References
- IEEE 802.11-2007, "IEEE standard for Information technology Telecommunications and information exchange between systems- Local and metropolitan area networks - Specific requirements Part 11 Wireless LAN Meidum Access Control (MAC) and Physical Layer (PHY) Specifications," June 2007
- 3GPP; Technical Specification Group Services and System Aspects, "UMTS Access Stratum Services and Functions, version 7.0.0, release 7," June 2007
- Telecommunications Technology Association (TTA),'TTA Standard for Wireless Broadband (WiBro) Portable Internet: Specifications for 2.3 GHz band Portable Internet - PHY and MAC layers," 2004
- S. Kent and R Atkinson, "Security Architecture for the Internet Protocol," RFC 2401, November 1998
- T. Dierks and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.2," RFC 5246, August 2008
- E. Hescorla and N. Modadugu, "Datagram transport layer security," RFC 4347, April 2006
- The Network Simulator - NS-2, available at http//www.isi.edu/nsnamlns/
- NIST, "IEEE 802.16 ns-2 code," available at http:// www.antd.nist.gov/seamlessandsecure/doc.html
- IEEE 802.16e/D5-2004, "Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems - Amendment for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands," November 2004
- S. Ya-Chin and L. Yi~Bing, "IPsec~Based VoIP Performance in WLAN Environments," IEEE Internet Computing, Vol.12, No.6, pp. 77-82, 2008 https://doi.org/10.1109/MIC.2008.128
- H. Junbeom, S. Hyeongseop, K. Pyung, Y. Hyunsoo, and S. Nah-Oak, "Security Consider- ations for Handover Schemes in Mobile Wi:VIAX Networks," WCNC 2008, pp. 2531-2536
- S. Hung-Min, L. Yue-Hsun, C. Shuai-Min, and S. Yi-Chung, "Secure and fast handover scheme based on pre-authentication method for 802.16/ WiMAX infrastructure networks," TEN CON 2007, pp. 1-4
- Sun-Hwa Lim and Sang-ho Lee, "Efficient IMS Authentication Architecture based on Initial Access Authentication in Willro-Evolution (WiBro-EVO) System," VTC 2007, pp. 904-908
- 3GPP, 3rd generation partnership project; Technical specification group services and systems aspects, "IP Multimedia subsystem stage 2, Tech. Spec. 3G TS 23.228 version 6.2.0 (2003-06)," 2003
- J Arkko and H. Haverinen, "Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)," RFC 4187, January 2006
- A. Alshamsi and T. Saito, "A technical comparison of IPSec and SSL," AINA 2005, pp. 395-398
- Alan O. Freier, Philip Karlton, and Paul C. Kocher, "The SSL Protocol Version 3.0," available at http:;/wp.netscape.com/eng/ssI3/ssl-toc.html
- N. R. Potlapally, S. Ravi, A. Raghunathan, and N. K. Jha, "A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols," IEEE Transactions on Mobile Computing, Vol.5, No.2, pp. 128-143, 2006 https://doi.org/10.1109/TMC.2006.16