References
- A. S. Tanenbaum, "Computer Networks," 4th Edition, Prentice Hall, Inc., New Jersey, 2006.
- http://en.wikipedia.org/wiki/WiMax
- Fuqiang Liu, Lei Lu, A WPKI-based Security Mechanism for IEEE 802.16e, IEEE Communications Society, Wuhan University, China 2006.
- Sen Xu Manton Matthews Chin-Tser Huang, Security Issues in Privacy and Key Management Protocols of Ieee 802.16, Acm Se'06, March 10-12, 2006, Melbourne, Florida, USA.
- Krawczyk et. al., RFC 2104: HMAC: Keyed-Hashing for Message Authentication, February 1997, http://tools.ietf.org/html/rfc2104.
- Sen Xu, Chin-Tser Huang, Manton M. Matthews, Secure Multicast in WiMAX, Journal Of Networks, Vol. 3, No. 2, February 2008.
- Leonardo Maccari, Matteo Paoli, Romano Fantacci, Security analysis of IEEE 802.16, Communications, 2007. ICC '07. IEEE International Conference on 24-28 June 2007 PP.1160-1165.
- Tian Haibo, Pang Liaojun, Wang Yumin, Key Management Protocol of the IEEE 802.16e, Wu han University Journal of Natural Sciences Vol.12 No.1, 2007.
- Jie Huang, Chin-Tser Huang, Secure Mutual Authentication Protocols for Mobile
- Multi-hop Relay WiMAX Networks against Rogue Base/Relay Stations., IEEE ICC, 2011. Vol.3, No.1, pp.1-12., 2011.Wikipedia, RSA, http://en.wikipedia.org/wiki/RSA, accessed: 8:11:2011.
- Housley, et. al., RFC 3280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, The Internet Society, April 2002,
- http://ieeexplore.ieee.org/iel5/10676/33683/016033
- Kejie Lu; Yi Qian; Hsiao-Hwa Chen, wireless broadband access: wimax and beyond - A Secure and Service-Oriented Network Control Framework for WiMAX Networks, IEEE Communications Magazine.May, Vol.1, No.1, pp.20-26, 2007
- http://www.cse.wustl.edu/-jain/cse571-09/ftp/wimax2/index.html
- Karen Scarfone, Cyrus Tibbs Matthew Sexton, Guide to Securing WiMAX Wireless Communications, Recommendations of the National Institute of Standards and Technology, 2013.
- Junaid Qayyum, Muhammad Lal, Faheem Khan, Muhammad Imad, Survey & Assessment of Wimax, Its Security Threats and Their Solutions, International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol: 11 No: 3, pp. 24-30, 2014.
- http://en.wikipedia.org/wiki/802.16
- Rakesh Kumar Jha, Dr Upena D Dalal , A Journey on WiMAX and its Security Issues, International Journal of Computer Science and Information Technologies, Vol. 1, No. 4, 256-263, 2010.
- Nirwan Ansari; WiMAX Security: Privacy Key Management; International Workshop on Network Security and Wireless Communications, Vol.1, No.1, pp.34-40,2007
- A. A. Ayesha Altaf, Rabia Sirhindi, A novel approach against dos attacks in wimax authentication using visual cryptography,The Second International Conference on Emerging Security Information, Systems and Technologies, securware, Vol.1, No.1, pp.56-64, 2008.