Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29522


Select areas to restrict search in scientific publication database:
10003801
Survey on Handover Security Issues in WiMAX Networks
Abstract:
Worldwide Interoperability for Microwave Access, is a broadband technology, which can effectively transmit a data across a group of users using Multicast and Broadcast Service. WiMAX belongs to a family of (IEEE 802.16) standards and is evolving as a fourth generation technology. WiMAX is the next generation technology that offers wireless access over long distances. MBS zone, which is a group of base stations that are broadcasting the same multicast packets which defines Multicast and Broadcast services. Handover is a process of transferring an ongoing call or data session from one channel connected to the core network to another channel. The handover causes authentication, delay, packet loss, jitter that mainly affects the communication. In this paper, we present a survey on handover security issues in WiMAX.
Digital Object Identifier (DOI):

References:

[1] Chandan Gupta, “Comparative Study of Various Handover Scenarios in WiMAX Network,” International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 1, Issue 2, August 2012.
[2] http://www.WiMAXForum.org/
[3] Zdenek Becvar, Jan Zelenka, “Handovers in the Mobile WiMAX”
[4] Daan Pareit, Bart Lannoo, Ingrid Moerman, “The History of WiMAX: A Complete Survey of the Evolution in Certification and Standardization for IEEE 802.16 and WiMAX,” IEEE Communications Surveys and Tutorials, Vol.14, No.4,2012.
[5] Bo Li, Hong Kong, “Survey On Mobile WiMAX,” IEEE Communication Magazine, December 2012.
[6] Thuy Ngoc Nguyen and Maode Ma, “Enhanced EAP-Based Pre-Authentication for Fast and Secure Inter-ASN Handovers in Mobile WiMAX Networks,” IEEE Transactions On Wireless Communications, Vol. 11, No. 6, June 2012.
[7] Ali Al Shidhani, “Fast and Secure Reauthentications for 3GPP Subscribers during WiMAX-WLAN Handovers,” IEEE Transactions On Dependable and Secure Computing, Vol. 8, No. 5, September/ October 2011.
[8] Anmin Fu, Gongxuan Zhang, Zhenchao Zhu, Yuqing Zhang, “Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks,” Springer, July 2014.
[9] Junbeom Hur, Hyeongseop Shim, Pyung Kim, Hyunsoo Yoon, Nah-Oak Song, “Security Considerations for Handover Schemes in Mobile WiMAX Networks,” IEEE Communications Society,2008.
[10] Taeshik Shon, Bonhyun Koo, Jong Hyuk Park, and Hangbae Chang, “Novel Approaches to Enhance Mobile WiMAX Security, “Research article in proceedings of EURASIP Journal on Wireless Communications and Networking, Volume 2010.
[11] J. Hur, H. Shim, P. Kim, H. Yoon, and N.-O. Song, “Security considerations for handover schemes in mobile WiMAX networks,” in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC ’08), pp. 2531–2536, Las Vegas, Nev, USA, March-April 2008.
[12] Bhaskar Ashoka, David Eyers and Zhiyi Huang, "Handover Delay in Mobile WiMAX: A Simulation Study," International Conference on Parallel and Distributed Computing, Applications and Technologies IEEE, 2011.
[13] Shabbir Ahmed, "Performance Analysis of Mobile WiMAX Technology," International Conference on Computing for Sustainable Global Development, 2014.
[14] Sandeep Singh Sengar, Neeraj Tyagi, and Akhilendra Pratap Singh, "A Survey on WiMAX-3G Interworking," IEEE 2011.
[15] Kejie Lu, Yi Qian and Hsiao-Hwa Chen, "A Secure and Service-Oriented Network Control Framework for WiMAX Networks,” IEEE Communication Magazine, May 2007.
[16] Jeremy Brown, Xiaojiang Du, "Towards Efficient and Secure Rekeying for IEEE 802.16e WiMAX Networks," IEEE Communications Society, 2009.
[17] L. Maccari, M. Paoli, and R. Fantacci, “Security analysis of IEEE 802.16,” IEEE International Conference on, 2007, pp.1160 – 1165.
