Guest Editorial: Special Issue on: WiMAX security and applications
Author | Dahmane, Adel Omar |
Author | Razzak, Mustapha |
Author | Guizani, Sghaier |
Available date | 2015-11-08T08:35:34Z |
Publication Date | 2009 |
Publication Name | Security and Communication Networks |
Resource | Wiley Online Library |
Citation | Dahmane, A. O., Razzak, M. and Guizani, S. (2009), Guest Editorial: Special Issue on: WiMAX security and applications. Security and Communication Networks, 2: 371�372. |
ISSN | 1939-0122 |
Abstract | Worldwide Interoperability for Microwave Access (WiMAX) aims to provide high-speed, high-bandwidth, and high-capacity Broadband Wireless Access (BWA) for residential as well as enterprise applications. WiMAX is designed to provide high data rate multimedia services, e.g., voice, data, Internet, email, instant messenger, and games. The security of WiMAX has been under researchers' scrutiny for the last few years. Both architectures and protocols on WiMAX security have been extensively studied in academics and industries. Several articles, survey reports, and research papers have been published and a number of flaws have been highlighted in the literature. The IEEE Committee has published several revisions of the IEEE 802.16 standard since its initial release in 2001, but many of the vulnerabilities have still been left unattended in the standard. Ensuring the security of these complex and yet resource constraint systems has emerged as one of the most pressing challenges. The aim of this Special Issue is to bring together researchers and practitioners in related areas and to encourage interchange and cooperation under the context of WiMAX security between the research community and the industrial/consumer community. |
Language | en |
Publisher | John Wiley & Sons, Ltd. |
Subject | Wireless metropolitan area networks -- Security measures. TECHNOLOGY & ENGINEERING -- Telecommunications. IEEE 802.16 (Standard) Mobile communication systems. Broadcasting -- Information technology. |
Type | Article |
Pagination | 371–372 |
Issue Number | 5 |
Volume Number | 2 |
Files in this item
This item appears in the following Collection(s)
-
Computer Science & Engineering [2427 items ]