WiMAX Security Mechanism for Minimizing Performance load of Base Station |
Jeong, Yoon-Su
(충북대학교 전자계산학과)
Kim, Yong-Tae (한남대학교 멀티미디어학부) Park, Gil-Cheol (한남대학교 멀티미디어학부) Lee, Sang-Ho (충북대학교 전기전자 컴퓨터공학부) |
1 | D. Gollmann, Computer Security(2nd ed.), West Sussex, Wiley, 2006 |
2 | X. Sen, M. Maqtthews, H. Chin-Tser, "Security Issues in Pricacy and Key Management protocols of IEEE 802.16", Department of Computer Science and Engineering - University of Sourth Carolina Columbia, SC 29208, USA:www.cse.sc.edu/~huanget/acmse06cr.pdf#search=%22acmse06cr.pdf%22 |
3 | M. Schumacher, E. B. Fernandez, D. Hybertson, F. Buschmann, and P. Sommerlad, "Security Patterns: Integrating Security and Systems Engineering", Wiley, Chichester, W. Sussex, England, 2006 |
4 | S. Wattanachai, "Security Architecture of the IEEE 802.16 Standard for Mesh Networks", Department of computer and Systems Sciences Stockholm University/Royal Institute of Technology, 2006: www.dsv.su.se/research/seclab/pages/pdf-files/2006-x-360.pdf#search=%222006-x-360.pdf%22 |
5 | M. Barbeau, "WiMAX/802.16 Threat Analysis", School of Computer Science Carleton University 1125 Colonel By Drive. Ottawa, Ontario, Canada, 2005 www.scs.carleton.ca/~barbeau/Publications/2005/iq2-barbeau.pdf#search=%22iq2-barbeau.pdf%22 |
6 | WiMAX Forum(2006) : Mobile WiMAX: The Best Personal Broadband Experience |
7 | Frank Ohrtmann: Wimax Handbook. Building 802.16 Wireless Networks - McGraw-Hill Communicaitons, 2005 |
8 | J. Bellardo and S. savage, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions", Presented at 11th USENIX Security Symposium, 2003 |
9 | M. Barbeau, "WiMAX/802.16 threat analysis", in Proceedings of ACM Q2SWinet'05, Montreal, Quebec, Canada, Oct 13, 2005 |
10 | E. Yang, H. Zhou, L.Zhang, and J. Feng, "An improved security scheme in WMAN based on IEEE Standard 802.16", Wireless Communication, Networking and Mobile Computing, Vol. 2, pp. 1191-1194, Sep. 2005 |
11 | A. Arkou야-Vafea, "Security of IEEE 802.16. Master of Information and Communication Systems Security" Department of Computer and Systems - Science Royal Institute of Technology, 2006: www.dsv.su.se/research /seclab/pages/pdf-files/2006-x-332.pdf |
12 | D. Johnston, J. Walker, "Overview of IEEE 802.16 Security", Published by IEEE Computer Society, 2004:mia.ece.uic.edu/~pages/WWW/Bubbles/segment/WiMax_Security.pdf#search=%22WiMax_Security.pdf%22 |