE , pp. 1-5
    • Kim, Y.1    Bahk, S.2
  • 68
    • 34047154513 scopus 로고    scopus 로고
    • Performance analysis of sleep mode operation in IEEE 802.16e mobile broadband wireless access systems
    • 7-10 May
    • Kwanghun Han, Sunghyun Choi "Performance Analysis of Sleep Mode Operation in IEEE 802.16e Mobile Broadband Wireless Access Systems," Vehicular Technology Conference, 2006. VTC 2006-Spring. IEEE 63rd, vol.3, no., pp.1141-1145, 7-10 May 2006.
    • (2006) Vehicular Technology Conference, 2006. VTC 2006-Spring. IEEE 63rd , vol.3 , pp. 1141-1145
    • Han, K.1    Choi, S.2
  • 70
    • 84861440335 scopus 로고    scopus 로고
    • Assessing the effect of WiMAX system parameter settings on MAC-level local DoS vulnerability
    • Juan Deng, Richard R. Brooks, and James Martin, "Assessing the Effect of WiMAX System Parameter Settings on MAC-level Local DoS Vulnerability", International Journal of Performability Engineering, 8 (2) 163-178, (2012).
    • (2012) International Journal of Performability Engineering , vol.8 , Issue.2 , pp. 163-178
    • Deng, J.1    Brooks, R.R.2    Martin, J.3
  • 71
    • 74349119886 scopus 로고    scopus 로고
    • Huawei Technologies Co., Ltd.
    • Huawei Technologies Co., Ltd. Huawei WiMAX Base Station3703. http://www.huawei.com/le/download.do?f=2682
    • Huawei WiMAX Base Station3703


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.