1 |
IEEE 802.16e-2005, "Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems", 2006.
|
2 |
IETF RFC 4285, "Authentication Protocol for Mobile IPv6", 2006.
|
3 |
WiMAX Forum NWG, "Stage-3: Detailed Protocol and Procedures", 2007.
|
4 |
D. I. Kim, S. H. Lee, Y. J. Kim, "Mobility Management in WiBro/Mobile WiMAX", The Korean Institute of Information Scientists and Engineers, vol. 25, No. 04, pp. 5-14. 2007. 04.
|
5 |
T. Janevski, "Traffic analysis and design of wireless IP networks", Artech House, pp. 186-190, 2003.
|
6 |
A. Mishra, M. Shin and W. Arbaugh, "pro-active Key Distribution using neighbor Graphs", IEEE Wireless Communication, vol. 11, Feb 2004."
|
7 |
M. Kassb, A. Belghith, J. M. Bonnin and S. Sassi, "Fast Pre-Authentication Based on Proactive Key Distribution for 802.11 Infrastructure Networks", In Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling, pp. 46-53, 2005.
|
8 |
D. Sweeney, "WiMax Operator Manual: building 802.16 Wireless Networks", Apress, 2005.
|
9 |
D. Johnston and J. Walker, "Overview of IEEE 802.16 Security", IEEE Security & Privacy, 2004.
|
10 |
A. Ghosh, D. R. Wolter, J. G. Andrews and R. Chen, "Broadband Wireless Access with WiMax/802.16: Current Performance Benchmarks and Future Potential", IEEE Communications Magazines, vol. 43, issue 2, pp. 129-136. Feb. 2005.
|
11 |
TAS.KO-06.0065R1, "Air and Network Interface Specifications for 2.3GHz band Portable Internet Service -MAC", TTA Standard, 2004.
|