A Journey on WiMAX and its Security Issues
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 4
Abstract
Security has become a primary concern in order to provide protected communication in Wireless environment. We know the basic concept of communication is sent the information from source node to destination node but in my view the communication is not sent the information but the amount of secure information which is sent from source node to destination node. The much anticipated technology for wireless broadband access, the WiMAX (Wireless Interoperability for Microwave Access) is finally starting to be available in the market with the aim to provide high data rates and provide interoperability of vendor devices at the same time. In this report we give an overview on the different performance evaluations that have been conducted on WiMAX systems and show the current capabilities and future trends in the WiMAX technology. As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks in. This report is a survey of security vulnerabilities found in WiMAX network. Vulnerabilities and threats associated with both layers in WiMAX (Physical and MAC layers).
Authors and Affiliations
Rakesh Kumar Jha , Dr Upena D Dalal
Detection of Abnormal Masses in Mammogram Images
Masses in the breast can be located in digital mammogram images by computationally analysing various feature statistics from the image. Any algorithm used to analyse digital mammogram images can be both time-consuming an...
Skin Detection Based Cryptography in Steganography (SDBCS)
As the popularity of digital cameras increases, some limitations of digital technology are becoming apparent and on the other hand it has become imperative to ensure security of information. Looking ahead...
A WEB BASED TOMATO CROP EXPERT INFORMATION SYSTEM BASED ON ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING ALGORITHM
Tomato is now the most widely grown vegetable crop in World. It is grown throughout the world in farm gardens, small home-gardens, and by market gardeners for fresh consumption as well as for pr...
DEVELOPMENT AND VALIDATION OF MEANINGFUL HYBRID E-TRAINING MODEL FOR COMPUTER EDUCATION
Meaningful hybrid e-training experience provides a coherent purpose for strategic educational change through lifelong education and the creation of a knowledge society. A close examination of new hybrid e-training progr...
Performance Analysis of Clustering Algorithms in Detecting Outliers
This paper presents the analysis of Kmeans and K-Medians clustering algorithm in detecting outliers. Clustering is generally used in pattern recognition where if a user wants to search for some particular pattern, cluste...