[18] T. Han, N. Zhang, K. Liu, B. Tang, and Y. Liu, “Analysis of mobile WiMAX security: Vulnerabilities and solutions,” IEEE International Conference on, 2008, pp.828 – 833.
[19] Ji Hoon Lee, Taekyoung Kwon, and Yanghee Choi, "Location Management Area (LMA)-based MBS Handover in Mobile WiMAX Systems"
[20] Ashutosh Dutta, David Famolari and Subir Das, "Media-Independent Pre-Authentication Supporting Secure Interdomain Handover Optimization," IEEE Wireless Communication, April 2008.
[21] Sayan Kumar Ray, Krzysztof Pawlikowski and Harsha Sirisena, "Handover in Mobile WiMAX Networks: The State of Art and Research Issues," IEEE communications surveys and tutorials, Vol. 12, No. 3, 2010.
[22] Ji Hoon Lee, Sangheon Pack and Taekyoung Kwon, "Reducing Handover Delay by Location Management in Mobile WiMAX Multicast and Broadcast Services," IEEE Transactions on vehicular technology, Vol. 60, No. 2, 2011
[23] A. Dutta, J. Chennikara, W. Chen, O. Altintas, and H. Schulzrinne, “Multicasting streaming media to mobile users,” IEEE communication magazine, Vol. 41, No. 10, pp. 81–89, 2003.
[24] Frank, A Ibikunle, "Security Issues in Mobile WiMAX (IEEE 802.16e)," IEEE Mobile WiMAX Symposium, 2009.
[25] Ravichandra M, Kiran Gowda H N, Udaya Kumar C A, "A Survey on Handovers Literature for Next Generation Wireless Networks," International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 12, December 2013.
[26] Abdoul-Aziz Issaka Hassane, Li Renfa, and Zeng Fanzi, "Handover Decision Based on User Preferences in Heterogeneous Wireless Networks," College of Information Science and Engineering, Hunan University, China 2012.
[27] B. R. Chandavarkar, G. Ram Mohan Reddy, "Survey Paper:Mobility Management in Heterogeneous Wireless Networks," Department of Information Technology National Institute of Technology, Karnataka, Surathkal, Mangalore, 2011.
[28] A. Bacioccola, C. Cicconetti, C. Eklund, L. Lenzini, Z. Li, and E. Mingozzi, “IEEE 802.16: History, status and future trends,” Computer Communications, Vol. 33, No. 2, pp. 113–123, 2010.
[29] Jamshed Hasan, “Security Issues of IEEE 802.16 (WiMAX)” Proceedings of 4th Australian Information Security Management Conference, Edith Cowan University, Perth, Western Australia, 5th December, 2006.
[30] R. Q. Hu et al, "On the Evolution of Handoff Management and Network Architecture in WiMAX," In Proc. IEEE Mobile WiMAX Symposium, No. 144-149, March 2007.
[31] S. Cho et al, "Hard Handoff Scheme Exploiting Uplink and Downlink Signals in IEEE 802.16e Systems," In Proc. IEEE Vehicular Technology Conference (VTC), Vol. 3, pp. 1236-1240, Spring 2006.
[32] B. Li, Y. Qin, C. P. Low, and C. L. Gwee, “A Survey on Mobile WiMAX,” in IEEE Communication Magazine, Vol. 45, No. 12, pp. 70–75, Dec. 2007.
[33] Ioannis Papapanagiotou, Dimitris Toumpakaris, Jungwon Lee, "A Survey on Next Generation Mobile WiMAX Networks: Objectives, Features and Technical Challenges," IEEE Communications Surveys & Tutorials, Vol. 11, No. 4, Fourth Quarter 2009.
[34] B. Li, Y. Qin, C. P. Low, and C. L. Gwee, “A Survey on Mobile WiMAX,” in IEEE Communication Magazine, Vol. 45, No. 12, pp. 70–75, Dec. 2007.
[35] K. Etemad, “Overview of Mobile WiMAX Technology and Evolution,” in IEEE Communication Magazine, Vol. 46, No. 10, pp. 31–40, Oct. 2008.
[36] A. Dutta, J. Chennikara, W. Chen, O. Altintas, and H. Schulzrinne, “Multicasting streaming media to mobile users,” IEEE Communication Magazine, Vol. 41, No. 10, pp. 81–89, Oct. 2003.
[37] A. M. Taha, A. T. Abdel-Hamid, and S. Tahar, “Formal analysis of the handover schemes in mobile WiMAX networks,” IFIP International Conference on Wireless and Optical Communications Networks, 2009.
Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007