Overview and analysis of IEEE 802.16e security

Di Pang*, Lin Tian, Jinlong Hu, Jihua Zhou, Jinglin Shi

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Abstract

This article overviews IEEE 802.16e security, analyzes its improvements in contrast with IEEE 802.16-2004 security and potential security flaws, especially the flaw existing in subscriber handover procedure.

Original languageEnglish
Title of host publicationProceedings of the 1st IEEE International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless 2006
PublisherUniversity of Technology Sydney
Pages657-662
Number of pages6
ISBN (Print)0977520005, 9780977520008
Publication statusPublished - 2006
Event1st IEEE International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless - 2006 - Sydney, Australia
Duration: 13 Mar 200616 Mar 2006

Other

Other1st IEEE International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless - 2006
CountryAustralia
CitySydney
Period13/03/0616/03/06

Fingerprint Dive into the research topics of 'Overview and analysis of IEEE 802.16e security'. Together they form a unique fingerprint.

  • Cite this

    Pang, D., Tian, L., Hu, J., Zhou, J., & Shi, J. (2006). Overview and analysis of IEEE 802.16e security. In Proceedings of the 1st IEEE International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless 2006 (pp. 657-662). University of Technology Sydney.